{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:53:27Z","timestamp":1729644807688,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cyconus.2016.7836622","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T15:39:40Z","timestamp":1486481980000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Evaluating single board computer clusters for cyber operations"],"prefix":"10.1109","author":[{"given":"Suzanne J.","family":"Matthews","sequence":"first","affiliation":[]},{"given":"Raymond W.","family":"Blaine","sequence":"additional","affiliation":[]},{"given":"Aaron F.","family":"Brantly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Internet2 Website","article-title":"Snort 2.9.8.2 user manual","year":"2015","key":"ref39"},{"journal-title":"Internet2 Website","article-title":"Skygrabber","year":"2010","key":"ref38"},{"journal-title":"Internet2 Website","article-title":"iOS security: iOS 9.3 or later","year":"2016","key":"ref33"},{"key":"ref32","article-title":"FBI has accessed san bernardino shooter's phone without Apple's help","author":"zapotosky","year":"2016","journal-title":"Washington Post"},{"journal-title":"Internet2 Website","article-title":"United states v. apple","year":"2016","key":"ref31"},{"key":"ref30","article-title":"The internet of things: How the next evolution of the internet is changing everything","author":"evans","year":"2011","journal-title":"White paper Cisco Tech Rep"},{"key":"ref37","article-title":"This cyber rifle is dirt cheap and easy to make. happy drone hunting","author":"clark","year":"2016","journal-title":"Task and Purpose"},{"key":"ref36","article-title":"Insurgents hack u.s. drones","author":"gorman","year":"2009","journal-title":"Wall Street Journal"},{"key":"ref35","article-title":"Homeland security: Unmanned aerial vehicles and border surveillance","author":"bolkcom","year":"2004","journal-title":"DTIC Document"},{"journal-title":"The Drone Debate A Primer on the US Use of Unmanned Aircraft Outside Conventional Battlefields","year":"2015","author":"plaw","key":"ref34"},{"key":"ref28","article-title":"Strategic cyber maneuver","author":"brantly","year":"2015","journal-title":"Internet2 Website"},{"key":"ref27","article-title":"Raspberry pi case and cluster files","author":"matthews","year":"2015","journal-title":"Internet2 Website"},{"key":"ref29","article-title":"Phreaker, maker, hacker, ranger:One vision for cyber support to corps and below in 2025","author":"waage","year":"2015","journal-title":"Small Wars Journal"},{"key":"ref2","article-title":"Robot archives","author":"raspberry","year":"2016","journal-title":"Internet2 Website"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859717"},{"key":"ref20","article-title":"Hashcat advanced password recovery","author":"steube","year":"2016","journal-title":"Internet2 Website"},{"key":"ref22","first-page":"191","article-title":"Description of a new variable-length key, 64-bit block cipher (blowfish)","author":"schneier","year":"1993","journal-title":"International Workshop on Fast Software Encryption Springer"},{"key":"ref21","first-page":"81","article-title":"A future-adaptable password scheme","author":"provos","year":"1999","journal-title":"USENIX Annual Technical Conference Freenix track"},{"key":"ref24","article-title":"Web semantics: The ten thousand worst passwords","author":"sterling","year":"2013","journal-title":"Wired Magazine"},{"key":"ref23","article-title":"Are your passwords safe: Energy-efficient bcrypt cracking with low-cost parallel hardware","author":"malvoni","year":"2014","journal-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)"},{"key":"ref26","article-title":"Parallella case and cluster files","author":"matthews","year":"2015","journal-title":"Internet2 Website"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8191(96)00024-5"},{"article-title":"American fuzzy lop - coredump.cx","year":"2016","author":"zalewski","key":"ref50"},{"key":"ref10","article-title":"Developing the rogue pi","author":"wessel","year":"2013","journal-title":"Crush Beer Code"},{"key":"ref11","article-title":"Glastopf pi: A simple yet cool honeypot for your raspberry pi","author":"turla","year":"2013","journal-title":"InfoSec Institute"},{"journal-title":"Internet2 Website","article-title":"Suricata all features","year":"2011","key":"ref40"},{"key":"ref12","article-title":"Implementing image processing algorithms for the epiphany many-core coprocessor with threaded mpi","author":"ross","year":"2015","journal-title":"Proceedings of the 2015 IEEE High Performance Extreme Computing Conference (HPECC15) IEEE"},{"key":"ref13","first-page":"1","article-title":"Energy efficient platform for sobel filter implementation in energy and size constrained systems","author":"jurevi?ius","year":"2015","journal-title":"Information Electronic and Electrical Engineering (AIEEE) 2015 IEEE 3rd Workshop on Advances in IEEE"},{"key":"ref14","first-page":"1094342015599238","article-title":"Programming the adapteva epiphany 64-core network-on-chip coprocessor","author":"varghese","year":"2015","journal-title":"International Journal of High Performance Computing Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24595-9_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2015.04.023"},{"key":"ref17","article-title":"How much power does your graphics card need?","author":"kreiss","year":"2009","journal-title":"Tom's Hardware The Authority on Tech"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"ref19","article-title":"John the ripper","author":"peslyak","year":"2016","journal-title":"Internet2 Website"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-013-0282-7"},{"key":"ref3","first-page":"4","article-title":"Quadcopter","volume":"19","author":"baker","year":"2013","journal-title":"The MagPi"},{"key":"ref6","first-page":"1","article-title":"Creating a raspberry pi-based beowulf cluster","author":"kiepert","year":"2013","journal-title":"Boise State University Idaho Tech Rep"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.25"},{"journal-title":"Penetration Testing with Raspberry Pi","year":"2015","author":"muniz","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.121"},{"journal-title":"Internet2 Website","article-title":"Nvidia Jetson TX1: the embedded platform for autonomous everything","year":"2016","key":"ref49"},{"key":"ref9","article-title":"Raspberry pi as a hacking arsenal","author":"muniz","year":"2014","journal-title":"The Security Blog"},{"year":"2015","key":"ref46","article-title":"2015 Dell security annual threat report"},{"journal-title":"Internet2 Website","article-title":"The DOD cyber strategy","year":"2015","key":"ref45"},{"journal-title":"Internet2 Website","article-title":"Odroid xu4","year":"2016","key":"ref48"},{"journal-title":"Internet2 Website","article-title":"Raspberry Pi 3 model B","year":"2016","key":"ref47"},{"article-title":"A comparative analysis of the snort and suricata intrusion-detection systems","year":"2011","author":"albin","key":"ref42"},{"journal-title":"Internet2 Website","article-title":"Bro 2.3.1 documentation","year":"2016","key":"ref41"},{"key":"ref44","article-title":"Stress testing cluster bro","author":"weaver","year":"2007","journal-title":"Deter"},{"journal-title":"Internet2 Website","article-title":"Bro cluster architecture","year":"2016","key":"ref43"}],"event":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","start":{"date-parts":[[2016,10,21]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,10,23]]}},"container-title":["2016 International Conference on Cyber Conflict (CyCon U.S.)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7836073\/7836602\/07836622.pdf?arnumber=7836622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T14:33:14Z","timestamp":1513175594000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7836622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/cyconus.2016.7836622","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}