Publications by the DETER Team

The DETER Project Team has published extensively about the work of the project, its research results, and the on-going process of putting research results into practice in DETERLab, where cybersecurity experimenters worldwide can benefit from DETER's advances in cybersecurity test and experimentation technology. You can view peer-reviewed publications, invited papers and other publications below.

Peer-Reviewed Publications



  • DETERLab and the DETER Project. John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, and Stephen Schwab. In GENI: Prototype of the Next Internet. Rick McGeer, Mark Berman, Chip Elliott and Rob Ricci, Eds. New York: Springer-Verlag, 2016.
  • Authorization and Access Control: ABAC. Ted Faber, Steve Schwab, and John Wroclawski. In GENI: Prototype of the Next Internet. Rick McGeer, Mark Berman, Chip Elliott, and Rob Ricci, Eds. New York: Springer-Verlag, 2016.
  • Mitigating Denial-of-Service Attacks in Wide-Area LQR Control. Nachiappan Chockalingam, Aranya Chakrabortty, and Alefiya Hussain. In Proceedings of the forthcoming 2016 IEEE PES General Meeting: Paving The Way For Grid Modernization, Boston, Massachusetts, July 17-21, 2016.
  • Foundations of Infrastructure CPS. Anuradha Annaswamy, Alefiya Hussain, Aranya Chakrabortty, and Miloš Cvetković. In Proceedings of the forthcoming 2016 American Control Conference, Boston, Massachusetts, July 6-8, 2016.
  • DBit: A Methodology for Comparing Content Distribution Networks. Zahib Akhtar, Alefiya Hussain, Ethan Katz-Bassett, and Ramesh Govindan. In Proceedings of the forthcoming Traffic Monitoring and Analysis workshop (TMA '16), Louvain La Neuve, Belgium, 7-8 April, 2016.
  • Validating Agent-Based Modeling of Human Password Behavior. Korbar, J. Blythe, R. Koppel, V. Kothari, and S. W. Smith. In Proceedings of the AAAI-16 Workshop on Artificial Intelligence for Cyber Security (AICS), Phoenix, Arizona, February 12, 2016.
  • Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids. Paul Wood, Saurabh Bagchi, and Alefiya Hussain. In Proceedings of the 8th International Conference on COMmunication and Systems & NETworkS (COMSNETS '16), Bangalore, India, January 5-9, 2016.


  • A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. Tatyana Ryutov, Michael Orosz, James Blythe, and Detlof von Winterfeldt. In Proceedings of the 11th International Workshop on Security and Trust Management (STM '15), Vienna, Austria, September 21-22, 2015.
  • Mismorphism: a Semiotic Model of Computer Security Circumvention. S.W. Smith, R. Koppel, J. Blythe, and V. Kothari. In Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA '15), Levos, Greece, July 1-3, 2015.
  • Expressing Different Traffic Models Using The LegoTG Framework. Genevieve Bartlett and Jelena Mirkovic. Best Paper Award at the international workshop on Computer and Networking Experimental Research using Testbeds (CNERT '15), Columbus, OH, June 29, 2015.
  • Cypress: A Testbed for Research in Networked Cyber-Physical Systems. Ryan Goodfellow and Erik Kline. In Proceedings of the 10th EAI International Conference on Testbeds and Research Infrastructures of the Development of Networks & Communities (TRIDENTCOM), Vancouver, BC, Canada, June 24-25, 2015.
  • Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Best Paper Honorable Mention at the eCrime 2015 Mobile Security Symposium, Barcelona, Spain, May 26-29, 2015.
  • Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems. Paul Wood, Saurabh Bagchi, and Alefiya Hussain. In Proceedings of the 20th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems, Hyderabad, India, May 25-29, 2015.
  • Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling. Vijay Kothari, Jim Blythe, Ross Koppel, and Sean W. Smith. In Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS '15), University of Illinois at Urbana-Champaign, April 21-22, 2015.
  • Workarounds to Computer Access in Healthcare Organizations: You want My Password or a Dead Patient? Ross Koppel, Sean W. Smith, Jim Blythe, and Vijay Kothari. In Proceedings of Information Technology and Communication in Health Conference (ITCH) 2015, Victoria, BC, Canada, February 26 - March 1, 2015.










  • Identification of Repeated Denial of Service Attacks. Alefiya Hussain, John Heidemann, and Christos Papadopoulos. In Proceedings of 25th IEEE International Conference on Computer Communications 2006 (INFOCOM '06), Barcelona, Spain, April 23-29, 2006.
  • Experience with DETER: A Testbed for Security Research. T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. In Proceedings of Tridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), March 2006.


  • Cyber Defense Technology Networking and Evaluation. R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, J. D. Tygar, S. Sastry, D. Sterne, and S. F. Wu. In Communications of the ACM, Special issue on Emerging Technologies for Homeland Security, Vol. 47, Issue 3, pp 58-61, March 2004.


Invited Papers

Other Publications