Validating an Emulation-Based Cybersecurity Model With a Physical Testbed. Huang, H., Wlazlo, P., Sahu, A., Walker, A., Goulart, A. E., Davis, K. R., Swiler, L. P., Tarman, T. D., & Vugrin, E. D. IEEE Trans. Dependable Secur. Comput., 21(4):2997-3011, 07, 2024. Link Paper bibtex @article{journals/tdsc/HuangWSWGDSTV24,
added-at = {2024-07-23T00:00:00.000+0200},
author = {Huang, Hao and Wlazlo, Patrick and Sahu, Abhijeet and Walker, Adele and Goulart, Ana E. and Davis, Katherine R. and Swiler, Laura P. and Tarman, Thomas D. and Vugrin, Eric D.},
biburl = {https://www.bibsonomy.org/bibtex/2bd5211c1cb66c58ea521315d41439877/dblp},
ee = {https://doi.org/10.1109/TDSC.2023.3321176},
interhash = {009993482907efa68b9616d4192c9c49},
intrahash = {bd5211c1cb66c58ea521315d41439877},
journal = {IEEE Trans. Dependable Secur. Comput.},
keywords = {dblp},
month = {07},
number = 4,
pages = {2997-3011},
timestamp = {2024-07-29T07:10:05.000+0200},
title = {Validating an Emulation-Based Cybersecurity Model With a Physical Testbed.},
url = {http://dblp.uni-trier.de/db/journals/tdsc/tdsc21.html#HuangWSWGDSTV24},
volume = 21,
year = 2024
}
Downloads: 0
{"_id":"kMqhP6iw5ALWQkrL4","bibbaseid":"huang-wlazlo-sahu-walker-goulart-davis-swiler-tarman-etal-validatinganemulationbasedcybersecuritymodelwithaphysicaltestbed-2024","author_short":["Huang, H.","Wlazlo, P.","Sahu, A.","Walker, A.","Goulart, A. E.","Davis, K. R.","Swiler, L. P.","Tarman, T. D.","Vugrin, E. D."],"bibdata":{"bibtype":"article","type":"article","added-at":"2024-07-23T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Huang"],"firstnames":["Hao"],"suffixes":[]},{"propositions":[],"lastnames":["Wlazlo"],"firstnames":["Patrick"],"suffixes":[]},{"propositions":[],"lastnames":["Sahu"],"firstnames":["Abhijeet"],"suffixes":[]},{"propositions":[],"lastnames":["Walker"],"firstnames":["Adele"],"suffixes":[]},{"propositions":[],"lastnames":["Goulart"],"firstnames":["Ana","E."],"suffixes":[]},{"propositions":[],"lastnames":["Davis"],"firstnames":["Katherine","R."],"suffixes":[]},{"propositions":[],"lastnames":["Swiler"],"firstnames":["Laura","P."],"suffixes":[]},{"propositions":[],"lastnames":["Tarman"],"firstnames":["Thomas","D."],"suffixes":[]},{"propositions":[],"lastnames":["Vugrin"],"firstnames":["Eric","D."],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2bd5211c1cb66c58ea521315d41439877/dblp","ee":"https://doi.org/10.1109/TDSC.2023.3321176","interhash":"009993482907efa68b9616d4192c9c49","intrahash":"bd5211c1cb66c58ea521315d41439877","journal":"IEEE Trans. Dependable Secur. Comput.","keywords":"dblp","month":"07","number":"4","pages":"2997-3011","timestamp":"2024-07-29T07:10:05.000+0200","title":"Validating an Emulation-Based Cybersecurity Model With a Physical Testbed.","url":"http://dblp.uni-trier.de/db/journals/tdsc/tdsc21.html#HuangWSWGDSTV24","volume":"21","year":"2024","bibtex":"@article{journals/tdsc/HuangWSWGDSTV24,\n added-at = {2024-07-23T00:00:00.000+0200},\n author = {Huang, Hao and Wlazlo, Patrick and Sahu, Abhijeet and Walker, Adele and Goulart, Ana E. and Davis, Katherine R. and Swiler, Laura P. and Tarman, Thomas D. and Vugrin, Eric D.},\n biburl = {https://www.bibsonomy.org/bibtex/2bd5211c1cb66c58ea521315d41439877/dblp},\n ee = {https://doi.org/10.1109/TDSC.2023.3321176},\n interhash = {009993482907efa68b9616d4192c9c49},\n intrahash = {bd5211c1cb66c58ea521315d41439877},\n journal = {IEEE Trans. Dependable Secur. Comput.},\n keywords = {dblp},\n month = {07},\n number = 4,\n pages = {2997-3011},\n timestamp = {2024-07-29T07:10:05.000+0200},\n title = {Validating an Emulation-Based Cybersecurity Model With a Physical Testbed.},\n url = {http://dblp.uni-trier.de/db/journals/tdsc/tdsc21.html#HuangWSWGDSTV24},\n volume = 21,\n year = 2024\n}\n\n","author_short":["Huang, H.","Wlazlo, P.","Sahu, A.","Walker, A.","Goulart, A. E.","Davis, K. R.","Swiler, L. P.","Tarman, T. D.","Vugrin, E. D."],"key":"journals/tdsc/HuangWSWGDSTV24","id":"journals/tdsc/HuangWSWGDSTV24","bibbaseid":"huang-wlazlo-sahu-walker-goulart-davis-swiler-tarman-etal-validatinganemulationbasedcybersecuritymodelwithaphysicaltestbed-2024","role":"author","urls":{"Link":"https://doi.org/10.1109/TDSC.2023.3321176","Paper":"http://dblp.uni-trier.de/db/journals/tdsc/tdsc21.html#HuangWSWGDSTV24"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/Thomas?items=1000","dataSources":["Wze2LBds9bM8uwxm8"],"keywords":["dblp"],"search_terms":["validating","emulation","based","cybersecurity","model","physical","testbed","huang","wlazlo","sahu","walker","goulart","davis","swiler","tarman","vugrin"],"title":"Validating an Emulation-Based Cybersecurity Model With a Physical Testbed.","year":2024}