{"id":"https://openalex.org/W2286187960","doi":"https://doi.org/10.1109/gcce.2015.7398527","title":"A study on attacker agent in virtual machine-based network security learning system","display_name":"A study on attacker agent in virtual machine-based network security learning system","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2286187960","doi":"https://doi.org/10.1109/gcce.2015.7398527","mag":"2286187960"},"language":"en","primary_location":{"id":"doi:10.1109/gcce.2015.7398527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2015.7398527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063244566","display_name":"Kazuki Fukuyama","orcid":null},"institutions":[{"id":"https://openalex.org/I916559398","display_name":"Kindai University","ror":"https://ror.org/05kt9ap64","country_code":"JP","type":"education","lineage":["https://openalex.org/I916559398"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazuki Fukuyama","raw_affiliation_strings":["Graduate School of Science and Engineering Research, Kinki University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Engineering Research, Kinki University, Osaka, Japan","institution_ids":["https://openalex.org/I916559398"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014762803","display_name":"Yoshiaki Taniguchi","orcid":"https://orcid.org/0000-0001-7892-1959"},"institutions":[{"id":"https://openalex.org/I916559398","display_name":"Kindai University","ror":"https://ror.org/05kt9ap64","country_code":"JP","type":"education","lineage":["https://openalex.org/I916559398"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiaki Taniguchi","raw_affiliation_strings":["Department of Informatics, Kinki University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Kinki University, Osaka, Japan","institution_ids":["https://openalex.org/I916559398"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046428624","display_name":"Nobukazu Iguchi","orcid":null},"institutions":[{"id":"https://openalex.org/I916559398","display_name":"Kindai University","ror":"https://ror.org/05kt9ap64","country_code":"JP","type":"education","lineage":["https://openalex.org/I916559398"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nobukazu Iguchi","raw_affiliation_strings":["Department of Informatics, Kinki University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Kinki University, Osaka, Japan","institution_ids":["https://openalex.org/I916559398"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063244566"],"corresponding_institution_ids":["https://openalex.org/I916559398"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16499694,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"j96 d","issue":null,"first_page":"21","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8125,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8125,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13924","display_name":"Internet of Things and Social Network Interactions","score":0.7824000120162964,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.7613000273704529,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7859807014465332},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.6776435971260071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6651039123535156},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6548013687133789},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.6490291953086853},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.5496929883956909},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.4715678095817566},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4488362669944763},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4271276593208313},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38308244943618774},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3758467435836792},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.32949307560920715},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.31824469566345215},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1670810878276825},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10892829298973083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7859807014465332},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.6776435971260071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6651039123535156},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6548013687133789},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.6490291953086853},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.5496929883956909},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.4715678095817566},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4488362669944763},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4271276593208313},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38308244943618774},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3758467435836792},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.32949307560920715},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.31824469566345215},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1670810878276825},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10892829298973083}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcce.2015.7398527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2015.7398527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1519114293","https://openalex.org/W2744631404","https://openalex.org/W130517179","https://openalex.org/W2151761340","https://openalex.org/W3012238031","https://openalex.org/W2375663084","https://openalex.org/W2348947824","https://openalex.org/W2339586525","https://openalex.org/W2372674753","https://openalex.org/W2370916430"],"abstract_inverted_index":{"Education":[0],"of":[1,8,16,95],"network":[2,20,36,46,53,61],"security":[3,21,37,54],"has":[4],"attracted":[5],"a":[6,44,52,59,88,100],"lot":[7],"attentions":[9],"due":[10],"to":[11,42],"increasing":[12],"unauthorized":[13],"access,":[14],"lack":[15],"engineers":[17],"who":[18],"have":[19,50],"skills,":[22],"and":[23,69],"so":[24,65],"on.":[25],"Although":[26],"practice":[27,71],"using":[28],"actual":[29],"computer":[30,45],"networks":[31],"is":[32],"highly":[33],"important":[34],"for":[35,47,91],"education,":[38],"it":[39],"requires":[40],"costs":[41],"prepare":[43],"practice.":[48],"We":[49],"proposed":[51],"learning":[55,94],"system":[56],"by":[57],"constructing":[58],"virtual":[60,101],"on":[62,99],"one":[63],"PC":[64],"that":[66,83],"low-cost,":[67],"easy":[68],"safe":[70],"can":[72],"be":[73],"accomplished.":[74],"In":[75],"this":[76],"paper,":[77],"we":[78],"introduce":[79],"an":[80],"attacker":[81],"agent":[82],"automatically":[84],"attacks":[85],"servers":[86],"in":[87],"fixed":[89],"pattern":[90],"supporting":[92],"practical":[93],"defense":[96],"techniques":[97],"safely":[98],"network.":[102]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
