1. [1] Benzel, T., Braden, B., Faber, T., Mirkovic, J., Schwab, S., Sollins, K. and Wroclawski, J.: Current Developments in DETER Cybersecurity Testbed Technology, Proc. Cybersecurity Applications & Technology Conference For Homeland Security (CATCH 2009) (Mar. 2009).
2. [2] Benzel, T., Mirkovic, J., et al.: The DETER Project-Advancing the Science of Cyber Security Experimentation and Test, IEEE HST 2010 Conf., Boston, MA (Nov. 2010).
3. [3] Heelan, S.: Vulnerability Detection Systems: Think Cyborg, Not Robot, IEEE Security and Privacy, special issue “The Science of Security, ” Vol.9, No.3 (May/June 2011).
4. [4] Hardaker, W., Kindred, D., Ostrenga, R., Sterne, D. and Thomas, R.: Justification and Requirements for a National DDoS Defense Technology Evaluation Facility, Network Associates Laboratories Report (July 2002).
5. [6] Weaver, N., Hamadeh, I., Kesidis, G. and Paxson, V.: Preliminary results using scale-down to explore worm dynamics, Proc. 2004 ACM Workshop on Rapid Malcode, pp.65-72 (2004).