J. Harrison (USA)
attack, destabilize, criminal, network, peer-to-peer, security
This paper briefly discusses the subject of attacking criminal networks and the advantages of using Easel to simulate such attacks. Some preliminary results of an ongoing Easel simulation of such attacks are also provided.
Important Links:
Go Back