Simulations of Attacks