07-04-2014, 09:24 AM
Respected Sir,
This is an IEEE published on JULY/AUGUST 2013 by Chun-Jen Chung, Student Member, IEEE, Pankaj Khatkar, Student Member, IEEE,
Tianyi Xing, Student Member, IEEE, Jeongkeun Lee, Member, IEEE, and
Dijiang Huang, Senior Member, IEEE
Sir, i need an implementation of this paper which should be completly done on pure java,i mean jsp or any other web application technologies should not be used.If it is possible add some new algorithms.I am here attaching a base paper of the same. Implementation should include attack graph model which is specified in the base paper with the components NICE A,VM PROFILING,NETWORK CONTROLLER,ATTACK ANALYZER BASED ON THE equations and algorithms specified.Let me know the details in my email id "ngusanjoe@gmail.com" as soon as possible.
Your's Faithfully
Nathaan george
This is an IEEE published on JULY/AUGUST 2013 by Chun-Jen Chung, Student Member, IEEE, Pankaj Khatkar, Student Member, IEEE,
Tianyi Xing, Student Member, IEEE, Jeongkeun Lee, Member, IEEE, and
Dijiang Huang, Senior Member, IEEE
Sir, i need an implementation of this paper which should be completly done on pure java,i mean jsp or any other web application technologies should not be used.If it is possible add some new algorithms.I am here attaching a base paper of the same. Implementation should include attack graph model which is specified in the base paper with the components NICE A,VM PROFILING,NETWORK CONTROLLER,ATTACK ANALYZER BASED ON THE equations and algorithms specified.Let me know the details in my email id "ngusanjoe@gmail.com" as soon as possible.
Your's Faithfully
Nathaan george