{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:07:25Z","timestamp":1747152445056},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540376286"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-37629-3_8","type":"book-chapter","created":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T18:24:51Z","timestamp":1193595891000},"page":"111-127","source":"Crossref","is-referenced-by-count":2,"title":["Software Environment for Simulation and Evaluation of a Security Operation Center"],"prefix":"10.1007","author":[{"given":"Julien","family":"Bourgeois","sequence":"first","affiliation":[]},{"given":"Abdoul Karim","family":"Ganame","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Ulanov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Bidou, R., Bourgeois, J., Spies, F.: Towards a global security architecture for intrusion detection and reaction management. Proceedings of the 4th International Workshop on Information Security Applications (WISA 2003). Lecture Notes in Computer Science, Vol.2908 (2003)"},{"key":"8_CR2","unstructured":"Ganame, A.K., Bourgeois, J., Bidou, R., Spies, F.: A High Performance System for Intrusion Detection and Reaction Management. Journal of Information Assurance and Security, Vol.3 (2006)"},{"key":"8_CR3","unstructured":"Ganame, A.K., Bourgeois, J., Bidou, R., Spies, F.: Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center. International Conference on Security and Cryptography (SECRYPT 2006) Proceedings. Portugal (2006)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Perumalla, K., Sundaragopalan, S.: High-Fidelity Modeling of Computer Network Worms. Annual Computer Security Applications Conference (ACSAC), Tucson, AZ (2004)","DOI":"10.1109\/CSAC.2004.21"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An Integrated Experimental Environment for Distributed Systems and Networks. Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA (2002)","DOI":"10.1145\/1060289.1060313"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Durst, R., Champion, T., Witten, B., Miller, E., Spagnuolo, L.: Testing and Evaluating Computer Intrusion Detection Systems. Communications of the ACM, Vol.42, No.7 (1999)","DOI":"10.1145\/306549.306571"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Ulanov, A.: Simulation of Internet DDoS Attacks and Defense. 9th Information Security Conference (ISC 2006). Samos, Greece. August 30\u2013September 2, 2006. Lecture Notes in Computer Science, Vol.4176 (2006).","DOI":"10.1007\/11836810_24"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Ulanov, A.: Agent-based Simulation of Distributed Defense against Computer Network Attacks. Proceedings of 20th European Conference on Modeling and Simulation (ECMS 2006). Bonn. Germany (2006)","DOI":"10.7148\/2006-0560"},{"key":"8_CR9","unstructured":"Omnet++. http:\/\/www.omnetpp.org"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kiddle, C., Simmonds, R., Williamson, C., Unger, B.: Hybrid Packet\/Fluid Flow Network Simulation. IEEE\/ACM Workshop on Parallel and Distributed Simulation (PADS) (2003)","DOI":"10.1109\/PADS.2003.1207430"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Nicol, D., Liljenstam, M., Liu, J.: Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure. International Conference on Modeling Techniques and Tools for Computer Performance Evaluation (Performance TOOLS) (2003)","DOI":"10.1007\/978-3-540-45232-4_1"},{"key":"8_CR12","unstructured":"Kotenko, I., Ulanov, A.: Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense. 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006). Abstract and Poster sessions. Hamburg, Germany September 20\u201322 (2006)"},{"key":"8_CR13","unstructured":"Schneier, B.: Attacks trees. Dr. Dobb (1999)"},{"key":"8_CR14","unstructured":"The Foundation for Intelligent Physical Agents (FIPA). http:\/\/www.fipa.org."}],"container-title":["Lecture Notes in Geoinformation and Cartography","Information Fusion and Geographic Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-37629-3_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:41:45Z","timestamp":1619998905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-37629-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540376286"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-37629-3_8","relation":{},"subject":[]}}