Using Easel to Depict Network Defense and Attacks

J. Harrison (USA)

Keywords

attack, destabilize, criminal, network, peer-to-peer, security

Abstract

This paper briefly discusses the subject of attacking criminal networks and the advantages of using Easel to simulate such attacks. Some preliminary results of an ongoing Easel simulation of such attacks are also provided.

Important Links:



Go Back