{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:32Z","timestamp":1750220312495,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3474718.3474725","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T16:42:08Z","timestamp":1631032928000},"page":"63-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Comparing reproduced cyber experimentation studies across different emulation testbeds"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Tarman","sequence":"first","affiliation":[{"name":"Sandia National Laboratories, United States of America"}]},{"given":"Trevor","family":"Rollins","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, United States of America"}]},{"given":"Laura","family":"Swiler","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, United States of America"}]},{"given":"Jerry","family":"Cruz","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, United States of America"}]},{"given":"Eric","family":"Vugrin","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, United States of America"}]},{"given":"Hao","family":"Huang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"given":"Abhijeet","family":"Sahu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"given":"Patrick","family":"Wlazlo","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"given":"Ana","family":"Goulart","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]},{"given":"Kate","family":"Davis","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Technical Report","author":"Statistical Methods SEMATECH","year":"1843","unstructured":"2012. NIST\/ SEMATECH e-Handbook of Statistical Methods . Technical Report . National Institute of Standards . https:\/\/doi.org\/10. 1843 4\/M32189 10.18434\/M32189 2012. NIST\/SEMATECH e-Handbook of Statistical Methods. Technical Report. National Institute of Standards. https:\/\/doi.org\/10.18434\/M32189"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753614"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-019-0198-0"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track, Vol.\u00a041","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a fast and portable dynamic translator .. In USENIX Annual Technical Conference, FREENIX Track, Vol.\u00a041 . 46. Fabrice Bellard. 2005. QEMU, a fast and portable dynamic translator.. In USENIX Annual Technical Conference, FREENIX Track, Vol.\u00a041. 46."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.30"},{"key":"e_1_3_2_1_7_1","unstructured":"Cisco. 2019. Snort intrusion detection and prevention system. https:\/\/www.snort.org\/.  Cisco. 2019. Snort intrusion detection and prevention system. https:\/\/www.snort.org\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2015.7095802"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.27"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2007.07.030"},{"key":"e_1_3_2_1_12_1","unstructured":"Linux Foundation. 2019. Open vSwitch. http:\/\/www.openvswitch.org\/  Linux Foundation. 2019. Open vSwitch. http:\/\/www.openvswitch.org\/"},{"key":"e_1_3_2_1_13_1","unstructured":"G. Lyon. 2019. Nmap: the network mapper. http:\/\/nmap.org\/.  G. Lyon. 2019. Nmap: the network mapper. http:\/\/nmap.org\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3186266"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Linux symposium, Vol.\u00a01. Dttawa","author":"Kivity Avi","year":"2007","unstructured":"Avi Kivity , Yaniv Kamay , Dor Laor , Uri Lublin , and Anthony Liguori . 2007 . kvm: the Linux virtual machine monitor . In Proceedings of the Linux symposium, Vol.\u00a01. Dttawa , Dntorio, Canada, 225\u2013230. Avi Kivity, Yaniv Kamay, Dor Laor, Uri Lublin, and Anthony Liguori. 2007. kvm: the Linux virtual machine monitor. In Proceedings of the Linux symposium, Vol.\u00a01. Dttawa, Dntorio, Canada, 225\u2013230."},{"key":"e_1_3_2_1_17_1","unstructured":"minimega developers. 2019. minimega: a distributed VM management tool. http:\/\/minimega.org\/  minimega developers. 2019. minimega: a distributed VM management tool. http:\/\/minimega.org\/"},{"key":"e_1_3_2_1_18_1","volume-title":"DEW: Distributed Experiment Workflows. In 11th USENIX Workshop on Cyber Security Experimentation and Test CSET 18)","author":"Mirkovic Jelena","year":"2018","unstructured":"Jelena Mirkovic , Genevieve Bartlett , and Jim Blythe . 2018 . DEW: Distributed Experiment Workflows. In 11th USENIX Workshop on Cyber Security Experimentation and Test CSET 18) . Jelena Mirkovic, Genevieve Bartlett, and Jim Blythe. 2018. DEW: Distributed Experiment Workflows. In 11th USENIX Workshop on Cyber Security Experimentation and Test CSET 18)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5655108"},{"volume-title":"Applied statistics and probability for engineers","author":"Montgomery C","key":"e_1_3_2_1_20_1","unstructured":"Douglas\u00a0 C Montgomery and George\u00a0 C Runger . 2010. Applied statistics and probability for engineers . John Wiley & Sons . Douglas\u00a0C Montgomery and George\u00a0C Runger. 2010. Applied statistics and probability for engineers. John Wiley & Sons."},{"volume-title":"Reproducibility and Replicability in Science","author":"Engineering National Academies\u00a0of Sciencesand Medicine. 2019.","key":"e_1_3_2_1_21_1","unstructured":"Engineering National Academies\u00a0of Sciencesand Medicine. 2019. Reproducibility and Replicability in Science . The National Academies Press , Washington, DC . https:\/\/doi.org\/10.17226\/25303 10.17226\/25303 Engineering National Academies\u00a0of Sciencesand Medicine. 2019. Reproducibility and Replicability in Science. The National Academies Press, Washington, DC. https:\/\/doi.org\/10.17226\/25303"},{"volume-title":"Verification and validation in scientific computing","author":"Oberkampf L","key":"e_1_3_2_1_22_1","unstructured":"William\u00a0 L Oberkampf and Christopher\u00a0 J Roy . 2010. Verification and validation in scientific computing . Cambridge University Press . William\u00a0L Oberkampf and Christopher\u00a0J Roy. 2010. Verification and validation in scientific computing. Cambridge University Press."},{"key":"e_1_3_2_1_23_1","unstructured":"Abhijeet Sahu Patrick Wlazlo Zeyu Mao Hao Huang Ana Goulart Katherine Davis and Saman Zonouz. 2020. Design and Evaluation of A Cyber-Physical Resilient Power System Testbed. arXiv preprint arXiv:2011.13552(2020).  Abhijeet Sahu Patrick Wlazlo Zeyu Mao Hao Huang Ana Goulart Katherine Davis and Saman Zonouz. 2020. Design and Evaluation of A Cyber-Physical Resilient Power System Testbed. arXiv preprint arXiv:2011.13552(2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00017"},{"key":"e_1_3_2_1_25_1","unstructured":"Kyoung-Taek Seo Hyun-Seo Huang Young Moon Oh-Toung Kwon and Byeong-Jun Kim. 2014. Performance comparison analysis of linux container and virtual machine for building cloud. Advanced Science and Technology Letters(2014). http:\/\/www.mmc.igeofcu.unam.mx\/acl\/femp\/MaquinasVirtuales\/CursoMaquinasVirtuales\/VirtualizacionEnLinuxCon-HPC-VPS\/25.pdf  Kyoung-Taek Seo Hyun-Seo Huang Young Moon Oh-Toung Kwon and Byeong-Jun Kim. 2014. Performance comparison analysis of linux container and virtual machine for building cloud. Advanced Science and Technology Letters(2014). http:\/\/www.mmc.igeofcu.unam.mx\/acl\/femp\/MaquinasVirtuales\/CursoMaquinasVirtuales\/VirtualizacionEnLinuxCon-HPC-VPS\/25.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"[\n  26\n  ]  Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) project.2021. https:\/\/searcch.cyberexperimentation.org\/.  [26] Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH) project.2021. https:\/\/searcch.cyberexperimentation.org\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2017.8284700"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.0601112.00185"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.47"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6485997"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES.2016.7480220"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384217.3385626"}],"event":{"name":"CSET '21: Cyber Security Experimentation and Test Workshop","acronym":"CSET '21","location":"Virtual CA USA"},"container-title":["Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3474725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:46Z","timestamp":1750191106000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3474725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":30,"alternative-id":["10.1145\/3474718.3474725","10.1145\/3474718"],"URL":"https:\/\/doi.org\/10.1145\/3474718.3474725","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}