Now 279 visitors
Today:138 Yesterday:382
Total: 1119 413S 88P 97R
2026-04-18, Week 16
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20220359 Question.4
Questioner: tomayoon@ieee.org    2022-02-14 ¿ÀÈÄ 4:32:51
IEEE/ICACT20220359 Answer.4
Answer by Auhor shyoon17@korea.ac.kr   2022-02-14 ¿ÀÈÄ 4:32:51
First of all, thank you for the good research paper and presentation contents. I would like to know more about the research environment used in this study, and also in detail about the equipment & operating systems, development languages and software libraries you used. Zombie PC was used to simulate the attack, and os used Linux. In addition, the language used to implement the simulation was implemented using C, python.

Select Voice