{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:33Z","timestamp":1750220313216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3474718.3475718","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T16:42:08Z","timestamp":1631032928000},"page":"17-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation"],"prefix":"10.1145","author":[{"given":"Sean","family":"Oesch","sequence":"first","affiliation":[{"name":"Oak Ridge National Laboratory, United States of America"}]},{"given":"Robert A.","family":"Bridges","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, United States of America"}]},{"given":"Miki","family":"Verma","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, United States of America"}]},{"given":"Brian","family":"Weber","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, United States of America"}]},{"given":"Oumar","family":"Diallo","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.92"},{"key":"e_1_3_2_1_2_1","unstructured":"A Botello J Lin D Mozzacco JE Sutton M Spraragen J Blythe and M Zyda. 2010. An Agent Architecture for Large-scale Security Simulation. (2010).  A Botello J Lin D Mozzacco JE Sutton M Spraragen J Blythe and M Zyda. 2010. An Agent Architecture for Large-scale Security Simulation. (2010)."},{"key":"e_1_3_2_1_4_1","volume-title":"The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30, 1-7","author":"Brin Sergey","year":"1998","unstructured":"Sergey Brin and Lawrence Page . 1998. The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30, 1-7 ( 1998 ), 107\u2013117. Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30, 1-7 (1998), 107\u2013117."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00038"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v040.i04"},{"volume-title":"Markov chains: from theory to implementation and experimentation","author":"Gagniuc A","key":"e_1_3_2_1_7_1","unstructured":"Paul\u00a0 A Gagniuc . 2017. Markov chains: from theory to implementation and experimentation . John Wiley & Sons . Paul\u00a0A Gagniuc. 2017. Markov chains: from theory to implementation and experimentation. John Wiley & Sons."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5120\/11638-7118"},{"key":"e_1_3_2_1_9_1","volume-title":"Error detecting and error correcting codes. The Bell system technical journal 29, 2","author":"Hamming W","year":"1950","unstructured":"Richard\u00a0 W Hamming . 1950. Error detecting and error correcting codes. The Bell system technical journal 29, 2 ( 1950 ), 147\u2013160. Richard\u00a0W Hamming. 1950. Error detecting and error correcting codes. The Bell system technical journal 29, 2 (1950), 147\u2013160."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1966.10480879"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746194.2746207"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285392"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.026"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1036158"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin Arash\u00a0Habibi Lashkari and Ali\u00a0A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.. In ICISSP. 108\u2013116.  Iman Sharafaldin Arash\u00a0Habibi Lashkari and Ali\u00a0A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.. In ICISSP. 108\u2013116.","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_19_1","unstructured":"Matthias Studer and Gilbert Ritschard. 2014. A comparative review of sequence dissimilarity measures. (2014). https:\/\/doi.org\/10.12682\/lives.2296-1658.2014.33  Matthias Studer and Gilbert Ritschard. 2014. A comparative review of sequence dissimilarity measures. (2014). https:\/\/doi.org\/10.12682\/lives.2296-1658.2014.33"},{"volume-title":"The GENI Book","author":"Wroclawski John","key":"e_1_3_2_1_21_1","unstructured":"John Wroclawski , Terry Benzel , Jim Blythe , Ted Faber , Alefiya Hussain , Jelena Mirkovic , and Stephen Schwab . 2016. DETERLab and the DETER Project . In The GENI Book . Springer , 35\u201362. John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, and Stephen Schwab. 2016. DETERLab and the DETER Project. In The GENI Book. Springer, 35\u201362."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of FIRST. Citeseer.","author":"Zanero Stefano","year":"2007","unstructured":"Stefano Zanero . 2007 . Flaws and frauds in the evaluation of IDS\/IPS technologies . In Proc. of FIRST. Citeseer. Stefano Zanero. 2007. Flaws and frauds in the evaluation of IDS\/IPS technologies. In Proc. of FIRST. Citeseer."}],"event":{"name":"CSET '21: Cyber Security Experimentation and Test Workshop","acronym":"CSET '21","location":"Virtual CA USA"},"container-title":["Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3475718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474718.3475718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:46Z","timestamp":1750191106000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474718.3475718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":20,"alternative-id":["10.1145\/3474718.3475718","10.1145\/3474718"],"URL":"https:\/\/doi.org\/10.1145\/3474718.3475718","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}