{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:10:46Z","timestamp":1772115046203,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030812416","type":"print"},{"value":"9783030812423","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81242-3_17","type":"book-chapter","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T03:04:02Z","timestamp":1626231842000},"page":"293-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A Digital Twin-Based Cyber Range for SOC Analysts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1119-4715","authenticated-orcid":false,"given":"Manfred","family":"Vielberth","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0239-7526","authenticated-orcid":false,"given":"Magdalena","family":"Glas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6885-4622","authenticated-orcid":false,"given":"Marietheres","family":"Dietz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9571-4417","authenticated-orcid":false,"given":"Stylianos","family":"Karagiannis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5922-4274","authenticated-orcid":false,"given":"Emmanouil","family":"Magkos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1338-9003","authenticated-orcid":false,"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,14]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.compedu.2013.08.003","volume":"70","author":"S Barzilai","year":"2014","unstructured":"Barzilai, S., Blau, I.: Scaffolding game-based learning: impact on learning achievements, perceived learning, and game experiences. Comput. Educ. 70, 65\u201379 (2014)","journal-title":"Comput. Educ."},{"key":"17_CR2","unstructured":"Bissel, K., Lasalle, R., Dal Cin, P.: Third annual state of cyber resilience report. Accenture (2020)"},{"key":"17_CR3","unstructured":"Boschert, S., Heinrich, C., Rosen, R.: Next generation digital twin. In: Proceedings of the 12th International Symposium on Tools and Methods of Competitive Engineering, TMCE 2018, pp. 209\u2013217 (2018)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"B\u00e9cue, A., et al.: CyberFactory1 \u2013 securing the industry 4.0 with cyber-ranges and digital twins. In: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 1\u20134 (2018)","DOI":"10.1109\/WFCS.2018.8402377"},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11218-008-9054-2","volume":"11","author":"A Caspi","year":"2008","unstructured":"Caspi, A., Blau, I.: Social presence in online discussion groups: testing three conceptions and their relations to perceived learning. Soc. Psychol. Educ. 11(3), 323\u2013346 (2008). https:\/\/doi.org\/10.1007\/s11218-008-9054-2","journal-title":"Soc. Psychol. Educ."},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s12599-019-00624-0","volume":"62","author":"M Dietz","year":"2019","unstructured":"Dietz, M., Pernul, G.: Digital twin: empowering enterprises towards a system-of-systems approach. Bus. Inf. Syst. Eng. 62(2), 179\u2013184 (2019). https:\/\/doi.org\/10.1007\/s12599-019-00624-0","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSEC.2019.2961650","volume":"18","author":"M Dietz","year":"2020","unstructured":"Dietz, M., Pernul, G.: Unleashing the digital twin\u2019s potential for ICS security. IEEE Secur. Priv. 18(4), 20\u201327 (2020)","journal-title":"IEEE Secur. Priv."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Dietz, M., Vielberth, M., Pernul, G.: Integrating digital twin security simulations in the security operations center. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. ACM, New York (2020)","DOI":"10.1145\/3407023.3407039"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Eckhart, M., Ekelhart, A.: A specification-based state replication approach for digital twins. In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC 2018, pp. 36\u201347. ACM, New York (2018)","DOI":"10.1145\/3264888.3264892"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Eckhart, M., Ekelhart, A.: Towards security-aware virtual environments for digital twins. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security (CPSS 2018), pp. 61\u201372 (2018)","DOI":"10.1145\/3198458.3198464"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-030-25312-7_14","volume-title":"Security and Quality in Cyber-Physical Systems Engineering","author":"M Eckhart","year":"2019","unstructured":"Eckhart, M., Ekelhart, A.: Digital twins for cyber-physical systems security: state of the art and outlook. In: Security and Quality in Cyber-Physical Systems Engineering, pp. 383\u2013412. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25312-7_14"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Empl, P., Pernul, G.: A flexible security analytics service for the industrial IoT. In: Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, pp. 23\u201332. ACM, New York (2021)","DOI":"10.1145\/3445969.3450427"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1109\/TII.2019.2938885","volume":"16","author":"C Gehrmann","year":"2020","unstructured":"Gehrmann, C., Gunnarsson, M.: A digital twin based industrial automation and control system security architecture. IEEE Trans. Ind. Inf. 16, 669\u2013680 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"17_CR14","first-page":"81","volume":"28","author":"F Giannakas","year":"2019","unstructured":"Giannakas, F., Papasalouros, A., Kambourakis, G., Gritzalis, S.: A comprehensive cybersecurity learning platform for elementary education. Inf. Secur. J. 28(3), 81\u2013106 (2019)","journal-title":"Inf. Secur. J."},{"issue":"3","key":"17_CR15","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1111\/j.1365-2729.2012.00489.x","volume":"29","author":"C Girard","year":"2013","unstructured":"Girard, C., Ecalle, J., Magnan, A.: Serious games as new educational tools: how effective are they? A meta-analysis of recent studies. J. Comput. Assist. Learn. 29(3), 207\u2013219 (2013)","journal-title":"J. Comput. Assist. Learn."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Hauge, J.B., et al.: Study design and data gathering guide for serious games\u2019 evaluation. In: Tennyson, R., Connolly, T.M., Hainey, T., Boyle, E., Baxter, G., Moreno-Ger, P. (eds.) Psychology, Pedagogy, and Assessment in Serious Games. Advances in Game-Based Learning, pp. 394\u2013419. IGI Global (2014)","DOI":"10.4018\/978-1-4666-4773-2.ch018"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Kavallieratos, G., Katsikas, S.K., Gkioulos, V.: Towards a cyber-physical range. In: Proceedings of the 5th on Cyber-Physical System Security Workshop - CPSS 2019, pp. 25\u201334. ACM Press, New York (2019)","DOI":"10.1145\/3327961.3329532"},{"issue":"3","key":"17_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/BF02905780","volume":"10","author":"JM Keller","year":"1987","unstructured":"Keller, J.M.: Development and use of the ARCS model of instructional design. J. Instr. Dev. 10(3), 2\u201310 (1987). https:\/\/doi.org\/10.1007\/BF02905780","journal-title":"J. Instr. Dev."},{"issue":"6","key":"17_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1201\/1086.1065898X\/45782.14.6.20060101\/91856.6","volume":"14","author":"D Kelley","year":"2006","unstructured":"Kelley, D., Moritz, R.: Best practices for building a security operations center. Inf. Syst. Secur. 14(6), 27\u201332 (2006)","journal-title":"Inf. Syst. Secur."},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Leitner, M., et al.: AIT cyber range: flexible cyber security environment for exercises, training and research. In: Proceedings of the European Interdisciplinary Cybersecurity Conference, pp. 1\u20136 (2020)","DOI":"10.1145\/3424954.3424959"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Madani, A., Rezayi, S., Gharaee, H.: Log management comprehensive architecture in Security Operation Center (SOC). In: 2011 International Conference on Computational Aspects of Social Networks (CASoN), pp. 284\u2013289. IEEE (2011)","DOI":"10.1109\/CASON.2011.6085959"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1016\/j.promfg.2017.07.198","volume":"11","author":"E Negri","year":"2017","unstructured":"Negri, E., Fumagalli, L., Macchi, M.: A review of the roles of digital twin in CPS-based production systems. Procedia Manuf. 11, 939\u2013948 (2017)","journal-title":"Procedia Manuf."},{"key":"17_CR23","unstructured":"Pescatore, J., Filkins, B.: Closing the critical skills gap for modern and effective security operations centers (SOCs). SANS Institute (2020)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Pokhrel, A., Katta, V., Colomo-Palacios, R.: Digital twin for cybersecurity incident prediction: a multivocal literature review. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops, ICSEW 2020, pp. 671\u2013678. ACM, New York (2020)","DOI":"10.1145\/3387940.3392199"},{"issue":"1","key":"17_CR25","doi-asserted-by":"publisher","first-page":"102425","DOI":"10.1016\/j.ipm.2020.102425","volume":"58","author":"B Putz","year":"2021","unstructured":"Putz, B., Dietz, M., Empl, P., Pernul, G.: EtherTwin: blockchain-based secure digital twin information management. Inf. Process. Manag. 58(1), 102425 (2021)","journal-title":"Inf. Process. Manag."},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-99843-5_11","volume-title":"Critical Information Infrastructures Security","author":"JE Rubio","year":"2018","unstructured":"Rubio, J.E., Roman, R., Lopez, J.: Analysis of cybersecurity threats in industry 4.0: the case of intrusion detection. In: D\u2019Agostino, G., Scala, A. (eds.) Critical Information Infrastructures Security. LNCS, vol. 10707, pp. 119\u2013130. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99843-5_11"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Schinagl, S., Schoon, K., Paans, R.: A framework for designing a security operations centre (SOC). In: 2015 48th Hawaii International Conference on System Sciences, pp. 2253\u20132262. IEEE (2015)","DOI":"10.1109\/HICSS.2015.270"},{"key":"17_CR28","doi-asserted-by":"publisher","first-page":"35355","DOI":"10.1109\/ACCESS.2018.2846590","volume":"6","author":"Z Tian","year":"2018","unstructured":"Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355\u201335364 (2018)","journal-title":"IEEE Access"},{"issue":"24","key":"17_CR29","doi-asserted-by":"publisher","first-page":"7148","DOI":"10.3390\/s20247148","volume":"20","author":"E Ukwandu","year":"2020","unstructured":"Ukwandu, E., et al.: A review of cyber-ranges and test-beds: current and future trends. Sensors 20(24), 7148 (2020)","journal-title":"Sensors"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"227756","DOI":"10.1109\/ACCESS.2020.3045514","volume":"8","author":"M Vielberth","year":"2020","unstructured":"Vielberth, M., Bohm, F., Fichtinger, I., Pernul, G.: Security operations center: a systematic study and open challenges. IEEE Access 8, 227756\u2013227779 (2020)","journal-title":"IEEE Access"},{"key":"17_CR31","unstructured":"Vielberth, M., Pernul, G.: A security information and event management pattern. In: 12th Latin American Conference on Pattern Languages of Programs (SugarLoafPLoP 2018), pp. 1\u201312. The Hillside Group (2018)"},{"key":"17_CR32","doi-asserted-by":"publisher","first-page":"101636","DOI":"10.1016\/j.cose.2019.101636","volume":"88","author":"MM Yamin","year":"2020","unstructured":"Yamin, M.M., Katt, B., Gkioulos, V.: Cyber ranges and security testbeds: scenarios, functions, tools and architecture. Comput. Secur. 88, 101636 (2020)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81242-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T22:02:46Z","timestamp":1752444166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81242-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030812416","9783030812423"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81242-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Calgary, AB","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}