{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:15:14Z","timestamp":1774160114803,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T00:00:00Z","timestamp":1668384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Syracuse University"},{"name":"National Science Foundation","award":["2214916"],"award-info":[{"award-number":["2214916"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,14]]},"DOI":"10.1145\/3563766.3564097","type":"proceedings-article","created":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T16:29:31Z","timestamp":1668443371000},"page":"101-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["SEED emulator"],"prefix":"10.1145","author":[{"given":"Wenliang","family":"Du","sequence":"first","affiliation":[{"name":"Syracuse University"}]},{"given":"Honghao","family":"Zeng","sequence":"additional","affiliation":[{"name":"Syracuse University"}]},{"given":"Kyungrok","family":"Won","sequence":"additional","affiliation":[{"name":"Syracuse University"}]}],"member":"320","published-online":{"date-parts":[[2022,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753614"},{"key":"e_1_3_2_1_2_1","unstructured":"Elli Androulaki Artem Barger Vita Bortnikov Christian Cachin Konstantinos Christidis Angelo De Caro David Enyeart Christopher Ferris Gennady Laventman Yacov Manevich Srinivasan Muralidharan Chet Murthy Binh Nguyen Manish Sethi Gari Singh Keith Smith Alessandro Sorniotti Chrysoula Stathakopoulou Marko Vukolic Sharon Weed Cocco and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. CoRR abs\/1801.10228 (2018). arXiv:1801.10228 http:\/\/arxiv.org\/abs\/1801.10228  Elli Androulaki Artem Barger Vita Bortnikov Christian Cachin Konstantinos Christidis Angelo De Caro David Enyeart Christopher Ferris Gennady Laventman Yacov Manevich Srinivasan Muralidharan Chet Murthy Binh Nguyen Manish Sethi Gari Singh Keith Smith Alessandro Sorniotti Chrysoula Stathakopoulou Marko Vukolic Sharon Weed Cocco and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. CoRR abs\/1801.10228 (2018). arXiv:1801.10228 http:\/\/arxiv.org\/abs\/1801.10228"},{"key":"e_1_3_2_1_3_1","unstructured":"NS-3 contributors. 2022. NS-3: Network Simulator. https:\/\/www.nsnam.org\/. (2022).  NS-3 contributors. 2022. NS-3: Network Simulator. https:\/\/www.nsnam.org\/. (2022)."},{"key":"e_1_3_2_1_4_1","unstructured":"CZ.NIC. 2022. BIRD Internet Routing Daemon. https:\/\/bird.network.cz\/. (2022).  CZ.NIC. 2022. BIRD Internet Routing Daemon. https:\/\/bird.network.cz\/. (2022)."},{"key":"e_1_3_2_1_5_1","unstructured":"Wenliang Du. 2021. SEED Labs: Morris Worm Attack Lab (Demo). Available at https:\/\/www.youtube.com\/watch?v=2VZV-aFoVjk. (2021).  Wenliang Du. 2021. SEED Labs: Morris Worm Attack Lab (Demo). Available at https:\/\/www.youtube.com\/watch?v=2VZV-aFoVjk. (2021)."},{"key":"e_1_3_2_1_6_1","unstructured":"Wenliang Du. 2022. SEED Internet Emulator. Available at https:\/\/seedsecuritylabs.org\/emulator\/. (2022).  Wenliang Du. 2022. SEED Internet Emulator. Available at https:\/\/seedsecuritylabs.org\/emulator\/. (2022)."},{"key":"e_1_3_2_1_7_1","unstructured":"GNS3. 2022. Graphical Network Simulator-3. https:\/\/www.gns3.com\/. (2022).  GNS3. 2022. Graphical Network Simulator-3. https:\/\/www.gns3.com\/. (2022)."},{"key":"e_1_3_2_1_8_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3402413.3402420"},{"key":"e_1_3_2_1_10_1","volume-title":"Hotnets.","author":"Lantz B.","unstructured":"B. Lantz , B. Heller , and N. McKeown . 2010. A Network in a Laptop: Rapid Prototyping for Software-Defined Networks . In Hotnets. Monterey, CA, USA . B. Lantz, B. Heller, and N. McKeown. 2010. A Network in a Laptop: Rapid Prototyping for Software-Defined Networks. In Hotnets. Monterey, CA, USA."},{"key":"e_1_3_2_1_11_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto . 2009 . Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03 2009). Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03 2009)."},{"key":"e_1_3_2_1_12_1","unstructured":"NetSim. 2022. NetSim Network Simulator. https:\/\/www.tetcos.com\/. (2022).  NetSim. 2022. NetSim Network Simulator. https:\/\/www.tetcos.com\/. (2022)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8195"},{"key":"e_1_3_2_1_14_1","unstructured":"Gabriel L. Somlo. 2016. GreyBox: Single-Host Internet Simulator. https:\/\/github.com\/cmu-sei\/greybox. (2016).  Gabriel L. Somlo. 2016. GreyBox: Single-Host Internet Simulator. https:\/\/github.com\/cmu-sei\/greybox. (2016)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 30th USENIX Security Symposium.","author":"Tran Muoi","year":"2021","unstructured":"Muoi Tran , Akshaye Shenoi , and Min Suk Kang . 2021 . On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin . In Proceedings of the 30th USENIX Security Symposium. Muoi Tran, Akshaye Shenoi, and Min Suk Kang. 2021. On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin. In Proceedings of the 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_17_1","volume-title":"The Free Encyclopedia. (2021). https:\/\/en.wikipedia.org\/w\/index.php?title=OPNET&oldid=1019617098 [Online","author":"Wikipedia Wikipedia","year":"2022","unstructured":"Wikipedia contributors. 2021. OPNET --- Wikipedia , The Free Encyclopedia. (2021). https:\/\/en.wikipedia.org\/w\/index.php?title=OPNET&oldid=1019617098 [Online ; accessed 9- January - 2022 ]. Wikipedia contributors. 2021. OPNET --- Wikipedia, The Free Encyclopedia. (2021). https:\/\/en.wikipedia.org\/w\/index.php?title=OPNET&oldid=1019617098 [Online; accessed 9-January-2022]."},{"key":"e_1_3_2_1_18_1","volume-title":"SEEDEMU: The SEED Internet Emulator. Master's thesis","author":"Zeng Honghao","year":"2021","unstructured":"Honghao Zeng . 2021 . SEEDEMU: The SEED Internet Emulator. Master's thesis . Syracuse University . Honghao Zeng. 2021. SEEDEMU: The SEED Internet Emulator. Master's thesis. Syracuse University."}],"event":{"name":"HotNets '22: The 21st ACM Workshop on Hot Topics in Networks","location":"Austin Texas","acronym":"HotNets '22","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 21st ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563766.3564097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3563766.3564097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:50Z","timestamp":1750182530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563766.3564097"}},"subtitle":["an internet emulator for research and education"],"short-title":[],"issued":{"date-parts":[[2022,11,14]]},"references-count":18,"alternative-id":["10.1145\/3563766.3564097","10.1145\/3563766"],"URL":"https:\/\/doi.org\/10.1145\/3563766.3564097","relation":{},"subject":[],"published":{"date-parts":[[2022,11,14]]},"assertion":[{"value":"2022-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}