1 |
R. Hollister, P. Lardieri, and L. Pridmore, "National cyber range(NCR) automated test tools: implications and application to network-centric support tools," IEEE Conference, AUTOTESTCON, pp. 1-4, Sept. 2010
|
2 |
B. Ferguson, A. Tall, and D. Olsen, "National cyber range overview," IEEE Military Communications Conference, pp. 123-128, Oct. 2014
|
3 |
Michael V. R. Johnson, Mark F. McKeon, and Terence R. Szanto, "Simulation based acquisition: a new approach," DSMC, Dec. 1998
|
4 |
KIM HYUK JOON, Donghwan Lee, Myung Kil Ahn, Yong-Hyun Kim, and Ki-Seong Noh, "Measuring technical effectiveness in cyber warfare," Korea Computer Congress, pp. 143-145, June 2015
|
5 |
DISA, https://www.disa.mil/Mission-Support/ Enterprise-Engineering/JCSS
|
6 |
Riverbed Modeler, http://www.riverbed.com/products/performance-management-control/opnet.html
|
7 |
Myung Kil Ahn, DongHwan Lee, Donghwa Kim, and Yong Hyun Kim, "Research on method of cyber attack modeling in constructive M&S network environment," The Fall Conference of the KIMST, pp. 773-774, Nov. 2015
|
8 |
eCSIRT, IODEF/IMDEF Solutions, http://www.ecsirt.net/service/products.html
|