{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:59:28Z","timestamp":1725343168643},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076752","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["The science of cyber security experimentation"],"prefix":"10.1145","author":[{"given":"Terry","family":"Benzel","sequence":"first","affiliation":[{"name":"USC Information Sciences Institute, Admiralty Way, Marina del Rey, CA"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.30"},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE HST 2010 Conf","author":"Cyber Security Experimentation The DETER","year":"2010","unstructured":"The DETER Project - Advancing the Science of Cyber Security Experimentation and Test. Terry Benzel, Jelena Mirkovic, et al . IEEE HST 2010 Conf , Boston, MA , November 2010 . The DETER Project - Advancing the Science of Cyber Security Experimentation and Test. Terry Benzel, Jelena Mirkovic, et al. IEEE HST 2010 Conf, Boston, MA, November 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.70"},{"key":"e_1_3_2_1_4_1","volume-title":"Network Associates Laboratories Report","author":"Justification","year":"2002","unstructured":"Justification and Requirements for a National DDoS Defense Technology Evaluation Facility. W. Hardaker, D. Kindred, R. Ostrenga, D. Sterne, R. Thomas , Network Associates Laboratories Report , July 26, 2002 . Justification and Requirements for a National DDoS Defense Technology Evaluation Facility. W. Hardaker, D. Kindred, R. Ostrenga, D. Sterne, R. Thomas, Network Associates Laboratories Report, July 26, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971646"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029628"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029630"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029215"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of Tridentcom","author":"Testbeds A Federated Experiment","year":"2009","unstructured":"A Federated Experiment Environment for Emulab-based Testbeds . T. Faber and J. Wroclawski , in Proceedings of Tridentcom , 2009 . A Federated Experiment Environment for Emulab-based Testbeds. T. Faber and J. Wroclawski, in Proceedings of Tridentcom, 2009."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test","author":"SEER","year":"2007","unstructured":"SEER : A Security Experimentation EnviRonment for DETER. Stephen Schwab, Brett Wilson, Calvin Ko, and Alefiya Hussain , in Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test , August 2007 . SEER: A Security Experimentation EnviRonment for DETER. Stephen Schwab, Brett Wilson, Calvin Ko, and Alefiya Hussain, in Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007."},{"key":"e_1_3_2_1_11_1","unstructured":"Emulab Testbed Web site http:\/\/www.emulab.net Emulab Testbed Web site http:\/\/www.emulab.net"},{"key":"e_1_3_2_1_12_1","unstructured":"DeterLab Testbed wiki https:\/\/trac.deterlab.net\/wiki\/Topologies DeterLab Testbed wiki https:\/\/trac.deterlab.net\/wiki\/Topologies"},{"key":"e_1_3_2_1_13_1","volume-title":"Sonia Fahmy and Jelena Mirkovic. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test","author":"Methodology S Experiment","year":"2006","unstructured":"DDo S Experiment Methodology . Alefiya Hussain , Stephen Schwab , Roshan Thomas , Sonia Fahmy and Jelena Mirkovic. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test , June 2006 . DDoS Experiment Methodology. Alefiya Hussain, Stephen Schwab, Roshan Thomas, Sonia Fahmy and Jelena Mirkovic. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, June 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060313"},{"key":"e_1_3_2_1_15_1","unstructured":"Operating System Support for Planetary-Scale Network Services. A. Bavier M. Bowman B. Chun D. Culler S. Karlin S. Muir L. Peterson T. Roscoe T. Spalink and M. Wawrzoniak. (NSDI '04) May 200 Operating System Support for Planetary-Scale Network Services. A. Bavier M. Bowman B. Chun D. Culler S. Karlin S. Muir L. Peterson T. Roscoe T. Spalink and M. Wawrzoniak. ( NSDI '04 ) May 200"},{"key":"e_1_3_2_1_16_1","unstructured":"Larry Peterson John Wroclawski (Eds) \"Overview of the GENI Architecture \" GENI Design Document 06--11 Facility Architecture Working Group September 2006 Larry Peterson John Wroclawski (Eds) \"Overview of the GENI Architecture \" GENI Design Document 06--11 Facility Architecture Working Group September 2006"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of SPIE ITCom","year":"2002","unstructured":"Bench-style Network Research in an Internet Instance Laboratory. Paul Barford, Larry Landweber , in Proceedings of SPIE ITCom , Boston, MA , August , 2002 . Bench-style Network Research in an Internet Instance Laboratory. Paul Barford, Larry Landweber, in Proceedings of SPIE ITCom, Boston, MA, August, 2002."},{"key":"e_1_3_2_1_18_1","volume-title":"Robert Braden. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test","author":"Malware A Plan","year":"2007","unstructured":"A Plan for Malware Containment in the DETER Testbed. Ron Ostrenga and Stephen Schwab , Robert Braden. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test , August 2007 A Plan for Malware Containment in the DETER Testbed. Ron Ostrenga and Stephen Schwab, Robert Braden. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_20_1","volume-title":"April","author":"Risky Cybersecurity Experiment Management A Two-Constraint","year":"2008","unstructured":"A Two-Constraint Approach to Risky Cybersecurity Experiment Management . J. Wroclawski , J. Mirkovic , T. Faber and S. Schwab , Invited paper at the Sarnoff Symposium , April 2008 . A Two-Constraint Approach to Risky Cybersecurity Experiment Management. J. Wroclawski, J. Mirkovic, T. Faber and S. Schwab, Invited paper at the Sarnoff Symposium, April 2008."},{"key":"e_1_3_2_1_21_1","unstructured":"Building Apparatus for Multi-resolution Networking Experiments Using Containers. Ted Faber Mike Ryan and John Wroclawski in submission. Building Apparatus for Multi-resolution Networking Experiments Using Containers. Ted Faber Mike Ryan and John Wroclawski in submission."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060315"},{"key":"e_1_3_2_1_23_1","volume-title":"Practical Eclipse Rich Client Platform Projects","year":"2009","unstructured":"Practical Eclipse Rich Client Platform Projects ( 1 st ed.). Vladimir Silva (11 March 2009 ). Apress. p. 352. ISBN 1430218274. Practical Eclipse Rich Client Platform Projects (1st ed.). Vladimir Silva (11 March 2009). Apress. p. 352. ISBN 1430218274.","edition":"1"},{"key":"e_1_3_2_1_24_1","volume-title":"Clifford Neuman and Kymie Tan, to appear in Proceedings of the 2nd International Conference on Smart Grid Communications","author":"Cyber Mediating","year":"2011","unstructured":"Mediating Cyber and Physical Threat Propagation in Secure Smart Grid Architectures . Clifford Neuman and Kymie Tan, to appear in Proceedings of the 2nd International Conference on Smart Grid Communications (IEEE SmartGridComm), October 2011 , Brussels . Mediating Cyber and Physical Threat Propagation in Secure Smart Grid Architectures. Clifford Neuman and Kymie Tan, to appear in Proceedings of the 2nd International Conference on Smart Grid Communications (IEEE SmartGridComm), October 2011, Brussels."}],"event":{"name":"ACSAC '11: Annual Computer Security Applications Conference","location":"Orlando Florida USA","acronym":"ACSAC '11","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T17:23:42Z","timestamp":1673717022000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076752"}},"subtitle":["the DETER project"],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":24,"alternative-id":["10.1145\/2076732.2076752","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076752","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}