Using Easel to Depict Network Defense and Attacks

J. Harrison (USA)


attack, destabilize, criminal, network, peer-to-peer, security


This paper briefly discusses the subject of attacking criminal networks and the advantages of using Easel to simulate such attacks. Some preliminary results of an ongoing Easel simulation of such attacks are also provided.

Important Links:

Go Back