Show simple item record

dc.contributor.authorSollins, Karen R.
dc.contributor.authorBenzel, Terry
dc.contributor.authorBraden, Bob
dc.contributor.authorFaber, Ted
dc.contributor.authorMirkovic, Jelena
dc.contributor.authorSchwab, Steve
dc.contributor.authorWroclawski, John
dc.date.accessioned2010-10-06T14:50:07Z
dc.date.available2010-10-06T14:50:07Z
dc.date.issued2009-03
dc.identifier.isbn978-0-7695-3568-5
dc.identifier.urihttp://hdl.handle.net/1721.1/58894
dc.description.abstractFrom its inception in 2004, the DETER testbed facility has provided effective, dedicated experimental resources and expertise to a broad range of academic, industrial and government researchers. Now, building on knowledge gained, the DETER developers and community are moving beyond the classic "testbed" model and towards the creation and deployment of fundamentally transformational cybersecurity research methodologies. This paper discusses underlying rationale, together with initial design and implementation, of key technical concepts that drive these transformations.en_US
dc.description.sponsorshipUnited States. Dept. of Homeland Securityen_US
dc.description.sponsorshipSpace and Naval Warfare Systems Center San Diego (U.S.) (contract No. N66001-07-C-2001)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (CNS-0751027)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (CNS-0626904)en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/CATCH.2009.30en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceIEEEen_US
dc.subjectCyber defenseen_US
dc.subjectDETERen_US
dc.subjectResearch Tools and Techniquesen_US
dc.titleCurrent developments in DETER cybersecurity testbed technologyen_US
dc.typeArticleen_US
dc.identifier.citationBenzel, T. et al. “Current Developments in DETER Cybersecurity Testbed Technology.” Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications & Technology. 2009. 57-70. ©2009 Institute of Electrical and Electronics Engineers.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.approverSollins, Karen R.
dc.contributor.mitauthorSollins, Karen R.
dc.relation.journalCybersecurity Applications & Technology Conference For Homeland Security, 2009. CATCH '09en_US
dc.eprint.versionFinal published versionen_US
dc.identifier.pmidINSPEC Accession Number: 10519839
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dspace.orderedauthorsBenzel, Terry; Braden, Bob; Faber, Ted; Mirkovic, Jelena; Schwab, Steve; Sollins, Karen; Wroclawski, Johnen
mit.licensePUBLISHER_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record