Verification method of network simulation for pervasive environments

Kyuhyung Cho, Jongsung Lee, Jong In Lim, Jongsub Moon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm
Pages155-161
Number of pages7
DOIs
Publication statusPublished - 2007 Dec 1
Event3rd International Conference on Security and Privacy in Communication Networks, SecureComm - Nice, France
Duration: 2007 Sep 172007 Sep 21

Other

Other3rd International Conference on Security and Privacy in Communication Networks, SecureComm
CountryFrance
CityNice
Period07/9/1707/9/21

Keywords

  • Compare
  • Modeling
  • Security
  • Simulation
  • Traffic
  • Worm

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Cho, K., Lee, J., Lim, J. I., & Moon, J. (2007). Verification method of network simulation for pervasive environments. In Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm (pp. 155-161). [4550323] https://doi.org/10.1109/SECCOM.2007.4550323

Verification method of network simulation for pervasive environments. / Cho, Kyuhyung; Lee, Jongsung; Lim, Jong In; Moon, Jongsub.

Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. 2007. p. 155-161 4550323.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cho, K, Lee, J, Lim, JI & Moon, J 2007, Verification method of network simulation for pervasive environments. in Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm., 4550323, pp. 155-161, 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, Nice, France, 07/9/17. https://doi.org/10.1109/SECCOM.2007.4550323
Cho K, Lee J, Lim JI, Moon J. Verification method of network simulation for pervasive environments. In Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. 2007. p. 155-161. 4550323 https://doi.org/10.1109/SECCOM.2007.4550323
Cho, Kyuhyung ; Lee, Jongsung ; Lim, Jong In ; Moon, Jongsub. / Verification method of network simulation for pervasive environments. Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. 2007. pp. 155-161
@inproceedings{7e9ef68f1e8841bdaa2d63bdd10e55fa,
title = "Verification method of network simulation for pervasive environments",
abstract = "The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.",
keywords = "Compare, Modeling, Security, Simulation, Traffic, Worm",
author = "Kyuhyung Cho and Jongsung Lee and Lim, {Jong In} and Jongsub Moon",
year = "2007",
month = "12",
day = "1",
doi = "10.1109/SECCOM.2007.4550323",
language = "English",
isbn = "1424409756",
pages = "155--161",
booktitle = "Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm",

}

TY - GEN

T1 - Verification method of network simulation for pervasive environments

AU - Cho, Kyuhyung

AU - Lee, Jongsung

AU - Lim, Jong In

AU - Moon, Jongsub

PY - 2007/12/1

Y1 - 2007/12/1

N2 - The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.

AB - The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.

KW - Compare

KW - Modeling

KW - Security

KW - Simulation

KW - Traffic

KW - Worm

UR - http://www.scopus.com/inward/record.url?scp=51449123726&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51449123726&partnerID=8YFLogxK

U2 - 10.1109/SECCOM.2007.4550323

DO - 10.1109/SECCOM.2007.4550323

M3 - Conference contribution

SN - 1424409756

SN - 9781424409754

SP - 155

EP - 161

BT - Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm

ER -