{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:46:41Z","timestamp":1725515201256},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540685142"},{"type":"electronic","value":"9783540685241"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68524-1_10","type":"book-chapter","created":{"date-parts":[[2008,6,5]],"date-time":"2008-06-05T08:34:48Z","timestamp":1212654888000},"page":"119-134","source":"Crossref","is-referenced-by-count":2,"title":["VCSTC: Virtual Cyber Security Testing Capability \u2013 An Application Oriented Paradigm for Network Infrastructure Protection"],"prefix":"10.1007","author":[{"given":"Guoqiang","family":"Shu","sequence":"first","affiliation":[]},{"given":"Dongluo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhijun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Na","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lifeng","family":"Sang","sequence":"additional","affiliation":[]},{"given":"David","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E., Hamed, H.: Discovery of Policy Anomalies in Distributed Firewalls. In: Proceedings of IEEE INFOCOM (2004)","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Benzel, T., Braden, R., Kim, D., Neuman, B., Joseph, A., Sklower, K., Ostrenga, R., Schwab, S.: Experience with DETER: A Testbed for Security Research. In: 2nd IEEE Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom) (2006)","DOI":"10.1109\/TRIDNT.2006.1649172"},{"key":"10_CR3","unstructured":"Cui, W., Kannan, J., Wang, H.: Discoverer: Automatic Protocol Reverse Engineering from Network Traces. In: The 16th USENIX Security Symposium (2007)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"El-Atawy, A., Ibrahim, K., Hamed, H., Al-Shaer, E.: Policy Segmentation for Intelligent Firewall Testing. In: 1st Workshop on Secure Network Protocols (NPSec) (2005)","DOI":"10.1109\/NPSEC.2005.1532056"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.compeleceng.2006.06.001","volume":"33","author":"S. G\u00f6ren","year":"2007","unstructured":"G\u00f6ren, S., Ferguson, F.J.: On state reduction of incompletely specified finite state machines. Computers and Electrical Engineering\u00a033(1), 58\u201369 (2007)","journal-title":"Computers and Electrical Engineering"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines - A survey. In: Proceedings of the IEEE, pp. 1090\u20131123 (1996)","DOI":"10.1109\/5.533956"},{"key":"10_CR7","unstructured":"Lee, G.S., Andrew, L.H., Tang, A., Low, S.H.: WAN-in-Lab: Motivation, Deployment and Experiments. Protocols for Fast, Long Distance Networks (PFLDnet), 85\u201390 (2007)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Liljenstam, M., Nicol, D.M., Berk, V., Gray, R.: Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing. In: Proceedings of the 2003 Workshop on Rapid Malcode (WORM) (2003)","DOI":"10.1145\/948187.948193"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Lyu, M., Lau, L.: Firewall security: policies, testing and performance evaluation. In: Proceedings of the COMSAC, pp. 116\u2013121 (2000)","DOI":"10.1109\/CMPSAC.2000.884700"},{"issue":"5","key":"10_CR10","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.comcom.2006.08.018","volume":"30","author":"S. Maier","year":"2007","unstructured":"Maier, S., Herrscher, D., Rothermel, K.: Experiences with node virtualization for scalable network emulation. Computer Communication\u00a030(5), 943\u2013956 (2007)","journal-title":"Computer Communication"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Mayer, A., Wool, A., Ziskind, E.: Fang: A Firewall Analysis Engine. In: Proceedings of the IEEE Symposium on Security and Privacy (2000)","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"10_CR12","unstructured":"Orebaugh, A., Ramirez, G., Burke, J., Pesce, L.: Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale\u2019s Open Source Security). Syngress Publishing (2007)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Pederson, P., Lee, D., Shu, G., Chen, D., Liu, Z., Li, N., Sang, L.: Virtual Cyber-Security Testing Capability for Large Scale Distributed Information Infrastructure Protection (submitted, 2008)","DOI":"10.1109\/THS.2008.4534480"},{"key":"10_CR14","volume-title":"Virtual Honeypots: From Botnet Tracking to Intrusion Detection","author":"N. Provos","year":"2007","unstructured":"Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion Detection, 1st edn. Addison-Wesley Professional, Reading (2007)","edition":"1"},{"key":"10_CR15","unstructured":"Provos, N.: A Virtual Honeypot Framework. In: Proceedings of the 13th USENIX. Security Symposium (2004)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Sabiguero, A., Baire, A., Boutet, A., Viho, C.: Virtualized Interoperability Testing: Application to IPv6 Network Mobility. In: 18th IFIP\/IEEE International Workshop on Distributed Systems: Operations and Management, pp. 187\u2013190 (2007)","DOI":"10.1007\/978-3-540-75694-1_17"},{"key":"10_CR17","unstructured":"Sherwood, J.: The Security Certification Criteria Project. In: The 3rd International Common Criteria Conference (2002)"},{"issue":"2","key":"10_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","volume":"1","author":"L. Spitzner","year":"2003","unstructured":"Spitzner, L.: The Honeynet Project: Trapping the Hackers. IEEE Security and Privacy\u00a01(2), 15\u201323 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"10_CR19","unstructured":"VMware Inc, http:\/\/www.vmware.com"},{"key":"10_CR20","unstructured":"Wang, L., Ellis, C., Yin, W., Luong, D.D.: Hercules: An Environment for Large-Scale Enterprise Infrastructure Testing. In: Proceedings of the Workshop on Advances and Innovations in Systems Testing (2007)"},{"key":"10_CR21","unstructured":"Wool, A.: Architecting the Lumeta firewall analyzer. In: 10th USENIX Security Symposium, pp. 85\u201397 (2001)"}],"container-title":["Lecture Notes in Computer Science","Testing of Software and Communicating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68524-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T22:57:08Z","timestamp":1557615428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68524-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540685142","9783540685241"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68524-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}