This paper presents a simple simulation model of a firewall to derive several performance metrics and briefly argues on the importance and value of modeling and simulation in courses that study various aspects of perimeter defense in network security. The simulation model mentioned previously is part of an effort by faculty of our department to develop a multi-disciplinary repository of computational models that includes object-oriented discrete-event simulation models. One of the goals of this repository is to build resources that help educate students of computer science, software engineering, and information technology, in modeling and information security. This and other network simulation models are implemented in Java with the PsimJ s...
With the rapid development of computer science and technology, network attack and defense has become...
Computer networks are now relied on more than ever before for gathering information and performing e...
In order to combat the increasing complexity of cyber attacks, a new category of cyber defense calle...
Fast growing in communication technology has influenced global changes and challenges appear in the ...
The iNetwork Simulator is a software application created provides a user-friendly graphical interfac...
ITGuru is a powerful simulation environment developed by OpNET Corporation. ITGuru is unique because...
In this paper, a paradigm of a Bayesian Network–based performance prediction model for computer netw...
Report presents a discussion of analytical and simulation models which have been developed for the p...
The performance of computer communication networks is often given only cursory treatment in undergra...
Computer modeling and simulation is a practical way to design and test a system without actually hav...
The management of network infrastructure is difficult and complex with the growth of the Internet. I...
The traffic between computer networks must be controlled to prevent unauthorized access. Firewall is...
Access control lists and firewall rules are intended to prevent access to certain resources on a com...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
The article has been written in continuation of a series of works on the evaluation of the probabili...
With the rapid development of computer science and technology, network attack and defense has become...
Computer networks are now relied on more than ever before for gathering information and performing e...
In order to combat the increasing complexity of cyber attacks, a new category of cyber defense calle...
Fast growing in communication technology has influenced global changes and challenges appear in the ...
The iNetwork Simulator is a software application created provides a user-friendly graphical interfac...
ITGuru is a powerful simulation environment developed by OpNET Corporation. ITGuru is unique because...
In this paper, a paradigm of a Bayesian Network–based performance prediction model for computer netw...
Report presents a discussion of analytical and simulation models which have been developed for the p...
The performance of computer communication networks is often given only cursory treatment in undergra...
Computer modeling and simulation is a practical way to design and test a system without actually hav...
The management of network infrastructure is difficult and complex with the growth of the Internet. I...
The traffic between computer networks must be controlled to prevent unauthorized access. Firewall is...
Access control lists and firewall rules are intended to prevent access to certain resources on a com...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
The article has been written in continuation of a series of works on the evaluation of the probabili...
With the rapid development of computer science and technology, network attack and defense has become...
Computer networks are now relied on more than ever before for gathering information and performing e...
In order to combat the increasing complexity of cyber attacks, a new category of cyber defense calle...