{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:40:34Z","timestamp":1726000834924},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2013]]},"DOI":"10.1109\/surv.2012.0601112.00185","type":"journal-article","created":{"date-parts":[[2012,10,16]],"date-time":"2012-10-16T19:29:28Z","timestamp":1350415768000},"page":"929-942","source":"Crossref","is-referenced-by-count":45,"title":["On the Use of Emulab Testbeds for Scientifically Rigorous Experiments"],"prefix":"10.1109","volume":"15","author":[{"given":"Christos","family":"Siaterlis","sequence":"first","affiliation":[]},{"given":"Andres Perez","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Bela","family":"Genge","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2005.60"},{"key":"ref10","first-page":"4:1","article-title":"Fidelity of network simulation and emulation: A case study of tcp-targeted denial of service attacks","volume":"19","author":"chertov","year":"2009","journal-title":"ACM Trans Model Comput Simul"},{"key":"ref11","article-title":"Emulab tutorial","year":"2008","journal-title":"Emulab"},{"key":"ref12","article-title":"Emulab tutorial - a more advanced example","author":"chertov","year":"2010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24864-1_12"},{"key":"ref14","article-title":"The network simulator - ns-2","year":"2012","journal-title":"ISI"},{"key":"ref15","article-title":"Emulab - testbed ns command extensions","year":"2012","journal-title":"Emulab"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2010.74"},{"key":"ref18","article-title":"Iperf: The TCP\/UDP bandwidth measurement tool","year":"2012","journal-title":"NLANR\/DAST"},{"key":"ref19","article-title":"TCPReplay tool","author":"turner","year":"2012"},{"key":"ref28","first-page":"4","article-title":"The heisenberg measuring uncertainty in lightweight virtualization testbeds","author":"jia","year":"2009","journal-title":"Proc 2nd conference on Cyber security experimentation and test ser CSET'09"},{"key":"ref4","article-title":"Emulab bibliography","year":"2012","journal-title":"Emulab"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/956981.956988"},{"key":"ref3","first-page":"1","article-title":"Smart grid - the new and improved power grid: A survey","author":"fang","year":"2011","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/844128.844152","article-title":"An integrated experimental environment for distributed systems and networks","volume":"36","author":"white","year":"2002","journal-title":"SIGOPS Oper Syst Rev"},{"key":"ref29","first-page":"295-301","article-title":"Practical Nonparametric Statistics","author":"conover","year":"1971"},{"key":"ref5","first-page":"1","article-title":"A survey of software tools for the creation of networked testbeds","volume":"4","author":"siaterlis","year":"2010","journal-title":"International Journal on Advances in Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.73"},{"key":"ref7","article-title":"DETER. cyber-DEfense Technology Experimental Research laboratory Testbed","year":"2012","journal-title":"Deter"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162766"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2006.1662391"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/944773.944783","article-title":"Tcpivo: A high-performance packet replay engine","author":"chang feng","year":"2003","journal-title":"Proceedings of the ACM SIGCOMM Workshop on Models"},{"key":"ref22","year":"2007"},{"key":"ref21","article-title":"Tcpdump: Traffic analyzer","year":"2012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020830"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1140086.1140094"},{"key":"ref26","article-title":"WIDE-TRANSIT 150 Megabit Ethernet Trace 2008– pp. 03–18 (Anonymized) (collection)","author":"cho","year":"2012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764876"}],"container-title":["IEEE Communications Surveys & Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9739\/6512259\/06226792.pdf?arnumber=6226792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:53Z","timestamp":1642004753000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6226792\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":30,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/surv.2012.0601112.00185","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}