skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: HPC Annual Report: Emulytics.

Abstract

Networked Information Technology systems play a key role supporting critical government, military, and private computer installations. Many of today's critical infrastructure systems have strong dependencies on secure information exchange among geographically dispersed facilities. As operations become increasingly dependent on the information exchange they also become targets for exploitation. The need to protect data and defend these systems from external attack has become increasingly vital while the nature of the threats has become sophisticated and pervasive making the challenges daunting. Enter Emulytics.

Authors:
 [1];  [1];  [1]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE National Nuclear Security Administration (NNSA)
OSTI Identifier:
1405065
Report Number(s):
SAND-2017-11363R
657959
DOE Contract Number:
AC04-94AL85000
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Crussell, Jonathan, Boote, Jeffrey W., and Fritz, David Jakob. HPC Annual Report: Emulytics.. United States: N. p., 2017. Web. doi:10.2172/1405065.
Crussell, Jonathan, Boote, Jeffrey W., & Fritz, David Jakob. HPC Annual Report: Emulytics.. United States. doi:10.2172/1405065.
Crussell, Jonathan, Boote, Jeffrey W., and Fritz, David Jakob. 2017. "HPC Annual Report: Emulytics.". United States. doi:10.2172/1405065. https://www.osti.gov/servlets/purl/1405065.
@article{osti_1405065,
title = {HPC Annual Report: Emulytics.},
author = {Crussell, Jonathan and Boote, Jeffrey W. and Fritz, David Jakob},
abstractNote = {Networked Information Technology systems play a key role supporting critical government, military, and private computer installations. Many of today's critical infrastructure systems have strong dependencies on secure information exchange among geographically dispersed facilities. As operations become increasingly dependent on the information exchange they also become targets for exploitation. The need to protect data and defend these systems from external attack has become increasingly vital while the nature of the threats has become sophisticated and pervasive making the challenges daunting. Enter Emulytics.},
doi = {10.2172/1405065},
journal = {},
number = ,
volume = ,
place = {United States},
year = 2017,
month =
}

Technical Report:

Save / Share: