{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:49:58Z","timestamp":1772164198890,"version":"3.50.1"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014881","name":"Guangzhou University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014881","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10651444","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["P-I2Prange: An Automatic Construction Architecture for Scenarios in I2P Ranges"],"prefix":"10.1109","author":[{"given":"Runnan","family":"Tan","sequence":"first","affiliation":[{"name":"Guangzhou University,Cyberspace Institute of Advanced Technology,Guangzhou,China"}]},{"given":"Qingfeng","family":"Tan","sequence":"additional","affiliation":[{"name":"Guangzhou University,Cyberspace Institute of Advanced Technology,Guangzhou,China"}]},{"given":"Haiyan","family":"Wang","sequence":"additional","affiliation":[{"name":"PengCheng Laboratory,Department of New Networks,Shenzhen,China"}]},{"given":"Yushun","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,Shenzhen Institute for Advanced Study,Shenzhen,China"}]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology Beijing,The School of Computer and Communication Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485891"},{"key":"ref2","article-title":"Understanding the usage of anonymous onion services: Empirical experiments to study criminal activities in the tor network","author":"Nurmi","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2804394"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472919"},{"key":"ref5","article-title":"Proteus: Programmable protocols for censorship circumvention","author":"Wails","year":"2023","journal-title":"Free and Open Communications on the Internet"},{"key":"ref6","article-title":"Towards flexible anonymous networks","author":"Rochet","year":"2022","journal-title":"CoRR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.7475027"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3253559"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108158"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00064"},{"key":"ref11","first-page":"287","article-title":"Circuit fingerprinting attacks: Passive deanonymization of tor hidden services","volume-title":"24th USENIX Security Symposium, USENIX Security 15","volume":"2015","author":"Kwon"},{"issue":"3","key":"ref12","first-page":"1","article-title":"Cyber ranges: state-of-the-art and research challenges","volume":"1","author":"Fang","year":"2016","journal-title":"Journal of Cyber Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"ref14","first-page":"113","article-title":"Large-scale virtualization in the emulab network testbed","volume-title":"2008 USENIX Annual Technical Conference","volume":"2008","author":"Hibler"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.23"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0044"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2015.7057855"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994630"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866344"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659707"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"ref25","volume-title":"Joint training manual for the armed forces of the united states","author":"Staff","year":"2015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2016.7810125"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.09.007"},{"issue":"1","key":"ref28","first-page":"32","article-title":"Design of a virtual computer lab environment for hands-on information security exercises","volume":"26","author":"Gephart","year":"2010","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"ref29","volume-title":"A virtual machine architecture for creating it-security laboratories.","author":"Hu","year":"2006"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.46"},{"key":"ref31","first-page":"298","article-title":"Towards a unified data storage and generic visualizations in cyber ranges","volume-title":"ECCWS 2017 16th European Conference on Cyber Warfare and Security","author":"O\u0161lej\u0161ek"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3446"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2219-z"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060313"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5673083"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60774-0_3"},{"key":"ref37","article-title":"Ten years of ictf: The good, the bad, and the ugly","volume-title":"2014 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE \u201914","volume":"2014","author":"Vigna"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2790033"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.111"},{"key":"ref40","first-page":"1","article-title":"Practical network security teaching in an online virtual laboratory","volume-title":"Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer","author":"Willems"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8848-3_24"},{"key":"ref42","first-page":"224","article-title":"Developing a capability to classify technical skill levels within a cyber range","volume-title":"16th European conference on cyber warfare and security, ECCWS 2017","author":"Labuschagne"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6685034"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2981546"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.21236\/ada559181"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_9"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.12677\/csa.2019.97146"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","location":"Yokohama, Japan","start":{"date-parts":[[2024,6,30]]},"end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10651444.pdf?arnumber=10651444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:45:32Z","timestamp":1725950732000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10651444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10651444","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}