1st International ICST Workshop on Secure and Multimodal Pervasive Enviroments

Research Article

Verification Method of Network Simulation for Pervasive Environments

  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550323,
        author={Kyuhyung Cho and Jongsung Lee and Jongin Lim and Jongsub Moon},
        title={Verification Method of Network Simulation for Pervasive Environments},
        proceedings={1st International ICST Workshop on Secure and Multimodal Pervasive Enviroments},
        publisher={IEEE},
        proceedings_a={SMPE},
        year={2008},
        month={6},
        keywords={Security  Simulation  Traffic  Worm  compare  modeling},
        doi={10.1109/SECCOM.2007.4550323}
    }
    
  • Kyuhyung Cho
    Jongsung Lee
    Jongin Lim
    Jongsub Moon
    Year: 2008
    Verification Method of Network Simulation for Pervasive Environments
    SMPE
    IEEE
    DOI: 10.1109/SECCOM.2007.4550323
Kyuhyung Cho1,*, Jongsung Lee1,*, Jongin Lim1,*, Jongsub Moon1,*
  • 1: CIST, Korea University Seoul, Korea
*Contact email: mathbank@korea.ac.kr, airforcy@korea.ac.kr, jilim@korea.ac.kr, jsmoon@korea.ac.kr

Abstract

The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.