{"id":"https://openalex.org/W2057421182","doi":"https://doi.org/10.1109/milcom.2011.6127499","title":"A Live-Virtual-Constructive (LVC) framework for cyber operations test, evaluation and training","display_name":"A Live-Virtual-Constructive (LVC) framework for cyber operations test, evaluation and training","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2057421182","doi":"https://doi.org/10.1109/milcom.2011.6127499","mag":"2057421182"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127499","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127499","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087965733","display_name":"Maneesh Varshney","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104818","display_name":"Scalable Network Technologies (United States)","ror":"https://ror.org/01jccpq86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210104818"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Maneesh Varshney","raw_affiliation_strings":["Scalable Network Technologies, Inc., Los Angeles, CA, USA","Scalable Network Technologies, Inc, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Scalable Network Technologies, Inc., Los Angeles, CA, USA","institution_ids":["https://openalex.org/I4210104818"]},{"raw_affiliation_string":"Scalable Network Technologies, Inc, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I4210104818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017159205","display_name":"Kent Pickett","orcid":null},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]},{"id":"https://openalex.org/I4210104818","display_name":"Scalable Network Technologies (United States)","ror":"https://ror.org/01jccpq86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210104818"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kent Pickett","raw_affiliation_strings":["MITRE Corporation, Fort Leavenworth, KS, USA","Scalable Network Technologies, Inc, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"MITRE Corporation, Fort Leavenworth, KS, USA","institution_ids":["https://openalex.org/I44896327"]},{"raw_affiliation_string":"Scalable Network Technologies, Inc, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I4210104818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021806824","display_name":"Rajive Bagrodia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104818","display_name":"Scalable Network Technologies (United States)","ror":"https://ror.org/01jccpq86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210104818"]},{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajive Bagrodia","raw_affiliation_strings":["Scalable Network Technologies, Inc., Los Angeles, CA, USA","MITRE Corporation, Ft. Leavenworth, KS, USA"],"affiliations":[{"raw_affiliation_string":"Scalable Network Technologies, Inc., Los Angeles, CA, USA","institution_ids":["https://openalex.org/I4210104818"]},{"raw_affiliation_string":"MITRE Corporation, Ft. Leavenworth, KS, USA","institution_ids":["https://openalex.org/I44896327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087965733"],"corresponding_institution_ids":["https://openalex.org/I4210104818"],"apc_list":null,"apc_paid":null,"fwci":0.8464,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.77220389,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"31","issue":null,"first_page":"1387","last_page":"1392"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7230379581451416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6786938905715942},{"id":"https://openalex.org/keywords/battlespace","display_name":"Battlespace","score":0.6569615602493286},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6198016405105591},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.4729088246822357},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.467454731464386},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.44057878851890564},{"id":"https://openalex.org/keywords/constructive","display_name":"Constructive","score":0.4391053318977356},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.437914103269577},{"id":"https://openalex.org/keywords/interdiction","display_name":"Interdiction","score":0.42055776715278625},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.41817522048950195},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.4119487702846527},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3272486925125122},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24305593967437744},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16992583870887756},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15961319208145142}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7230379581451416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6786938905715942},{"id":"https://openalex.org/C2781438671","wikidata":"https://www.wikidata.org/wiki/Q1002407","display_name":"Battlespace","level":2,"score":0.6569615602493286},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6198016405105591},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.4729088246822357},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.467454731464386},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.44057878851890564},{"id":"https://openalex.org/C2778701210","wikidata":"https://www.wikidata.org/wiki/Q28130034","display_name":"Constructive","level":3,"score":0.4391053318977356},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.437914103269577},{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.42055776715278625},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.41817522048950195},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.4119487702846527},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3272486925125122},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24305593967437744},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16992583870887756},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15961319208145142},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2011.6127499","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127499","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2151993488","https://openalex.org/W2161727888","https://openalex.org/W3143746516"],"related_works":["https://openalex.org/W213102813","https://openalex.org/W285931958","https://openalex.org/W2019917990","https://openalex.org/W86804927","https://openalex.org/W1979318261","https://openalex.org/W2898126008","https://openalex.org/W1583098994","https://openalex.org/W2386447999","https://openalex.org/W1646895291","https://openalex.org/W1980140653"],"abstract_inverted_index":{"Current":[0],"simulations":[1],"supporting":[2],"the":[3,11,49,55,58,62,80,141,153,201,208,212,215,249,288,296],"Net-Centric":[4],"Test":[5,279,302],"battlespace":[6],"do":[7],"not":[8],"accurately":[9],"represent":[10],"impact":[12],"of":[13,32,51,70,84,94,108,112,131,157,197,214,232,248,266],"cyber":[14,20,45,164,198,242,283],"threats":[15,21,53,71,95,100,114,199,216,284],"and":[16,82,120,155,230,257,268,303,307],"information":[17],"operations.":[18],"When":[19],"are":[22,25,65],"considered,":[23],"they":[24],"typically":[26,66],"limited":[27,67],"to":[28,44,68,124,135,147,150,162,200,210,252,264,313,316],"a":[29,88,137,185,191],"small":[30],"number":[31],"isolated":[33],"physical":[34,113,276],"devices.":[35],"To":[36],"further":[37],"limit":[38],"consideration,":[39],"insufficient":[40],"attention":[41],"is":[42,96,115,122,134],"paid":[43],"attacks":[46,259],"launched":[47],"on":[48,260],"basis":[50],"passive":[52],"like":[54],"eavesdroppers":[56],"or":[57],"coordinated":[59,256],"threats.":[60,127],"Further,":[61],"test":[63,143,152],"technologies":[64],"incorporation":[69],"that":[72,169,189,285],"can":[73,274],"be":[74],"realized":[75],"physically,":[76],"which":[77],"limits":[78],"both":[79,171],"scale":[81],"sophistication":[83],"representing":[85],"such":[86,101],"attacks;":[87],"Live-Virtual-Constructive":[89,186],"(LVC)":[90,187],"paradigm":[91],"for":[92,99,195,240,292],"modeling":[93],"missing.":[97],"Lastly,":[98],"as":[102],"jamming,":[103],"wormhole":[104],"attacks,":[105,110,165],"large-scale":[106],"Denial":[107],"Service":[109],"use":[111],"expensive,":[116],"since":[117],"specialized":[118],"equipment":[119],"manpower":[121],"required":[123],"realize":[125],"these":[126,132],"The":[128,235,271],"net":[129],"consequence":[130],"deficiencies":[133],"leave":[136],"major":[138],"gap":[139],"in":[140,167,217],"DoD":[142],"infrastructure":[144],"with":[145,262,281,300],"respect":[146],"our":[148],"ability":[149,209],"realistically":[151],"vulnerabilities":[154],"resiliency":[156],"Blue":[158,219],"Force":[159,176,220],"communication":[160,177],"architectures":[161],"sophisticated":[163],"particularly":[166],"networks":[168,261],"include":[170,253],"current":[172],"force":[173],"&":[174],"Future":[175],"infrastructure.":[178,204],"In":[179],"this":[180],"paper,":[181],"we":[182],"present":[183],"StealthNet,":[184],"framework":[188,237,297],"provides":[190,207,238],"real-time,":[192],"hardware-in-the-loop":[193],"capability":[194],"simulation":[196,244],"entire":[202],"net-centric":[203],"It":[205],"also":[206],"evaluate":[211],"effectiveness":[213],"disrupting":[218],"communications":[221],"via":[222],"key":[223],"performance":[224],"indicators,":[225],"i.e.":[226],"bandwidth,":[227],"reliability,":[228],"delay":[229],"quality":[231],"service":[233],"metrics.":[234],"StealthNet":[236],"models":[239],"accurate":[241],"threat":[243],"at":[245],"all":[246,287],"layers":[247,291],"networking":[250],"stack":[251,290],"passive,":[254],"active,":[255],"adaptive":[258],"hundreds":[263],"thousands":[265],"wired":[267],"wireless":[269],"components.":[270],"LVC":[272],"technology":[273],"stimulate":[275],"Networked-System":[277],"Under":[278],"(NSUT)":[280],"simulated":[282],"span":[286],"protocol":[289],"real-time":[293],"testing.":[294],"Additionally,":[295],"enables":[298],"composability":[299],"existing":[301],"Evaluation":[304],"(T&E)":[305],"architecture":[306],"tools":[308],"(TENA,":[309],"SBE":[310],"environments,":[311],"etc)":[312],"facilitate":[314],"transition":[315],"other":[317],"T&E":[318],"programs.":[319]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
