{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:40:37Z","timestamp":1725838837259},"publisher-location":"Cham","reference-count":4,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260952"},{"type":"electronic","value":"9783319260969"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26096-9_15","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T11:18:35Z","timestamp":1448363915000},"page":"145-151","source":"Crossref","is-referenced-by-count":0,"title":["Challenges of Fiction in Network Security \u2013 Perspective of Virtualized Environments"],"prefix":"10.1007","author":[{"given":"Vit","family":"Bukac","sequence":"first","affiliation":[]},{"given":"Radim","family":"Ostadal","sequence":"additional","affiliation":[]},{"given":"Petr","family":"Svenda","sequence":"additional","affiliation":[]},{"given":"Tatevik","family":"Baghdasaryan","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Matyas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Chertov, R., Fahmy, S., Shroff, N.B.: Emulation versus simulation: a case study of TCP-targeted denial of service attacks. In: Testbeds and Research Infrastructures for the Development of Networks and Communities. TRIDENTCOM 2006, p. 10. IEEE (2006)","DOI":"10.1109\/TRIDNT.2006.1649164"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Benzel, T., Faber, T., Braden, R., Wroclawski, J., Schwab, S.: The DETER project: advancing the science of cyber security experimentation and test. In: Proceedings of IEEE International Conference Technology HST, p. 17. IEEE, November 2010","DOI":"10.1109\/THS.2010.5655108"},{"key":"15_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-642-15479-9_32","volume-title":"What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience","author":"D Schmidt","year":"2010","unstructured":"Schmidt, D., Suriadi, S., Tickle, A., Clark, A., Mohay, G., Ahmed, E., Mackie, J.: A distributed denial of service testbed. In: Berleur, J., Hercheui, M.D., Hilty, L.M. (eds.) HCC9\/CIP 2010. IFIP AICT, vol. 328, pp. 338\u2013349. Springer, Heidelberg (2010)"},{"key":"15_CR4","unstructured":"Eddington, M.: Peach fuzzing platform (2011). 30\/11\/2014. \n                    http:\/\/peachfuzzer.com"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26096-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T13:33:20Z","timestamp":1559309600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26096-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260952","9783319260969"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26096-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}