Publications

Citations

If you are writing a paper about your experimentation done in the CyberVAN testbed environment, please cite relevant papers by the CyberVAN team. This also helps us track how CyberVAN is being used by the cyber community. Also, please keep in mind that even if a full citation may not be warranted, any use of the CyberVAN testbed and/or documentation should be acknowledged.

The primary CyberVAN paper to cite is:

  • Chadha, Ritu, Thomas Bowen, Cho-Yu J. Chiang, Yitzchak M. Gottlieb, Alex Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, G. Walther, L. Marvel, A, Newcomb, and J. Santos, "CyberVAN: A cyber security virtual assured network testbed." In MILCOM 2016-2016 IEEE Military Communications Conference, pp. 1125-1130. IEEE, 2016.

Publications

  1. Poylisher, A., A. Cichocki, K. Guo, J. Hunziker, L. Kant, B. Krishnamachari, S. Avestimehr, and M. Annavaram. Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs. In MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), pp. 102-107. IEEE.
  2. K. Steverson, C. Carlin, J. Mullin and M. Ahiskali,Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs. 2021 International Conference on Military Communication and Information Systems (ICMCIS), 2021, pp. 1-7.
  3. Alexander Poylisher, Matthew Witkowski, Vladislav D. Veksler, Blaine E. Hoffman, and Norbou Buchler. Recording Human Operator Data in Cyber Environments: User Activity Tracker (UAT) Technical Report. Data And Analysis Center, Aberdeen Proving Ground, MD, 2020.
  4. Palvi Aggarwal, Omkar Thakoor, Aditya Mate, Milind Tambe, Edward A. Cranford, Christian Lebiere, and Cleotilde Gonzalez.“An Exploratory Study of a Masking Strategy of Cyberdeception Using CyberVAN.” In 64th Human Factors and Ergonomics Society (HFES) Annual Conference, 10/2020.
  5. S. Sugrim, A. Poylisher, J. Plastine and A. Newcomb.  “Hybrid Network Emulation with Cyber and Electronic Warfare Effects”, Journal of Cyber Security and Information Systems, Vol. 7, No. 3, December 2019.
  6. Sridhar Venkatesan, Jason A. Youzwak, Shridatt Sugrim, Cho-Yu J. Chiang, Alexander Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, Ritu Chadha, E. Allison Newcomb, Blaine Hoffman, Norbou Buchler.  “VulnerVAN: A Vulnerable Network Generation Tool”, In Proceedings of the IEEE MILCOM 2019, Norfolk, VA, 11–14 November 2019.
  7. Venkatesan, S., Albanese, M., Chiang, C.Y.J., Sapello, A. & Chadha, R.  “DeBot: A Novel Network-based Mechanism to Detect Exfiltration by Architectural Stealthy Botnets”, Security and Privacy, Wiley, 2018.
  8. Shridatt Sugrim, Sridhar Venkatesan, Jason Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese and Hasan Cam, “Measuring the Effectiveness of Network Deception”, Proceedings of the 2018 IEEE Intelligence and Security Informatics (ISI), Miami, USA, November 2018.
  9. Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Ritu Chadha, Massimiliano Albanese and Hasan Cam, “On Defensive Cyber Deception: A Case Study Using SDN”, in Proceedings of the IEEE MILCOM 2018, Los Angeles, CA, 29—31 October 2018.
  10. Sridhar Venkatesan, Shridatt Sugrim, Rauf Izmailov, Cho-Yu Jason Chiang and Ritu Chadha, Bharat Doshi, Blaine Hoffman, Allison Newcomb, Norbou Buchler, “On Detecting Manifestation of Adversary Characteristics”, in Proceedings of the IEEE MILCOM 2018, Los Angeles, CA, 29—31 October 2018.
  11. Vladislav Daniel Veksler, Norbou Buchler, Blaine E Hoffman, Daniel N Cassenti, Char Sample, Shridatt Sugrim, “Simulations in Cybersecurity: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users”, in in Frontiers in Psychology - Section Cognitive Science, May 2018
  12. A. Sapello, C. Serban, R. Chadha, R. Izmailov, “Application of Learning Using Privileged Information (LUPI): Botnet Detection”, Workshop on Network Security Analytics and Automation (NSAA), 26th International Conference on Computer Communication and Networks (ICCCN), 2017.
  13. Constantin Serban, A. Sapello, A. Ghosh, R. Chadha, M. De Lucia, L. Nandi, “Anomaly Detection of Network Traffic Based on Opaque Data” in IST-145 Specialists’ Meeting on Predictive Analytics and Analysis in the Cyber Domain, October 11-12, 2017, Sibiu, Romania.
  14. R. Chadha, T. Bowen, C.J. Chiang, Y.M. Gottlieb, A. Poylisher, A. Sapello, C. Serban, S. Sugrim, G. Walther, L. Marvel, A, Newcomb, and J. Santos,  “CyberVAN: A Cyber Security Virtual Assured Network Testbed”, IEEE MILCOM 2016.
  15. T. Bowen, A. Poylisher, C. Serban, R. Chadha, C.J. Chiang and L. Marvel,  “Enabling Reproducible Cyber Research - Four Labeled Datasets”, MILCOM 2016.
  16. Constantin Serban and Alexander Poylisher,  “Increasing the Reliability and Productivity of Cyber Testing via Experiment Speedup", 30th Annual International Test and Evaluation Symposium, 2013, Washington, DC.
  17. C. Jason Chiang, Alex Poylisher, Yitzchak Gottlieb and Constantin Serban, “Cyber Testing Tools and Methodologies”, 30th Annual International Test and Evaluation Symposium, 2013, Washington, DC.
  18. C. Jason Chiang and Constantin Serban, “TimeFlex: Time Alignment for Improved Accuracy in Distributed Testing”, 30th Annual International Test and Evaluation Symposium, 2013, Washington, DC.
  19. Constantin Serban and Alexander Poylisher, “Increasing the Reliability and Productivity of Cyber Testing via Experiment Speedup”, 30th Annual International Test and Evaluation Symposium, 2013, Washington, DC.
  20. Alexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang.  “Building an Operation Support System for a Fast Reconfigurable Network Experimentation Testbed”, Proceedings of the IEEE Conference on Military Communications, MILCOM 2012.
  21. F. Sultan, A. Poylisher, J. Lee, C. Serban, C.J. Chiang, R. Chadha. K. Whittaker, C. Scilla, S. Ali, “TimeSync: Enabling scalable, high-fidelity hybrid network emulation”, Proceedings of the 15th ACM International conference on Modeling, analysis and simulation of wireless and mobile systems, MSWiM ‘12, Paphos, Cyprus, October 2012, pp. 185–194.
  22. Florin Sultan, Alex Poylisher, John Lee, Constantin Serban, C. Jason Chiang, Ritu Chadha, Keith Whittaker, Chris Scilla and Syeed Ali, “TimeSync – Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation”, Proceedings of MILCOM 2012, Orlando, Florida, November 2012.
  23. Chang-Han Jong, Taichuan Lu and Cho-Yu Jason Chiang, “Storage Deduplication and Management for Application Testing over a Virtual Network Testbed”, Proceedings of the 7th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2011), Shanghai, China, March 2011.
  24. Alexander Poylisher, Taichuan Lu, Constantin Serban, John Lee, Ritu Chadha, Cho-Yu Jason Chiang, Kimberly Jakubowski, Keith Whittaker and Rocio Bauer, “Realistic Modeling of Tactical Networks with Multi-Level Security in VAN Testbeds”, in Proceedings of MILCOM 2010, San Jose, USA, October 2010.
  25. Alexander Poylisher, Constantin Serban, John Lee, Ted Lu, Ritu Chadha, Cho-Yu Jason Chiang, “A Virtual Ad Hoc Network Testbed”, International Journal on Communication Networks and Distributed Systems, 2010.
  26. Constantin Serban, Alexander Poylisher, Cho-Yu Jason Chiang. “Virtual ad hoc network testbeds for network-aware applications”. Proceedings of the IEEE/IFIP Network Operations and Management Symposium, NOMS 2010.
  27. Alexander Poylisher, Constantin Serban, John Lee, Ted Lu, Ritu Chadha, Cho-Yu Jason Chiang, “Virtual Ad hoc Network Testbeds for High Fidelity Testing of Tactical Network Applications”, MILCOM 2009, Boston, USA, October 2009.
  28. Pratik K. Biswas, Constantin Serban, Alex Poylisher, John Lee, Siun-Chuon Mau, Ritu Chadha, Cho-Yu J. Chiang, “An Integrated Testbed for Mobile Ad hoc Networks”, in Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2009), Fairfax, Virginia, April 2009.