{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:10:15Z","timestamp":1725678615441},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/tridentcom.2007.4444663","type":"proceedings-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T21:23:33Z","timestamp":1202505813000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["Large-scale Reconfigurable Virtual Testbed for Information Security Experiments"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Volynkin","sequence":"first","affiliation":[]},{"given":"Victor","family":"Skormin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"127","article-title":"BASIS: A biological approach to system information security","author":"gorodetski","year":"2001","journal-title":"Proceedings of the International Workshop Mathematical Methods Models and Architectures for Computer Network Security Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.993782"},{"key":"10","article-title":"Considering both intra-pattern and interpattern anomalies in intrusion detection","author":"jiang","year":"2002","journal-title":"Proceedings of IEEE International Conference on Data Mining"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652094"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179579"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDNT.2005.15"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDNT.2006.1649172"},{"journal-title":"Ns-2 Network Simulator","year":"1997","author":"mccanne","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45215-7_16"},{"journal-title":"Immunocomputing Theory and Applications","year":"2003","author":"tarakanov","key":"8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"12","first-page":"141","article-title":"A study in using neural networks for anomaly and misuse detection","author":"ghosh","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"}],"event":{"name":"2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities","start":{"date-parts":[[2007,5,21]]},"location":"Lake Buena Vista, FL, USA","end":{"date-parts":[[2007,5,23]]}},"container-title":["2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4444645\/4444646\/04444663.pdf?arnumber=4444663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T20:21:02Z","timestamp":1489695662000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4444663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/tridentcom.2007.4444663","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}