


Остановите войну!
for scientists:
David M. Nicol
Person information

- affiliation: Dartmouth College, Hanover, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j79]Vignesh Babu, David M. Nicol:
Mechanisms for Precise Virtual Time Advancement in Network Emulation. ACM Trans. Model. Comput. Simul. 32(2): 9:1-9:26 (2022) - 2021
- [j78]David M. Nicol:
Message from IEEE S&P's Outgoing Editor in Chief. IEEE Secur. Priv. 19(1): 10 (2021) - [j77]David M. Nicol
:
The Ransomware Threat to Energy-Delivery Systems. IEEE Secur. Priv. 19(3): 24-32 (2021) - [c166]Nils Ole Tippenhauer, Binbin Chen, Daisuke Mashima, David M. Nicol:
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation. CPSIOTSEC@CCS 2021: 3-14 - 2020
- [j76]Tarek F. Abdelzaher
, Jiawei Han, Yifan Hao, Andong Jing, Dongxin Liu, Shengzhong Liu, Hoang Hai Nguyen, David M. Nicol, Huajie Shao, Tianshi Wang, Shuochao Yao, Yu Zhang, Omar Malik, Stephen Dipple, James Flamino, Fred Buchanan, Sam Cohen, György Korniss, Boleslaw K. Szymanski:
Multiscale online media simulation with SocialCube. Comput. Math. Organ. Theory 26(2): 145-174 (2020) - [j75]David M. Nicol
:
The Value of Useless Academic Research to the Cyberdefense of Critical Infrastructures. IEEE Secur. Priv. 18(1): 4-7 (2020) - [j74]David M. Nicol
:
In the Petri Dish: Cybersecurity Pushed to the Edge. IEEE Secur. Priv. 18(3): 4-5 (2020) - [j73]Kartik Palani, David M. Nicol:
Optimal Monitoring Strategies for Critical Infrastructure Networks. SIGMETRICS Perform. Evaluation Rev. 47(4): 4-7 (2020) - [c165]Isabella Lee, Vignesh Babu, Matthew Caesar, David M. Nicol:
Deep Reinforcement Learning for UAV-Assisted Emergency Response. MobiQuitous 2020: 327-336 - [c164]Vignesh Babu, David M. Nicol:
Precise Virtual Time Advancement for Network Emulation. SIGSIM-PADS 2020: 175-186 - [c163]Kartik Palani, David M. Nicol:
Hardening Critical Infrastructure Networks Against Attacker Reconnaissance. QEST 2020: 258-275 - [c162]Hoang Hai Nguyen, David M. Nicol:
Estimating Loss Due to Cyber-attack in the Presence of Uncertainty. TrustCom 2020: 361-369 - [i5]Gurcan Comert, Mashrur Chowdhury, David M. Nicol:
Assessment of System-Level Cyber Attack Vulnerability for Connected and Autonomous Vehicles Using Bayesian Networks. CoRR abs/2011.09436 (2020)
2010 – 2019
- 2019
- [j72]Hellen Maziku
, Sachin Shetty
, David M. Nicol:
Security risk assessment for SDN-enabled smart grids. Comput. Commun. 133: 1-11 (2019) - [c161]David M. Nicol
:
Challenges in Quantifying an Adversary's Cyber Access to Critical Infrastructures. CRITIS 2019: 18-28 - [c160]Hoang Hai Nguyen, Kartik Palani, David M. Nicol:
Extensions of Network Reliability Analysis. DSN 2019: 88-99 - [c159]Marco A. Gamarra, Sachin Shetty
, David M. Nicol, Laurent Njilla, Oscar R. González:
Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure. GLOBECOM 2019: 1-7 - [c158]David M. Nicol:
Simulation-based Analysis of Network Rules Matching. SIGSIM-PADS 2019: 49-60 - [c157]Ertem Esiner, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol:
F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid. SmartGridComm 2019: 1-7 - [c156]David M. Nicol, Rakesh Kumar:
SDN Resiliency to Controller Failure in Mobile Contexts. WSC 2019: 2831-2842 - 2018
- [j71]Tarek F. Abdelzaher
, Nora Ayanian
, Tamer Basar
, Suhas N. Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt
, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia
, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava
, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, Venugopal V. Veeravalli:
Toward an Internet of Battlefield Things: A Resilience Perspective. Computer 51(11): 24-36 (2018) - [j70]Jereme Lamps, Vignesh Babu, David M. Nicol, Vladimir Adam, Rakesh Kumar:
Temporal Integration of Emulation and Network Simulators on Linux Multiprocessors. ACM Trans. Model. Comput. Simul. 28(1): 1:1-1:25 (2018) - [c155]Marco A. Gamarra, Sachin Shetty
, David M. Nicol, Oscar Gonazlez, Charles A. Kamhoua, Laurent Njilla:
Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs. ICC 2018: 1-7 - [c154]Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas N. Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava
, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, Venugopal V. Veeravalli:
Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield IoT. ICDCS 2018: 1129-1138 - [c153]Rakesh Kumar, Vignesh Babu, David M. Nicol:
Network Coding for Critical Infrastructure Networks. ICNP 2018: 436-437 - [c152]David M. Nicol:
Cyber Risk of Coordinated Attacks in Critical Infrastructures. WSC 2018: 2759-2768 - [c151]Vignesh Babu, David M. Nicol:
On Repeatable Emulation in Virtual Testbeds. WSC 2018: 3813-3824 - [i4]Rakesh Kumar, Vignesh Babu, David M. Nicol:
Network Coding for Critical Infrastructure Networks. CoRR abs/1809.09487 (2018) - 2017
- [j69]Jingwei Huang, David M. Nicol:
An anatomy of trust in public key infrastructure. Int. J. Crit. Infrastructures 13(2/3): 238-258 (2017) - [c150]Hoang Hai Nguyen, Kartik Palani, David M. Nicol:
An Approach to Incorporating Uncertainty in Network Security Analysis. HotSoS 2017: 74-84 - [c149]David M. Nicol:
A Performance Model of Composite Synchronization. SIGSIM-PADS 2017: 89-96 - [c148]Richard M. Fujimoto, Rajive L. Bagrodia, Randal E. Bryant, K. Mani Chandy, David R. Jefferson, Jayadev Misra, David M. Nicol, Brian W. Unger:
Parallel discrete event simulation: The making of a field. WSC 2017: 262-291 - [c147]Vignesh Babu, Rakesh Kumar, Hoang Hai Nguyen, David M. Nicol, Kartik Palani, Elizabeth Reed:
Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid. WSC 2017: 1061-1072 - 2016
- [j68]Jun Ho Huh, Rakesh B. Bobba
, Tom Markham, David M. Nicol, Julie Hull, Alexander Chernoguzov, Himanshu Khurana, Kevin Staggs, Jingwei Huang:
Next-Generation Access Control for Distributed Control Systems. IEEE Internet Comput. 20(5): 28-37 (2016) - [c146]David M. Nicol:
Risk Assessment of Cyber Access to Physical Infrastructure in Cyber-Physical Systems. CPSS@AsiaCCS 2016: 1-2 - [c145]Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer
, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. GraMSec@CSF 2016: 39-61 - [c144]Prashant Anantharaman, Kartik Palani, David M. Nicol, Sean W. Smith:
I Am Joe's Fridge: Scalable Identity in the Internet of Things. iThings/GreenCom/CPSCom/SmartData 2016: 129-135 - [c143]David M. Nicol, Rakesh Kumar:
Efficient Monte Carlo Evaluation of SDN Resiliency. SIGSIM-PADS 2016: 143-152 - [c142]Gabriel A. Weaver, Kate Davis
, Charles M. Davis, Edmond J. Rogers, Rakesh B. Bobba
, Saman A. Zonouz, Robin Berthier, Peter W. Sauer, David M. Nicol:
Cyber-Physical models for power grid security analysis: 8-substation case. SmartGridComm 2016: 140-146 - [c141]Rakesh Kumar, David M. Nicol:
Validating resiliency in Software Defined Networks for smart grids. SmartGridComm 2016: 441-446 - [c140]Vignesh Babu, David M. Nicol:
Emulation/simulation of PLC networks with the S3F network simulator. WSC 2016: 1475-1486 - 2015
- [j67]Dong (Kevin) Jin, David M. Nicol:
Parallel Simulation and Virtual-Machine-Based Emulation of Software-Defined Networks. ACM Trans. Model. Comput. Simul. 26(1): 8:1-8:27 (2015) - [c139]Jereme Lamps, Vladimir Adam, David M. Nicol, Matthew Caesar:
Conjoining Emulation and Network Simulators on Linux Multiprocessors. SIGSIM-PADS 2015: 113-124 - [c138]Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios. PRDC 2015: 319-324 - [c137]Vignesh Babu, David M. Nicol:
Detection of x86 malware in AMI data payloads. SmartGridComm 2015: 617-622 - [e3]David M. Nicol:
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015. ACM 2015, ISBN 978-1-4503-3376-4 [contents] - 2014
- [j66]Sean Peisert
, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall:
Designed-in Security for Cyber-Physical Systems. IEEE Secur. Priv. 12(5): 9-12 (2014) - [j65]Dong (Kevin) Jin, Yuhao Zheng, David M. Nicol:
A parallel network simulation and virtual time-based network emulation testbed. J. Simulation 8(3): 206-214 (2014) - [c136]Jingwei Huang, David M. Nicol, Roy H. Campbell:
Denial-of-Service Threat to Hadoop/YARN Clusters with Multi-tenancy. BigData Congress 2014: 48-55 - [c135]Jingwei Huang, Zbigniew T. Kalbarczyk, David M. Nicol:
Knowledge Discovery from Big Data for Intrusion Detection Using LDA. BigData Congress 2014: 760-761 - [c134]Alefiya Hussain, Ted Faber, Robert Braden, Terry V. Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz
, Laura Tinnel:
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems. DCOSS 2014: 358-360 - [c133]Jingwei Huang
, David M. Nicol:
Evidence-based trust reasoning. HotSoS 2014: 17 - [c132]Jereme Lamps, David M. Nicol, Matthew Caesar:
TimeKeeper: a lightweight virtual time system for linux. SIGSIM-PADS 2014: 179-186 - [c131]Nils Ole Tippenhauer
, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. PRDC 2014: 33-42 - [c130]An Hoa Vu, Nils Ole Tippenhauer
, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk:
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems. QEST 2014: 384-387 - [c129]David M. Nicol, Lawrence M. Leemis:
A continuous piecewise-linear NHPP intensity function estimator. WSC 2014: 498-509 - [c128]David M. Nicol, Vikas Mallapura:
Modeling and analysis of stepping stone attacks. WSC 2014: 3036-3047 - [e2]Laurie A. Williams, David M. Nicol, Munindar P. Singh:
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014. ACM 2014, ISBN 978-1-4503-2907-1 [contents] - [i3]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. CoRR abs/1405.7475 (2014) - 2013
- [j64]Jingwei Huang, David M. Nicol:
Trust mechanisms for cloud computing. J. Cloud Comput. 2: 9 (2013) - [c127]Incheol Shin, Jun Ho Huh, Yuseok Jeon, David M. Nicol:
A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery. SEGS@CCS 2013: 35-40 - [c126]Timothy M. Yardley, Robin Berthier, David M. Nicol, William H. Sanders:
Smart grid protocol testing through cyber-physical testbeds. ISGT 2013: 1-6 - [c125]Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer
, An Hoa Vu, David K. Y. Yau:
Go with the flow: toward workflow-oriented security assessment. NSPW 2013: 65-76 - [c124]Dong (Kevin) Jin, David M. Nicol:
Parallel simulation of software defined networks. SIGSIM-PADS 2013: 91-102 - [c123]Simon J. E. Taylor
, Osman Balci, Wentong Cai
, Margaret L. Loper, David M. Nicol, George F. Riley:
Grand challenges in modeling and simulation: expanding our horizons. SIGSIM-PADS 2013: 403-408 - [c122]Younghee Park, David M. Nicol, Huaiyu Zhu, Cheol Won Lee:
Prevention of malware propagation in AMI. SmartGridComm 2013: 474-479 - [c121]Yuhao Zheng, Dong (Kevin) Jin, David M. Nicol:
Impacts of application lookahead on distributed network emulation. WSC 2013: 2996-3007 - 2012
- [j63]Yuhao Zheng, David M. Nicol, Dong (Kevin) Jin, Naoki Tanaka:
A virtual time system for virtualization-based network emulations and simulations. J. Simulation 6(3): 205-213 (2012) - [c120]Shehla S. Rana, Huaiyu Zhu, Cheol Won Lee, David M. Nicol, Incheol Shin:
The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22. GLOBECOM Workshops 2012: 1514-1519 - [c119]Thomas D. Nicol, David M. Nicol:
Combating Unauthorized Load Signal Analysis with Targeted Event Masking. HICSS 2012: 2037-2043 - [c118]David M. Nicol:
Scaling issues for NERC CIP electronic security perimeter compliance assessment (extended abstract). ISGT 2012: 1 - [c117]Jingwei Huang, David M. Nicol:
Security and provenance in M3GS for cross-domain information sharing. MILCOM 2012: 1-6 - [c116]Dong (Kevin) Jin, Yuhao Zheng, Huaiyu Zhu, David M. Nicol, Lenhard Winterrowd:
Virtual Time Integration of Emulation and Parallel Simulation. PADS 2012: 201-210 - [c115]Jingwei Huang, David M. Nicol, Rakesh Bobba
, Jun Ho Huh:
A framework integrating attribute-based policies into role-based access control. SACMAT 2012: 187-196 - [c114]David M. Nicol:
Exploiting Uncertainty and Error to Accelerate Simulations. SIMULTECH 2012 - [c113]Yuhao Zheng, Dong (Kevin) Jin, David M. Nicol:
Validation of application behavior on a virtual time integrated network emulation testbed. WSC 2012: 246:1-246:12 - 2011
- [j62]David M. Nicol, Michael Huth:
Message from the program chairs. Perform. Evaluation 68(2): 89 (2011) - [c112]Yuhao Zheng, David M. Nicol:
A Virtual Time System for OpenVZ-Based Network Emulations. PADS 2011: 1-10 - [c111]Dong (Kevin) Jin, David M. Nicol, Guanhua Yan:
An event buffer flooding attack in DNP3 controlled SCADA systems. WSC 2011: 2619-2631 - [c110]David M. Nicol, Dong (Kevin) Jin, Yuhao Zheng:
S3F: the Scalable Simulation Framework revisited. WSC 2011: 3288-3299 - 2010
- [b1]Jerry Banks, John S. Carson II, Barry L. Nelson, David M. Nicol:
Discrete-Event System Simulation, 5th New Internatinal Edition. Pearson Education 2010, ISBN 978-1-292-02437-0, pp. I-II, 1-559 - [j61]Jingwei Huang
, David M. Nicol:
A Formal-Semantics-Based Calculus of Trust. IEEE Internet Comput. 14(5): 38-46 (2010) - [c109]Suraj Nellikar, David M. Nicol, Jai J. Choi:
Role-based differentiation for insider detection algorithms. Insider Threats@CCS 2010: 55-62 - [c108]David M. Nicol:
Securing the perimeter: challenges in enforcing global access control. CSIIRW 2010: 7 - [c107]David M. Nicol, William H. Sanders, Mouna Seri, Sankalp Singh:
Experiences Validating the Access Policy Tool in Industrial Settings. HICSS 2010: 1-8 - [c106]Kurt Thomas, David M. Nicol:
The Koobface botnet and the rise of social malware. MALWARE 2010: 63-70 - [c105]Yuhao Zheng, David M. Nicol:
Validation of Radio Channel Models Using an Anechoic Chamber. PADS 2010: 114-121 - [c104]Dong (Kevin) Jin, David M. Nicol, Matthew Caesar:
Efficient Gigabit Ethernet Switch Models for Large-Scale Simulation. PADS 2010: 122-131 - [c103]Kurt Thomas, Chris Grier, David M. Nicol:
unFriendly: Multi-party Privacy Risks in Social Networks. Privacy Enhancing Technologies 2010: 236-252 - [c102]Tanmay Khirwadkar, Kien C. Nguyen, David M. Nicol, Tamer Basar:
Methodologies for evaluating game theoretic defense against DDoS attacks. WSC 2010: 697-707 - [c101]Dong (Kevin) Jin, David M. Nicol:
Fast simulation of background traffic through Fair Queueing networks. WSC 2010: 2935-2946
2000 – 2009
- 2009
- [j60]Hamed Okhravi, David M. Nicol:
Application of trusted network technology to industrial control networks. Int. J. Crit. Infrastructure Prot. 2(3): 84-94 (2009) - [j59]David M. Nicol, Charles M. Davis, Thomas J. Overbye
:
A testbed for power system security evaluation. Int. J. Inf. Comput. Secur. 3(2): 114-131 (2009) - [j58]David M. Nicol, Nabil Schear:
Models of Privacy Preserving Traffic Tunneling. Simul. 85(9): 589-607 (2009) - [c100]Hamed Okhravi, David M. Nicol:
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems. ACSAC 2009: 254-265 - [c99]Jingwei Huang, David M. Nicol:
A calculus of trust and its application to PKI and identity management. IDtrust 2009: 23-37 - [c98]Hamed Okhravi, Ryan H. Kagin, David M. Nicol:
PolicyGlobe: a framework for integrating network and operating system security policies. SafeConfig 2009: 53-62 - [c97]David C. Bergman, Dong (Kevin) Jin, David M. Nicol, Tim Yardley:
The Virtual Power System Testbed and Inter-Testbed Integration. CSET 2009 - [c96]Md. Yusuf Sarwar Uddin
, David M. Nicol, Tarek F. Abdelzaher, Robin Kravets:
A Post-disaster Mobility Model for Delay Tolerant Networking. WSC 2009: 2785-2796 - 2008
- [j57]David M. Nicol, William H. Sanders, Sankalp Singh, Mouna Seri:
Usable Global Network Access Policy for Process Control Systems. IEEE Secur. Priv. 6(6): 30-36 (2008) - [j56]David M. Nicol:
Efficient simulation of Internet worms. ACM Trans. Model. Comput. Simul. 18(2): 5:1-5:32 (2008) - [c95]Hamed Okhravi, David M. Nicol:
Applying Trusted Network Technology To Process Control Systems. Critical Infrastructure Protection 2008: 57-70 - [c94]Nabil Schear, David M. Nicol:
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows. PADS 2008: 80-87 - [c93]David M. Nicol:
Performance analysis of real traffic carried with encrypted cover flows: Invited talk 2. SpringSim 2008: 827 - 2007
- [c92]Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich:
Securing Current and Future Process Control Systems. Critical Infrastructure Protection 2007: 99-115 - [c91]David M. Nicol:
Analysis of Local Address Scanning by Puppetnets. QEST 2007: 259-268 - [c90]David M. Nicol, Steve Hanna, Frank Stratton, William H. Sanders:
Modeling and analysis of worm defense using stochastic activity networks. SpringSim (3) 2007: 349-355 - 2006
- [j55]David M. Nicol, Guanhua Yan:
High-Performance Simulation of Low-Resolution Network Flows. Simul. 82(1): 21-42 (2006) - [j54]Michael Liljenstam, Jason Liu
, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simul. 82(1): 43-59 (2006) - [c89]David M. Nicol:
The impact of stochastic variance on worm propagation and detection. WORM 2006: 57-64 - [c88]David M. Nicol, Rose Tsang, Heidi R. Ammerlahn, Michael M. Johnson:
Detection of nuclear material at border crossings using motion correlation. WSC 2006: 536-544 - [e1]David M. Nicol, Corrado Priami, Hanne Riis Nielson, Adelinde M. Uhrmacher:
Simulation and Verification of Dynamic Systems, 17.04. - 22.04.2006. Dagstuhl Seminar Proceedings 06161, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2006 [contents] - [i2]David M. Nicol, Corrado Priami, Hanne Riis Nielson, Adelinde M. Uhrmacher:
06161 Abstracts Collection -- Simulation and Verification of Dynamic Systems. Simulation and Verification of Dynamic Systems 2006 - [i1]Hanne Riis Nielson, David M. Nicol, Corrado Priami, Adelinde M. Uhrmacher:
06161 Executive Summary -- Simulation and Verification of Dynamic Systems. Simulation and Verification of Dynamic Systems 2006 - 2005
- [j53]David M. Nicol:
Modeling and Simulation in Security Evaluation. IEEE Secur. Priv. 3(5): 71-74 (2005) - [j52]Meiyuan Zhao, Sean W. Smith, David M. Nicol:
The performance impact of BGP security. IEEE Netw. 19(6): 42-48 (2005) - [j51]David M. Nicol:
Optimized pre-copy calibration of hard drives. SIGMETRICS Perform. Evaluation Rev. 33(2): 9-11 (2005) - [j50]Jason Liu
, Yougu Yuan, David M. Nicol, Robert S. Gray, Calvin C. Newport, David Kotz
, Luiz Felipe Perrone
:
Empirical Validation of Wireless Models in Simulations of Ad Hoc Routing Protocols. Simul. 81(4): 307-323 (2005) - [c87]Meiyuan Zhao, Sean W. Smith, David M. Nicol:
Aggregated path authentication for efficient BGP security. CCS 2005: 128-138 - [c86]David M. Nicol, Michael Liljenstam:
Models and Analysis of Active Worm Defense. MMM-ACNS 2005: 38-53 - [c85]Michael Liljenstam, Jason Liu
, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises. PADS 2005: 119-128 - [c84]David M. Nicol, Guanhua Yan:
Simulation of Network Traffic at Coarse Timescales. PADS 2005: 141-150 - [c83]David M. Nicol, Michael Liljenstam, Jason Liu
:
Advanced concepts in large-scale network simulation. WSC 2005: 153-166 - [c82]David M. Nicol, Hamed Okhravi:
Performance analysis of binary code protection. WSC 2005: 601-610 - 2004
- [j49]