{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:50:42Z","timestamp":1725871842903},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319495798"},{"type":"electronic","value":"9783319495804"}],"license":[{"start":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T00:00:00Z","timestamp":1479945600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49580-4_6","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T05:54:04Z","timestamp":1479880444000},"page":"59-69","source":"Crossref","is-referenced-by-count":5,"title":["Alfons: A Mimetic Network Environment Construction System"],"prefix":"10.1007","author":[{"given":"Shingo","family":"Yasuda","sequence":"first","affiliation":[]},{"given":"Ryosuke","family":"Miura","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Ohta","sequence":"additional","affiliation":[]},{"given":"Yuuki","family":"Takano","sequence":"additional","affiliation":[]},{"given":"Toshiyuki","family":"Miyachi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"6_CR1","unstructured":"SecCap: Education network for practical information technologies-security-(only available in japanese) (2015). https:\/\/www.seccap.jp"},{"key":"6_CR2","unstructured":"Hardening\u00a010 APAC: A security competition like no other (2014). http:\/\/wasforum.jp\/hardening-project\/hardening-10-apac-en\/"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Miyachi, T., Nakagawa, T., Chinen, K.i., Miwa, S., Shinoda, Y.: StarBED and SpringOS architectures and their performance. In: TRIDENTCOM, vol. 90, pp. 43\u201358 (2011)","DOI":"10.1007\/978-3-642-29273-6_4"},{"key":"6_CR4","unstructured":"Yasuda, S., Miura, R., Ota, S., Takano, Y., Miyachi, T.: Building block type construction system for mimetic environment (only available in japanese). In: Proceedings of Internet Conference 2015 JSSST, vol. 77, pp. 69\u201378, October 2015"},{"key":"6_CR5","unstructured":"Cuckoo Sandbox (2015). http:\/\/www.cuckoosandbox.org\/"},{"key":"6_CR6","unstructured":"Kruegel, C., Emulation, F.S.: Achieving successful automated dynamic analysis of evasive malware. In: Black Hat (2014)"},{"key":"6_CR7","unstructured":"Miwa, S., Miyachi, T., Eto, M., Yoshizumi, M., Shinoda, Y.: Design and implementation of an isolated sandbox with mimetic internet used to analyze malwares. In: Benzel, T.V., Kesidis, G. (eds.) DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, 6\u20137 August 2007. USENIX Association (2007)"},{"key":"6_CR8","unstructured":"OpenStack (2015). https:\/\/www.openstack.org\/"},{"key":"6_CR9","unstructured":"VMWare vSphere (2015). http:\/\/www.vmware.com\/products\/vi\/"},{"key":"6_CR10","unstructured":"Vagrant (2015). https:\/\/www.vagrantup.com"},{"key":"6_CR11","unstructured":"Ansible (2015). http:\/\/www.ansible.com\/home"},{"key":"6_CR12","unstructured":"chef (2015). https:\/\/www.chef.io"},{"key":"6_CR13","unstructured":"ENCS: European network for cyber security (2015). https:\/\/www.encs.eu"},{"key":"6_CR14","unstructured":"ICS-CERT: The industrial control systems cyber emergency response team (2015). https:\/\/ics-cert.us-cert.gov"},{"key":"6_CR15","unstructured":"CRIAB. http:\/\/www.boeing.com\/defense\/cybersecurity-information-management\/"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-642-23644-0_18","volume-title":"Recent Advances in Intrusion Detection","author":"M Lindorfer","year":"2011","unstructured":"Lindorfer, M., Kolbitsch, C., Milani Comparetti, P.: Detecting Environment-Sensitive Malware. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 338\u2013357. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23644-0_18"},{"key":"6_CR17","unstructured":"Detecting Malware and Sandbox\u00a0Evasion Techniques (2015). https:\/\/www.sans.org\/reading-room\/whitepapers\/forensics\/detecting-malware-sandbox-evasion-techniques-36667"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Testbeds and Research Infrastructures for the Development of Networks and Communities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49580-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T18:07:24Z","timestamp":1568570844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49580-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,24]]},"ISBN":["9783319495798","9783319495804"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49580-4_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016,11,24]]}}}