{"id":"https://openalex.org/W2216988215","doi":"https://doi.org/10.1109/milcom.2015.7357619","title":"Validation of network simulation model with emulation using example malware","display_name":"Validation of network simulation model with emulation using example malware","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2216988215","doi":"https://doi.org/10.1109/milcom.2015.7357619","mag":"2216988215"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2015.7357619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074072782","display_name":"Scott Brown","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Scott Brown","raw_affiliation_strings":["Secure Mission Solutions"],"affiliations":[{"raw_affiliation_string":"Secure Mission Solutions","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026875183","display_name":"Brian J. Henz","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Henz","raw_affiliation_strings":["U.S. Army Research Laboratory"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Laboratory","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000710027","display_name":"H.K. Brown","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088792","display_name":"United States Army","ror":"https://ror.org/00afsp483","country_code":"US","type":"funder","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I4210088792"]},{"id":"https://openalex.org/I1304082316","display_name":"United States Department of the Army","ror":"https://ror.org/035w1gb98","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harold Brown","raw_affiliation_strings":["U.S. Army CERDEC, I2WD"],"affiliations":[{"raw_affiliation_string":"U.S. Army CERDEC, I2WD","institution_ids":["https://openalex.org/I1304082316","https://openalex.org/I4210088792"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012711260","display_name":"Michael Edwards","orcid":"https://orcid.org/0000-0001-6323-6545"},"institutions":[{"id":"https://openalex.org/I1322124587","display_name":"Booz Allen Hamilton (United States)","ror":"https://ror.org/051rcp357","country_code":"US","type":"company","lineage":["https://openalex.org/I1322124587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Edwards","raw_affiliation_strings":["Booz Allen Hamilton"],"affiliations":[{"raw_affiliation_string":"Booz Allen Hamilton","institution_ids":["https://openalex.org/I1322124587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031464574","display_name":"Michael Russell","orcid":"https://orcid.org/0000-0001-5177-3618"},"institutions":[{"id":"https://openalex.org/I183804699","display_name":"Lockheed Martin (Canada)","ror":"https://ror.org/00rs6n938","country_code":"CA","type":"company","lineage":["https://openalex.org/I1287521167","https://openalex.org/I183804699"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Michael Russell","raw_affiliation_strings":["Lockheed Martin ATL"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin ATL","institution_ids":["https://openalex.org/I183804699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058421519","display_name":"Jonathan L Mercurio","orcid":null},"institutions":[{"id":"https://openalex.org/I183804699","display_name":"Lockheed Martin (Canada)","ror":"https://ror.org/00rs6n938","country_code":"CA","type":"company","lineage":["https://openalex.org/I1287521167","https://openalex.org/I183804699"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jonathan Mercurio","raw_affiliation_strings":["Lockheed Martin ATL"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin ATL","institution_ids":["https://openalex.org/I183804699"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5074072782"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8012,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78818696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1264","last_page":"1269"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.985815167427063},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7968327403068542},{"id":"https://openalex.org/keywords/hardware-emulation","display_name":"Hardware emulation","score":0.5901281833648682},{"id":"https://openalex.org/keywords/simulation","display_name":"Simulation","score":0.47117382287979126},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.45330676436424255},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44687986373901367},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.44541245698928833},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.43627652525901794},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4305232763290405},{"id":"https://openalex.org/keywords/modeling-and-simulation","display_name":"Modeling and simulation","score":0.4302055537700653},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.42964085936546326},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.26183825731277466},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21027827262878418},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.15454337000846863},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10056540369987488}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.985815167427063},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7968327403068542},{"id":"https://openalex.org/C94115699","wikidata":"https://www.wikidata.org/wiki/Q5656406","display_name":"Hardware emulation","level":3,"score":0.5901281833648682},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.47117382287979126},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.45330676436424255},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44687986373901367},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.44541245698928833},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.43627652525901794},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4305232763290405},{"id":"https://openalex.org/C167343916","wikidata":"https://www.wikidata.org/wiki/Q6888384","display_name":"Modeling and simulation","level":2,"score":0.4302055537700653},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.42964085936546326},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26183825731277466},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21027827262878418},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.15454337000846863},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10056540369987488},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2015.7357619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1971759682","https://openalex.org/W2017048870","https://openalex.org/W2115505574","https://openalex.org/W2127654839","https://openalex.org/W2324582580","https://openalex.org/W4233066504"],"related_works":["https://openalex.org/W2170071008","https://openalex.org/W2106791114","https://openalex.org/W2103996454","https://openalex.org/W3029775214","https://openalex.org/W2390650884","https://openalex.org/W2001552871","https://openalex.org/W2129151116","https://openalex.org/W1732045461","https://openalex.org/W2356462020","https://openalex.org/W2578708929"],"abstract_inverted_index":{"Under":[0],"the":[1,26,40,43,55,59,65,69,87,102,128],"Cyber":[2],"Army":[3],"Modeling":[4],"and":[5,34,68,95],"Simulation":[6],"(CyAMS)":[7],"program,":[8],"a":[9,151],"model":[10,47,67],"validation":[11,41],"was":[12,48],"conducted":[13],"using":[14,36],"data":[15],"from":[16],"an":[17,123],"emulated":[18,70],"network":[19,32],"for":[20,150,156],"malware":[21],"propagation":[22],"to":[23,126,154],"compare":[24],"against":[25],"CyAMS":[27,66],"finite":[28,44],"state":[29,45],"representation":[30],"of":[31,130,142,144],"nodes":[33],"processes":[35],"behavioral":[37],"simulation.":[38],"During":[39],"process,":[42],"machine":[46],"effective":[49,110,124],"in":[50,54,77,115,134],"identifying":[51],"important":[52],"caveats":[53],"emulation":[56,88,112,131,155],"tests.":[57],"Once":[58],"experimental":[60],"parameters":[61],"were":[62],"correctly":[63],"defined,":[64],"networks":[71],"showed":[72],"similar":[73],"outcomes.":[74],"The":[75,99],"simulation":[76,105,119,152],"this":[78,157],"case":[79],"utilized":[80],"at":[81],"most":[82],"3":[83],"CPU":[84],"cores,":[85],"whereas":[86],"approach":[89],"required":[90,149],"roughly":[91],"2,000":[92],"real":[93],"computers":[94],"14,800":[96],"virtual":[97],"machines.":[98],"results":[100,120],"highlight":[101],"possibility":[103],"that":[104,139],"methods":[106],"can":[107,121],"be":[108,122],"as":[109,111],"test":[113,159],"beds":[114],"selected":[116],"cases.":[117,136],"Further,":[118],"tool":[125],"verify":[127],"goals":[129],"based":[132],"experiments":[133],"some":[135],"Results":[137],"demonstrated":[138],"several":[140],"orders":[141],"magnitude":[143],"less":[145],"computing":[146],"resources":[147],"are":[148],"compared":[153],"particular":[158],"case.":[160]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
