{"updated":"2025-01-21T13:40:10.143203+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00095634","sets":["5471:6674:7292"]},"path":["7292"],"owner":"11","recid":"95634","title":["The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-10-15"},"_buckets":{"deposit":"0dfe2d3d-801b-4286-935c-cd0cbe97fff4"},"_deposit":{"id":"95634","pid":{"type":"depid","value":"95634","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation"},{"subitem_title":"The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[Special Issue on Computer Security Technology Achieving Smart Society (Invited Paper)] cyber-security, testbed, experimental research","subitem_subject_scheme":"Other"}]},"item_type_id":"5","publish_date":"2012-10-15","item_5_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"USC Information Sciences Institute"},{"subitem_text_value":"USC Information Sciences Institute"}]},"item_5_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"USC Information Sciences Institute","subitem_text_language":"en"},{"subitem_text_value":"USC Information Sciences Institute","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/95634/files/IPSJ-JIP2004004.pdf"},"date":[{"dateType":"Available","dateValue":"2014-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JIP2004004.pdf","filesize":[{"value":"950.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"a39325d2-9537-4166-8ad9-3d97d2ce7010","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2012 by the Information Processing Society of Japan"}]},"item_5_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Terry, Benzel"},{"creatorName":"John, Wroclawski"}],"nameIdentifiers":[{}]}]},"item_5_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Terry, Benzel","creatorNameLang":"en"},{"creatorName":"John, Wroclawski","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_5_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00700121","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_5_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-6652","subitem_source_identifier_type":"ISSN"}]},"item_5_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"It is widely argued that today's largely reactive, “respond and patch” approach to securing cyber systems must yield to a new, more rigorous, more proactive methodology. Achieving this transformation is a difficult challenge. Building on insights into requirements for cyber science and on experience gained through 8 years of operation, the DETER project is addressing one facet of this problem: the development of transformative advances in methodology and facilities for experimental cybersecurity research and system evaluation. These advances in experiment design and research methodology are yielding progressive improvements not only in experiment scale, complexity, diversity, and repeatability, but also in the ability of researchers to leverage prior experimental efforts of others within the community. We describe in this paper the trajectory of the DETER project towards a new experimental science and a transformed facility for cyber-security research development and evaluation. ","subitem_description_type":"Other"}]},"item_5_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It is widely argued that today's largely reactive, “respond and patch” approach to securing cyber systems must yield to a new, more rigorous, more proactive methodology. Achieving this transformation is a difficult challenge. Building on insights into requirements for cyber science and on experience gained through 8 years of operation, the DETER project is addressing one facet of this problem: the development of transformative advances in methodology and facilities for experimental cybersecurity research and system evaluation. These advances in experiment design and research methodology are yielding progressive improvements not only in experiment scale, complexity, diversity, and repeatability, but also in the ability of researchers to leverage prior experimental efforts of others within the community. We describe in this paper the trajectory of the DETER project towards a new experimental science and a transformed facility for cyber-security research development and evaluation. ","subitem_description_type":"Other"}]},"item_5_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"834","bibliographic_titles":[{"bibliographic_title":"Journal of information processing"}],"bibliographicPageStart":"824","bibliographicIssueDates":{"bibliographicIssueDate":"2012-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"20"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-18T23:42:39.696985+00:00","id":95634,"links":{}}