W. Adams, E. Gavas, T. Lacey, and S. Leblanc, Collective views of the NSA/CSS cyber defense exercise on curricula and learning objectives, Proceedings of the Second Conference on Cyber Security Experimentation and Test, 2009.

R. Flux and . Group, Emulab bibliography, School of Computing

C. Hepner and E. Zmijewski, Defending against BGP man-in-the-middle attacks, presented at the Black Hat DC Conference, 2009.

H. Jones, Network Weathermap (www.network-weathermap.com)

K. Lahey, R. Braden, and K. Sklower, Experiment isolation in a secure cluster testbed, Proceedings of the Conference on Cyber Security Experimentation and Test, 2008.

Y. Li, M. Liljenstam, and J. Liu, Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform, 2009 ACM/IEEE/SCS 23rd Workshop on Principles of Advanced and Distributed Simulation, pp.54-63, 2009.
DOI : 10.1109/PADS.2009.12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.433

M. Liljenstam, J. Liu, D. Nicol, Y. Yuan, G. Yan et al., RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version), SIMULATION, vol.17, issue.1, pp.43-59, 2006.
DOI : 10.1109/32.67579

J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher, and R. Thomas, Accurately Measuring Denial of Service in Simulation and Testbed Experiments, IEEE Transactions on Dependable and Secure Computing, vol.6, issue.2, pp.81-95, 2009.
DOI : 10.1109/TDSC.2008.73

J. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain, M. Shepard et al., Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise, IEEE Transactions on Computers, vol.57, issue.8, pp.1098-1112, 2008.
DOI : 10.1109/TC.2008.42

R. Ostrenga and P. Walczak, Application of DETER in large-scale cyber security exercises, Proceedings of the DETER Community Workshop, 2006.

B. Sangster, T. O-'connor, T. Cook, R. Fanelli, E. Dean et al., Toward instrumenting network warfare competitions to generate labeled datasets, Proceedings of the Second Conference on Cyber Security Experimentation and Test, p.9, 2009.

S. Schwab, B. Wilson, C. Ko, and A. Hussain, Seer, Proceedings of the DETER Community Workshop, 2007.
DOI : 10.1007/978-3-642-16483-5_5216

R. Stapleton-gray, Inter-Network Operations Center Dial-by-ASN (INOC-DBA), a Resource for the Network Operator Community, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp.181-185, 2009.
DOI : 10.1109/CATCH.2009.36

. The-white-house, The National Strategy to Secure Cyberspacewww.dhs.gov/xlibrary/assets/National Cyberspace Strategy .pdf), 2003.

A. Turner, Tcpreplay (tcpreplay.synfin.net)

B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad et al., An integrated experimental environment for distributed systems and networks, Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, pp.255-270, 2002.
DOI : 10.1145/844128.844152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.3768