Verification method of network simulation for pervasive environments

Kyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.

    Original languageEnglish
    Title of host publicationProceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm
    Pages155-161
    Number of pages7
    DOIs
    Publication statusPublished - 2007
    Event3rd International Conference on Security and Privacy in Communication Networks, SecureComm - Nice, France
    Duration: 2007 Sept 172007 Sept 21

    Publication series

    NameProceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm

    Other

    Other3rd International Conference on Security and Privacy in Communication Networks, SecureComm
    Country/TerritoryFrance
    CityNice
    Period07/9/1707/9/21

    Keywords

    • Compare
    • Modeling
    • Security
    • Simulation
    • Traffic
    • Worm

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Software

    Fingerprint

    Dive into the research topics of 'Verification method of network simulation for pervasive environments'. Together they form a unique fingerprint.

    Cite this