Search Results - "Nicol, David M."

Refine Results
  1. 1
  2. 2

    Trust mechanisms for cloud computing by Huang, Jingwei, Nicol, David M

    “…Trust is a critical factor in cloud computing; in present practice it depends largely on perception of reputation, and self assessment by providers of cloud…”
    Get full text
    Journal Article
  3. 3

    LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems by Esiner, Ertem, Tefek, Utku, Erol, Hasan S. M., Mashima, Daisuke, Chen, Binbin, Hu, Yih-Chun, Kalbarczyk, Zbigniew, Nicol, David M.

    Published in IEEE transactions on smart grid (01-07-2022)
    “…The state-of-the-art digital signatures incur undesirable delays, hence are impractical for time-stringent Industrial Control Systems (ICSs). The recent…”
    Get full text
    Journal Article
  4. 4

    Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems by Nguyen, Hoang Hai, Palani, Kartik, Nicol, David M.

    “…Evaluation of highly dependable systems requires estimating the probability of a significant rare event under which the system fails to meet the requirement…”
    Get full text
    Conference Proceeding
  5. 5

    SDN Resiliency to Controller Failure in Mobile Contexts by Nicol, David M., Kumar, Rakesh

    Published in 2019 Winter Simulation Conference (WSC) (01-12-2019)
    “…Software defined networking (SDN) is a technology for management of computer networks. We are interested in SDNs where the switches are mounted on vehicles,…”
    Get full text
    Conference Proceeding
  6. 6

    Multiscale online media simulation with SocialCube by Abdelzaher, Tarek, Han, Jiawei, Hao, Yifan, Jing, Andong, Liu, Dongxin, Liu, Shengzhong, Nguyen, Hoang Hai, Nicol, David M., Shao, Huajie, Wang, Tianshi, Yao, Shuochao, Zhang, Yu, Malik, Omar, Dipple, Stephen, Flamino, James, Buchanan, Fred, Cohen, Sam, Korniss, Gyorgy, Szymanski, Boleslaw K.

    “…This paper describes the design, implementation, and early experiences with a novel agent-based simulator of online media streams, developed under DARPA’s…”
    Get full text
    Journal Article
  7. 7

    Model-based evaluation: from dependability to security by Nicol, D.M., Sanders, W.H., Trivedi, K.S.

    “…The development of techniques for quantitative, model-based evaluation of computer system dependability has a long and rich history. A wide array of…”
    Get full text
    Journal Article
  8. 8

    Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios by Jauhar, Sumeet, Binbin Chen, Temple, William G., Xinshu Dong, Kalbarczyk, Zbigniew, Sanders, William H., Nicol, David M.

    “…The transformation of traditional power systems to smart grids brings significant benefits, but also exposes the grids to various cyber threats. The recent…”
    Get full text
    Conference Proceeding
  9. 9

    Impacts of application lookahead on distributed network emulation by Yuhao Zheng, Dong Jin, Nicol, David M.

    Published in 2013 Winter Simulations Conference (WSC) (01-12-2013)
    “…Large-scale and high-fidelity testbeds play critical roles in analyzing large-scale networks such as data centers, cellular networks, and smart grid control…”
    Get full text
    Conference Proceeding
  10. 10

    Smart Grid Network Flows Best Practices Checker by Nicol, David M., Belovich, Emily, Bohara, Atul

    “…We describe BPC, an open source tool and a library of best-practice rules for configuration of smart grid communication networks and the flows they carry. We…”
    Get full text
    Conference Proceeding
  11. 11

    Estimating Loss Due to Cyber-Attack in the Presence of Uncertainty by Nguyen, Hoang Hai, Nicol, David M.

    “…Cyber-security risk assessment includes estimation of losses possible to a system due to cyber-attacks. As there are uncertain elements to this and as we model…”
    Get full text
    Conference Proceeding
  12. 12

    Composite synchronization in parallel discrete-event simulation by Nicol, D.M., Liu, J.

    “…This paper considers a technique for composing global (barrier-style) and local (channel scanning) synchronization protocols within a single parallel…”
    Get full text
    Journal Article
  13. 13

    Security risk assessment for SDN-enabled smart grids by Maziku, Hellen, Shetty, Sachin, Nicol, David M.

    Published in Computer communications (01-01-2019)
    “…The increasing energy dependence of cloud data centers to Internet-of-Things necessitates availability of high reliable power systems. Smart grid enables…”
    Get full text
    Journal Article
  14. 14

    High-Performance Simulation of Low-Resolution Network Flows by Nicol, David M., Yan, Guanhua

    Published in Simulation (San Diego, Calif.) (01-01-2006)
    “…Simulation of large-scale networks demands that we model some flows at coarser time scales than others, simply to keep the execution cost manageable. This…”
    Get full text
    Journal Article Conference Proceeding
  15. 15

    Fluid stochastic Petri nets : Theory, applications, and solution techniques by HORTON, G, KULKARNI, V. G, NICOL, D. M, TRIVEDI, K. S

    Published in European journal of operational research (16-02-1998)
    “…A new class of stochastic Petri nets is introduced in which one or more places can hold fluid rather than discrete tokens. A class of fluid stochastic Petri…”
    Get full text
    Journal Article
  16. 16

    RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version) by Liljenstam, Michael, Liu, Jason, Nicol, David M., Yuan, Yougu, Yan, Guanhua, Grier, Chris

    Published in Simulation (San Diego, Calif.) (01-01-2006)
    “…The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being developed to support large-scale network security preparedness and training…”
    Get full text
    Journal Article Conference Proceeding
  17. 17

    The performance impact of BGP security by Zhao, M., Smith, S.W., Nicol, D.M.

    Published in IEEE network (01-11-2005)
    “…The border gateway protocol possesses security vulnerabilities, because speakers can lie. Proposed security protocols can address the vulnerabilities, but can…”
    Get full text
    Journal Article
  18. 18

    Evaluation of efficient security for BGP route announcements using parallel simulation by Nicol, David M, Smith, Sean W, Zhao, Meiyuan

    Published in Simulation modelling practice and theory (01-07-2004)
    “…The Border Gateway Protocol (BGP) determines how Internet traffic is routed throughout the entire world; malicious behavior by one or more BGP speakers could…”
    Get full text
    Journal Article
  19. 19

    The Koobface botnet and the rise of social malware by Thomas, K, Nicol, D M

    “…As millions of users flock to online social networks, sites such as Facebook and Twitter are becoming increasingly attractive targets for spam, phishing, and…”
    Get full text
    Conference Proceeding
  20. 20

    Discrete-event simulation of fluid stochastic Petri nets by Ciardo, G., Nicol, D.M., Trivedi, K.S.

    Published in IEEE transactions on software engineering (01-03-1999)
    “…The purpose of this paper is to describe a method for the simulation of the recently introduced fluid stochastic Petri nets. Since such nets result in rather…”
    Get full text
    Journal Article Conference Proceeding