YEONG-SUNG LINChen, P.-Y.P.-Y.Chen2020-02-112020-02-112012https://scholars.lib.ntu.edu.tw/handle/123456789/457466One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender so as to minimize the cost of networking operation. Here, by transforming with the mathematical technique and applying the algorithm, gradient method and a proposed heuristic, to optimally solve it. © 2012 IEEE.defense; Internet security; network attack; network optimization; network survivability; resource allocation; vulnerability analysis[SDGs]SDG16defense; Internet security; Network attack; Network optimization; Network survivability; Vulnerability analysis; Algorithms; Computer aided network analysis; Computer crime; Engineering education; Gradient methods; Mathematical programming; Resource allocation; Scaffolds; Students; Network securityA tutorial on evaluation of network survivability under sophisticated attackerconference paper10.1109/TALE.2012.63603192-s2.0-84871496293https://www.scopus.com/inward/record.uri?eid=2-s2.0-84871496293&doi=10.1109%2fTALE.2012.6360319&partnerID=40&md5=4c71e1c0e32a63dfcc759920684d59ee