{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:03:48Z","timestamp":1768410228690,"version":"3.49.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319203751","type":"print"},{"value":"9783319203768","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_17","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"190-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environment"],"prefix":"10.1007","author":[{"given":"Zdenek","family":"Eichler","sequence":"first","affiliation":[]},{"given":"Radek","family":"O\u0161lej\u0161ek","sequence":"additional","affiliation":[]},{"given":"Dalibor","family":"Toth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"4","key":"17_CR1","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s11416-006-0033-x","volume":"2","author":"A Arnes","year":"2007","unstructured":"Arnes, A., Haas, P., Vigna, G., Kemmerer, R.A.: Using a virtual security testbed for digital forensic reconstruction. J. Comput. Virol. 2(4), 275\u2013289 (2007)","journal-title":"J. Comput. Virol."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Benzel, T.: The science of cyber security experimentation: the deter project. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 137\u2013148. ACM, New York (2011)","DOI":"10.1145\/2076732.2076752"},{"key":"17_CR3","unstructured":"Chen, L.: Construction of the new generation network security testbed-Testbed@ TWISC: integration and implementation on software aspect. Institute of Computer and Communication, National Cheng Kung University, Tainan (2008)"},{"key":"17_CR4","unstructured":"Duchamp, D., de Angelis, G.: A hypervisor based security testbed. In: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, DETER, Berkeley. USENIX Association (2007)"},{"issue":"4","key":"17_CR5","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1109\/COMST.2014.2321898","volume":"16","author":"R Hofstede","year":"2014","unstructured":"Hofstede, R., Celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A.: Flow monitoring explained: from packet capture to data analysis with Netflow and IPFIX. IEEE Commun. Surv. Tutor. 16(4), 2037\u20132064 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"17_CR6","volume-title":"Proceedings of the Network Operations and Management Symposium (NOMS 2014)","author":"T Jirs\u00edk","year":"2014","unstructured":"Jirs\u00edk, T., Hus\u00e1k, M., \u010celeda, P., Eichler, Z.: Cloud-based security research testbed: a DDoS use case. In: Lutfiyya, H., Cholda, P. (eds.) Proceedings of the Network Operations and Management Symposium (NOMS 2014). IEEE Xplore Digital Library, Krakow (2014)"},{"key":"17_CR7","volume-title":"Proceedings of the Network Operations and Management Symposium (NOMS 2014)","author":"D Kou\u0159il","year":"2014","unstructured":"Kou\u0159il, D., Rebok, T., Jirs\u00edk, T., \u010cegan, J., Dra\u0161ar, M., Vizv\u01cery, M., Vykopal, J.: Cloud-based testbed for simulation of cyber attacks. In: Lutfiyya, H., Cholda, P. (eds.) Proceedings of the Network Operations and Management Symposium (NOMS 2014). IEEE Xplore Digital Library, Krakow (2014)"},{"key":"17_CR8","unstructured":"Krishna, K., Sun, W., Rana, P., Li, T., Sekar, R.: V-NetLab: a cost-effective platform to support course projects in computer security. In: Proceedings of 9th Colloquium for Information Systems Security Education (2005)"},{"issue":"2","key":"17_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MIC.2011.44","volume":"15","author":"D Milojicic","year":"2011","unstructured":"Milojicic, D., Llorente, I.M., Montero, R.S.: OpenNebula: a cloud management tool. IEEE Internet Comput. 15(2), 11\u201314 (2011)","journal-title":"IEEE Internet Comput."},{"key":"17_CR10","unstructured":"Shneiderman, B.: The eyes have it: a task by data type taxonomy for information visualizations. In: Proceedings of the 1996 IEEE Symposium on Visual Languages, VL 1996, pp. 336\u2013343. IEEE Computer Society, Washington (1996)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Van Leeuwen, B., Urias, V., Eldridge, J., Villamarin, C., Olsberg, R.: Performing cyber security analysis using a live, virtual, and constructive (LVC) testbed. In: Military Communications Conference 2010 - MILCOM 2010, pp. 1806\u20131811 (2010)","DOI":"10.1109\/MILCOM.2010.5679522"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-30633-4_21","volume-title":"Dependable Networks and Services","author":"P Velan","year":"2012","unstructured":"Velan, P., Krej\u010d\u00ed, R.: Flow information storage assessment using IPFIXcol. In: Sadre, R., Novotn\u00fd, J., \u010celeda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol. 7279, pp. 155\u2013158. Springer, Heidelberg (2012)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An integrated experimental environment for distributed systems and networks. In: OSDI02, pp. 255\u2013270, ACM, Boston, December 2002","DOI":"10.1145\/844128.844152"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:17:07Z","timestamp":1583507827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}