Network Security Evaluation Based on Simulation of Malfactor s Behavior

Igor V. Kotenko, Mikhail Stepashkin. Network Security Evaluation Based on Simulation of Malfactor s Behavior. In Manu Malek, Eduardo Fernández-Medina, Javier Hernando, editors, SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. pages 339-344, INSTICC Press, 2006.

Abstract

Abstract is missing.