MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357619
|View full text |Cite
|
Sign up to set email alerts
|

Validation of network simulation model with emulation using example malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…5 This made the simulator a good choice for the first implementation of the model. 6 ns-3 also allows users to parallelize the simulation to run across multiple compute nodes, which will be necessary when working towards the goal of modeling large-scale, complex networks.…”
Section: Model Validationmentioning
confidence: 99%
“…5 This made the simulator a good choice for the first implementation of the model. 6 ns-3 also allows users to parallelize the simulation to run across multiple compute nodes, which will be necessary when working towards the goal of modeling large-scale, complex networks.…”
Section: Model Validationmentioning
confidence: 99%