1. Arnes, A., Haas, P., Vigna, G., Kemmerer, R.A.: Using a virtual security testbed for digital forensic reconstruction. J. Comput. Virol. 2(4), 275–289 (2007)
2. Benzel, T.: The science of cyber security experimentation: the deter project. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 137–148. ACM, New York (2011)
3. Chen, L.: Construction of the new generation network security testbed-Testbed@ TWISC: integration and implementation on software aspect. Institute of Computer and Communication, National Cheng Kung University, Tainan (2008)
4. Duchamp, D., de Angelis, G.: A hypervisor based security testbed. In: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, DETER, Berkeley. USENIX Association (2007)
5. Hofstede, R., Celeda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A.: Flow monitoring explained: from packet capture to data analysis with Netflow and IPFIX. IEEE Commun. Surv. Tutor. 16(4), 2037–2064 (2014)