Redirigiendo al acceso original de articulo en 15 segundos...
ARTÍCULO
TITULO

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?

Samuel Chapman    
Richard Smith    
Leandros Maglaras and Helge Janicke    

Resumen

-

 Artículos similares

       
 
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms

 
Yadong Zhou, Zhenchao Teng, Linlin Chi and Xiaoyan Liu    
Based on the unit life and death technology, the dynamic evolution process of soil loss is considered, and a pipe-soil nonlinear coupling model of buried pipelines passing through the collapse area is constructed. The analysis shows that after the third ... ver más
Revista: Applied Sciences

 
Binghui Zhao, Liguo Han, Pan Zhang, Qiang Feng and Liyun Ma    
In passive seismic exploration, the number and location of underground sources are very random, and there may be few passive sources or an uneven spatial distribution. The random distribution of seismic sources can cause the virtual shot recordings to pr... ver más
Revista: Applied Sciences

 
Shuting Xu and Jinming Xu    
The construction of deep foundation pits in subway stations can affect the settlement of existing buildings adjacent to the pits to varying degrees. In this paper, the Long Short-Term Memory neural network prediction model of building settlement caused b... ver más
Revista: Applied Sciences

 
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu    
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How... ver más
Revista: Applied Sciences