{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:28:32Z","timestamp":1746246512148,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icumt.2010.5676585","type":"proceedings-article","created":{"date-parts":[[2011,1,3]],"date-time":"2011-01-03T15:50:24Z","timestamp":1294069824000},"page":"538-544","source":"Crossref","is-referenced-by-count":10,"title":["A comprehensive framework to simulate network attacks and challenges"],"prefix":"10.1109","author":[{"given":"Egemen K.","family":"Cetinkaya","sequence":"first","affiliation":[]},{"given":"Dan","family":"Broyles","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Dandekar","sequence":"additional","affiliation":[]},{"given":"Sripriya","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"James P. G.","family":"Sterbenz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack","year":"2004","key":"ref31"},{"journal-title":"Survivable Network Systems An Emerging Discipline","year":"1999","author":"ellison","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e90-b.11.3095"},{"journal-title":"Severe space weather events Understanding societal and economic impacts","year":"2008","key":"ref11"},{"key":"ref12","first-page":"54","article-title":"Modelling interdependencies between the electricity and information infrastructures","volume":"4680","author":"laprie","year":"2007","journal-title":"LNCS"},{"journal-title":"Impact of the 2003 blackouts on Internet communications","year":"2003","author":"cowie","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062027"},{"journal-title":"The ns-3 network simulator","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.4626"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.5468"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111328"},{"key":"ref28","article-title":"KU-LocGen: Location and cost-constrained network topology generator","author":"jabbar","year":"2008","journal-title":"ITTC Technical Report ITTC-FY2009-TR-45030&#x2013;01"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref27","article-title":"Deriving Network Topologies from Real World Constraints","author":"hameed","year":"2010","journal-title":"Proc IEEE GLOBECOM Workshop on Complex Communication Networks (CCNet)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.11"},{"key":"ref6","first-page":"114","author":"daugherty","year":"1995","journal-title":"Proc ISCCSP"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"ref5","first-page":"31","author":"sterbenz","year":"2002","journal-title":"Proc of ACM WiSe"},{"key":"ref8","first-page":"1","article-title":"Why do internet services fail, and what can be done about it?","author":"oppenheimer","year":"2003","journal-title":"Proc of USENIX USITS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.585151"},{"key":"ref2","article-title":"The Great Plains Environment for Network Innovation (GpENI): A programmable testbed for future internet architecture research","author":"sterbenz","year":"2010","journal-title":"Proc of the 6th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TridentCom)"},{"key":"ref9","first-page":"1","article-title":"Critical infrastructure analysis of telecom for natural disasters","author":"reilly","year":"2006","journal-title":"Proc of IEEE Networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209235"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0501426102"},{"journal-title":"Cgal Computational Geometry Algorithms Library","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2010.037406"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ANSS-41.2008.25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1557626.1557639"}],"event":{"name":"2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010)","start":{"date-parts":[[2010,10,18]]},"location":"Moscow, Russia","end":{"date-parts":[[2010,10,20]]}},"container-title":["International Congress on Ultra Modern Telecommunications and Control Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5655222\/5676472\/05676585.pdf?arnumber=5676585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:42:45Z","timestamp":1490053365000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5676585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icumt.2010.5676585","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}