{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:58:34Z","timestamp":1729648714030,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/wsc.2010.5678981","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T09:09:39Z","timestamp":1294391379000},"page":"2865-2875","source":"Crossref","is-referenced-by-count":4,"title":["Simulating non-stationary congestion systems using splitting with applications to cyber security"],"prefix":"10.1109","author":[{"given":"Martin J.","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Denise M.B.","family":"Masi","sequence":"additional","affiliation":[]},{"given":"John F.","family":"Shortle","sequence":"additional","affiliation":[]},{"given":"Chun-Hung","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Queueing Systems, Volume II: Computer Applications","year":"1976","author":"kleinrock","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2001.977250"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1287\/opre.50.6.1073.358"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.46"},{"key":"ref14","first-page":"52","article-title":"Modeling Internet Protocol Networks: OPNET and Analytics","author":"masi","year":"2004","journal-title":"Sigma Noblis Technology Summaries"},{"key":"ref15","first-page":"69","article-title":"Analytically Modeling Cyber Attacks in Internet Protocol Networks","author":"masi","year":"0","journal-title":"Proceedings of the 2004 Advanced Simulation Technologies Conference"},{"key":"ref16","article-title":"Analytically Modeling Worm Attacks in Internet Protocol Networks","author":"masi","year":"0","journal-title":"Ninth INFORMS Computing Society (ICS) Conference"},{"key":"ref17","first-page":"2009","article-title":"Mathematical Challenges in Cyber security","year":"2009","journal-title":"Sandia Report"},{"journal-title":"US Department of Energy White Paper","article-title":"Mathematical Underpinnings for Science-Based Cybersecurity","year":"2008","key":"ref18"},{"key":"ref19","article-title":"Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure","author":"nicol","year":"0","journal-title":"The 13th International Conference on Modelling Techniques and Tools for Computer Performance Evaluation (Performance TOOLS 2003)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-006-0180-0"},{"year":"0","key":"ref3","article-title":"CERT\/CC, Overview of Attack Trends"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1080\/07408170903116360","article-title":"Efficient Computation of Optimal Budget Allocation for Discrete Event Simulation Experiment","volume":"42","author":"chen","year":"2010","journal-title":"IIE Transactions"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1080.0268"},{"journal-title":"SIGM","article-title":"The Impact of Cyber Attacks on Internet Protocol (IP) Networks","year":"2004","key":"ref8"},{"article-title":"Cyber War: The Next Threat to National Security and What to Do About It","year":"2010","author":"clarke","key":"ref7"},{"year":"0","key":"ref2","article-title":"CERT\/CC, CERT Statistics (Historical)"},{"key":"ref9","first-page":"22204","article-title":"Internet Protocol (IP) Network Performance and Analysis Tool (IP-NPAT)","year":"2005","journal-title":"Scientific and Technical Report Contract Number NBCH-D-02-0039 CDRL # 007\/DID# 80711"},{"article-title":"Information Security as an Institutional Priority, Software Engineering Institute","year":"2004","author":"allen","key":"ref1"},{"key":"ref20","article-title":"An Effective Rare-event Simulation Technique and Its Application to Cyber Security and Electric Grid","author":"shortle","year":"2010","journal-title":"DHS Conference MSAHS 2010"},{"key":"ref22","article-title":"Optimal Level Splitting for Rare-Event Simulation","author":"shortle","year":"2010","journal-title":"IIE Transactions"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2008.4736077"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948197"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.032"},{"key":"ref25","article-title":"Email Virus Propagation Modeling and Analysis","author":"zou","year":"2004","journal-title":"Umass ECE Technical Report TR-CSE-03-04"}],"event":{"name":"2010 Winter Simulation Conference - (WSC 2010)","start":{"date-parts":[[2010,12,5]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2010,12,8]]}},"container-title":["Proceedings of the 2010 Winter Simulation Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5672636\/5678856\/05678981.pdf?arnumber=5678981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T14:08:46Z","timestamp":1497881326000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5678981\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wsc.2010.5678981","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}