{"id":"https://openalex.org/W2564685118","doi":"https://doi.org/10.1109/milcom.2016.7795375","title":"Validation of network simulation model and scalability tests using example malware","display_name":"Validation of network simulation model and scalability tests using example malware","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2564685118","doi":"https://doi.org/10.1109/milcom.2016.7795375","mag":"2564685118"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2016.7795375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074072782","display_name":"Scott Brown","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Scott Brown","raw_affiliation_strings":["Secure Mission Solutions"],"affiliations":[{"raw_affiliation_string":"Secure Mission Solutions","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000710027","display_name":"H.K. Brown","orcid":null},"institutions":[{"id":"https://openalex.org/I1304082316","display_name":"United States Department of the Army","ror":"https://ror.org/035w1gb98","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796"]},{"id":"https://openalex.org/I4210088792","display_name":"United States Army","ror":"https://ror.org/00afsp483","country_code":"US","type":"funder","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harold Brown","raw_affiliation_strings":["U.S. Army CERDEC, I2WD"],"affiliations":[{"raw_affiliation_string":"U.S. Army CERDEC, I2WD","institution_ids":["https://openalex.org/I1304082316","https://openalex.org/I4210088792"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031464574","display_name":"Michael Russell","orcid":"https://orcid.org/0000-0001-5177-3618"},"institutions":[{"id":"https://openalex.org/I183804699","display_name":"Lockheed Martin (Canada)","ror":"https://ror.org/00rs6n938","country_code":"CA","type":"company","lineage":["https://openalex.org/I1287521167","https://openalex.org/I183804699"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Michael Russell","raw_affiliation_strings":["Lockheed Martin ATL"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin ATL","institution_ids":["https://openalex.org/I183804699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026875183","display_name":"Brian J. Henz","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Henz","raw_affiliation_strings":["U.S. Army Research Laboratory"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Laboratory","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012711260","display_name":"Michael Edwards","orcid":"https://orcid.org/0000-0001-6323-6545"},"institutions":[{"id":"https://openalex.org/I1322124587","display_name":"Booz Allen Hamilton (United States)","ror":"https://ror.org/051rcp357","country_code":"US","type":"company","lineage":["https://openalex.org/I1322124587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Edwards","raw_affiliation_strings":["Booz Allen Hamilton"],"affiliations":[{"raw_affiliation_string":"Booz Allen Hamilton","institution_ids":["https://openalex.org/I1322124587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112062016","display_name":"Frank M. Turner","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162143","display_name":"QED Technologies (United States)","ror":"https://ror.org/04wz8fg60","country_code":"US","type":"company","lineage":["https://openalex.org/I4210162143"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frank Turner","raw_affiliation_strings":["QED Systems, LLC"],"affiliations":[{"raw_affiliation_string":"QED Systems, LLC","institution_ids":["https://openalex.org/I4210162143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083560297","display_name":"Giorgio Bertoli","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088792","display_name":"United States Army","ror":"https://ror.org/00afsp483","country_code":"US","type":"funder","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I4210088792"]},{"id":"https://openalex.org/I1304082316","display_name":"United States Department of the Army","ror":"https://ror.org/035w1gb98","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Giorgio Bertoli","raw_affiliation_strings":["U.S. Army CERDEC, I2WD"],"affiliations":[{"raw_affiliation_string":"U.S. Army CERDEC, I2WD","institution_ids":["https://openalex.org/I1304082316","https://openalex.org/I4210088792"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5074072782"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.17614846,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"491","last_page":"496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.9039965271949768},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864646315574646},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7582937479019165},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.5906795859336853},{"id":"https://openalex.org/keywords/simulation","display_name":"Simulation","score":0.4872266352176666},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41845694184303284},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4162336587905884},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2670878767967224},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1124849021434784},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08657488226890564}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.9039965271949768},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864646315574646},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7582937479019165},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.5906795859336853},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.4872266352176666},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41845694184303284},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4162336587905884},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2670878767967224},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1124849021434784},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08657488226890564},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2016.7795375","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2017048870","https://openalex.org/W2069806313","https://openalex.org/W2216988215"],"related_works":["https://openalex.org/W2154523322","https://openalex.org/W2083200807","https://openalex.org/W2226403433","https://openalex.org/W2375222014","https://openalex.org/W2163987450","https://openalex.org/W2578708929","https://openalex.org/W2356462020","https://openalex.org/W2339736648","https://openalex.org/W2938156595","https://openalex.org/W636538548"],"abstract_inverted_index":{"The":[0,143],"design":[1],"of":[2,26,79,108,131],"a":[3,136,157],"new":[4,96],"behavioral":[5],"simulator,":[6],"under":[7],"the":[8,17,41,53,67,72,77,80,83,95,102,111,116,127,132,148,151],"Cyber":[9],"Army":[10],"Modeling":[11],"and":[12,40,55,66,115],"Simulation":[13],"(CyAMS)":[14],"program":[15],"features":[16],"ability":[18],"to":[19,50,93,154,156],"model":[20,85,105,134],"various":[21],"cyber":[22],"effects":[23],"including":[24,135],"propagation":[25],"malicious":[27],"software.":[28],"Previous":[29],"work":[30],"is":[31,48,106],"expanded":[32],"using":[33],"data":[34],"from":[35],"both":[36,110],"an":[37],"emulated":[38,68],"network,":[39,82],"validated":[42],"ns-3":[43,84,118],"simulation":[44,104],"model.":[45],"Behavioral":[46],"modeling":[47],"used":[49,92],"break":[51],"up":[52],"network":[54],"applications":[56],"into":[57],"individual":[58],"behaviors,":[59],"allowing":[60],"for":[61,150],"accurate":[62],"mapping":[63],"between":[64],"simulators,":[65],"applications.":[69],"By":[70],"scaling":[71,129],"previous":[73,117],"validation":[74,119],"tests":[75,125],"beyond":[76],"limit":[78],"emulation":[81,112],"can":[86],"show":[87,126,147],"potential":[88,128,149],"scalability,":[89],"while":[90],"being":[91],"validate":[94],"CyAMS":[97,103,133,152],"simulator.":[98],"Results":[99],"demonstrate":[100],"that":[101],"capable":[107],"matching":[109],"based":[113],"experiments":[114],"experiment":[120],"results.":[121],"In":[122],"addition,":[123],"several":[124],"power":[130],"test":[137,145],"featuring":[138],"~1":[139],"billion":[140],"virtual":[141],"hosts.":[142],"scalability":[144],"results":[146],"simulator":[153],"scale":[155],"global":[158],"size":[159],"network.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
