Search Results - "Nicol, David M."
-
1
Review of 'Composite synchronization in parallel discrete-event simulation, authors Nicol, David M. and Liu, Jason'
Published in Computing reviews (2003)Get full text
Journal Article -
2
Trust mechanisms for cloud computing
Published in Journal of cloud computing : advances, systems and applications (01-01-2013)“…Trust is a critical factor in cloud computing; in present practice it depends largely on perception of reputation, and self assessment by providers of cloud…”
Get full text
Journal Article -
3
LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems
Published in IEEE transactions on smart grid (01-07-2022)“…The state-of-the-art digital signatures incur undesirable delays, hence are impractical for time-stringent Industrial Control Systems (ICSs). The recent…”
Get full text
Journal Article -
4
Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems
Published in 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2022)“…Evaluation of highly dependable systems requires estimating the probability of a significant rare event under which the system fails to meet the requirement…”
Get full text
Conference Proceeding -
5
SDN Resiliency to Controller Failure in Mobile Contexts
Published in 2019 Winter Simulation Conference (WSC) (01-12-2019)“…Software defined networking (SDN) is a technology for management of computer networks. We are interested in SDNs where the switches are mounted on vehicles,…”
Get full text
Conference Proceeding -
6
Multiscale online media simulation with SocialCube
Published in Computational and mathematical organization theory (01-06-2020)“…This paper describes the design, implementation, and early experiences with a novel agent-based simulator of online media streams, developed under DARPA’s…”
Get full text
Journal Article -
7
Model-based evaluation: from dependability to security
Published in IEEE transactions on dependable and secure computing (01-01-2004)“…The development of techniques for quantitative, model-based evaluation of computer system dependability has a long and rich history. A wide array of…”
Get full text
Journal Article -
8
Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios
Published in 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) (01-11-2015)“…The transformation of traditional power systems to smart grids brings significant benefits, but also exposes the grids to various cyber threats. The recent…”
Get full text
Conference Proceeding -
9
Impacts of application lookahead on distributed network emulation
Published in 2013 Winter Simulations Conference (WSC) (01-12-2013)“…Large-scale and high-fidelity testbeds play critical roles in analyzing large-scale networks such as data centers, cellular networks, and smart grid control…”
Get full text
Conference Proceeding -
10
Smart Grid Network Flows Best Practices Checker
Published in 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) (25-10-2022)“…We describe BPC, an open source tool and a library of best-practice rules for configuration of smart grid communication networks and the flows they carry. We…”
Get full text
Conference Proceeding -
11
Estimating Loss Due to Cyber-Attack in the Presence of Uncertainty
Published in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01-12-2020)“…Cyber-security risk assessment includes estimation of losses possible to a system due to cyber-attacks. As there are uncertain elements to this and as we model…”
Get full text
Conference Proceeding -
12
Composite synchronization in parallel discrete-event simulation
Published in IEEE transactions on parallel and distributed systems (01-05-2002)“…This paper considers a technique for composing global (barrier-style) and local (channel scanning) synchronization protocols within a single parallel…”
Get full text
Journal Article -
13
Security risk assessment for SDN-enabled smart grids
Published in Computer communications (01-01-2019)“…The increasing energy dependence of cloud data centers to Internet-of-Things necessitates availability of high reliable power systems. Smart grid enables…”
Get full text
Journal Article -
14
High-Performance Simulation of Low-Resolution Network Flows
Published in Simulation (San Diego, Calif.) (01-01-2006)“…Simulation of large-scale networks demands that we model some flows at coarser time scales than others, simply to keep the execution cost manageable. This…”
Get full text
Journal Article Conference Proceeding -
15
Fluid stochastic Petri nets : Theory, applications, and solution techniques
Published in European journal of operational research (16-02-1998)“…A new class of stochastic Petri nets is introduced in which one or more places can hold fluid rather than discrete tokens. A class of fluid stochastic Petri…”
Get full text
Journal Article -
16
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version)
Published in Simulation (San Diego, Calif.) (01-01-2006)“…The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being developed to support large-scale network security preparedness and training…”
Get full text
Journal Article Conference Proceeding -
17
The performance impact of BGP security
Published in IEEE network (01-11-2005)“…The border gateway protocol possesses security vulnerabilities, because speakers can lie. Proposed security protocols can address the vulnerabilities, but can…”
Get full text
Journal Article -
18
Evaluation of efficient security for BGP route announcements using parallel simulation
Published in Simulation modelling practice and theory (01-07-2004)“…The Border Gateway Protocol (BGP) determines how Internet traffic is routed throughout the entire world; malicious behavior by one or more BGP speakers could…”
Get full text
Journal Article -
19
The Koobface botnet and the rise of social malware
Published in 2010 5th International Conference on Malicious and Unwanted Software (01-10-2010)“…As millions of users flock to online social networks, sites such as Facebook and Twitter are becoming increasingly attractive targets for spam, phishing, and…”
Get full text
Conference Proceeding -
20
Discrete-event simulation of fluid stochastic Petri nets
Published in IEEE transactions on software engineering (01-03-1999)“…The purpose of this paper is to describe a method for the simulation of the recently introduced fluid stochastic Petri nets. Since such nets result in rather…”
Get full text
Journal Article Conference Proceeding