22 April 1999
Date: Wed, 21 Apr 1999 08:45:28 -0400 From: firstname.lastname@example.org (Dorothy Denning) Subject: (ai) Simulating Cyber Attacks, Defenses, and Consequences Sender: <email@example.com> From Risks Digest 20.32, April 20, 1999 Date: Tue, 20 Apr 1999 10:33:14 -0700 (PDT) From: Fred Cohen <firstname.lastname@example.org> Subject: New paper on Simulating Cyber Attacks, Defenses, and Consequences This morning, I posted a new paper to the all.net Web site that I think you might be very interested in. It will soon appear in print as an invited paper in "Computers and Security", it will be briefly covered in one of my short presentations at the IEEE Oakland conference, and it will be given in its entirety at the upcoming CSI conference. The paper is titled: "Simulating Cyber Attacks, Defenses, and Consequences" and it can be found at the all.net web site under: Feature Articles: InfoSec Baseline Studies I think that this is one of the most interesting papers I have written in the last two years, and I ask that those of you who are interested in such things take the time to read and comment on it. I thank you for your time. FC Fred Cohen & Associates: http://all.net - email@example.com - tel/fax:925-454-0171 NOTE: In accordance with Title 17 <U.S.C.> Section 107, this material is distributed without profit or payment to those who have expressed a prior interest in receiving this information for non-profit research and educational purposes only. Provided by G2-Forward.