{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:25:17Z","timestamp":1771237517922,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031497360","type":"print"},{"value":"9783031497377","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T00:00:00Z","timestamp":1702944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-49737-7_9","type":"book-chapter","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T10:02:41Z","timestamp":1702893761000},"page":"122-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Comparative Study of\u00a0Online Cybersecurity Training Platforms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2852-8205","authenticated-orcid":false,"given":"Abdeslam","family":"Rehaimi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0772-9916","authenticated-orcid":false,"given":"Yassine","family":"Sadqi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4704-5364","authenticated-orcid":false,"given":"Yassine","family":"Maleh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,19]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-018-0080-0","author":"K Cabaj","year":"2018","unstructured":"Cabaj, K., Kotulski, Z., Ksiezopolski, B., Mazurczyk, W.: Cybersecurity: trends, issues, and challenges. EURASIP J. Inf. Secur. (2018). https:\/\/doi.org\/10.1186\/s13635-018-0080-0","journal-title":"EURASIP J. Inf. Secur."},{"key":"9_CR2","series-title":"SpringerBriefs in Cybersecurity","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-031-18475-8_2","volume-title":"Cybersecurity in Morocco","author":"Y Maleh","year":"2022","unstructured":"Maleh, Y., Maleh, Y.: Understanding cybersecurity standards. In: Maleh, Y., Maleh, Y. (eds.) Cybersecurity in Morocco. SpringerBriefs in Cybersecurity, pp. 13\u201327. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-18475-8_2"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Chakir, O., et al.: An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0. J. King Saud Univ. - Comput. Inf. Sci. 35, 103\u2013119 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.02.009","DOI":"10.1016\/j.jksuci.2023.02.009"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1038\/s41746-019-0161-6","volume":"2","author":"S Ghafur","year":"2019","unstructured":"Ghafur, S., Kristensen, S., Honeyford, K., Martin, G., Darzi, A., Aylin, P.: A retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ Digit. Med. 2, 98 (2019). https:\/\/doi.org\/10.1038\/s41746-019-0161-6","journal-title":"NPJ Digit. Med."},{"key":"9_CR5","unstructured":"Microsoft\u2019s Digital Security Unit: an overview of Russia\u2019s cyberattack activity in Ukraine. 21 (2022)"},{"key":"9_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754","volume":"119","author":"S AlDaajeh","year":"2022","unstructured":"AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., Raymond Choo, K.-K.: The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119, 102754 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102754","journal-title":"Comput. Secur."},{"key":"9_CR7","unstructured":"(ISC2): 2019 Cybersecurity Workforce Study (2019). https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2019-Cybersecurity-Workforce-Study\/ISC2-Cybersecurity-Workforce-Study-2019.ashx"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-59351-6_9","volume-title":"Transactions on Edutainment XV","author":"D Mouheb","year":"2019","unstructured":"Mouheb, D., Abbas, S., Merabti, M.: Cybersecurity curriculum design: a survey. In: Pan, Z., Cheok, A.D., M\u00fcller, W., Zhang, M., El Rhalibi, A., Kifayat, K. (eds.) Transactions on Edutainment XV. LNCS, vol. 11345, pp. 93\u2013107. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-59351-6_9"},{"key":"9_CR9","unstructured":"CyberSkills: CyberSkills Taks Force Report. https:\/\/www.dhs.gov\/publication\/homeland-security-advisory-council-cyberskills-task-force-report. Accessed 28 Nov 2022"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.4018\/IJCSSA.2018010102","volume":"6","author":"R Chicone","year":"2018","unstructured":"Chicone, R., Burton, T.M., Huston, J.A.: Using Facebook\u2019s open source capture the flag platform as a hands-on learning and assessment tool for cybersecurity education. Int. J. Concept. Struct. Smart Appl. 6, 18\u201332 (2018). https:\/\/doi.org\/10.4018\/IJCSSA.2018010102","journal-title":"Int. J. Concept. Struct. Smart Appl."},{"issue":"1","key":"9_CR11","first-page":"20","volume":"15","author":"L Carlson","year":"1999","unstructured":"Carlson, L., Sullivan, J.: Hands-on engineering: learning by doing in the integrated teaching and learning program. Int. J. Eng. Educ. 15(1), 20\u201331 (1999)","journal-title":"Int. J. Eng. Educ."},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1037\/mil0000042","volume":"26","author":"DM Trippe","year":"2014","unstructured":"Trippe, D.M., Moriarty, K.O., Russell, T.L., Carretta, T.R., Beatty, A.S.: Development of a cyber\/information technology knowledge test for military enlisted technical training qualification. Mil. Psychol. 26, 182\u2013198 (2014). https:\/\/doi.org\/10.1037\/mil0000042","journal-title":"Mil. Psychol."},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Triejunita, C.N., Putri, A., Rosmansyah, Y.: A systematic literature review on virtual laboratory for learning. In: 2021 International Conference on Data and Software Engineering (ICoDSE), pp. 1\u20136. IEEE (2021). https:\/\/doi.org\/10.1109\/ICoDSE53690.2021.9648451","DOI":"10.1109\/ICoDSE53690.2021.9648451"},{"key":"9_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102470","volume":"151","author":"S Kucek","year":"2020","unstructured":"Kucek, S., Leitner, M.: An empirical survey of functions and configurations of open-source capture the flag (CTF) environments. J. Netw. Comput. Appl. 151, 102470 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2019.102470","journal-title":"J. Netw. Comput. Appl."},{"key":"9_CR15","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-030-59291-2_5","volume-title":"Information Security Education. Information Security in Action","author":"S Karagiannis","year":"2020","unstructured":"Karagiannis, S., Maragkos-Belmpas, E., Magkos, E.: An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools. In: Drevin, L., Von Solms, S., Theocharidou, M. (eds.) WISE 2020. IAICT, vol. 579, pp. 61\u201377. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59291-2_5"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Raman, R., Sunny, S., Pavithran, V., Achuthan, K.: Framework for evaluating capture the flag (CTF) security competitions. In: International Conference for Convergence for Technology-2014, pp. 1\u20135. IEEE (2014). https:\/\/doi.org\/10.1109\/I2CT.2014.7092098","DOI":"10.1109\/I2CT.2014.7092098"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Swann, M., Rose, J., Bendiab, G., Shiaeles, S., Li, F.: Open source and commercial capture the flag cyber security learning platforms - a case study. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 198\u2013205. IEEE (2021). https:\/\/doi.org\/10.1109\/CSR51186.2021.9527941","DOI":"10.1109\/CSR51186.2021.9527941"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-62433-0_1","volume-title":"Model-driven Simulation and Training Environments for Cybersecurity","author":"M Kn\u00fcpfer","year":"2020","unstructured":"Kn\u00fcpfer, M., et al.: Cyber taxi: a taxonomy of interactive cyber training and education systems. In: Hatzivasilis, G., Ioannidis, S. (eds.) MSTEC 2020. LNCS, vol. 12512, pp. 3\u201321. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62433-0_1"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/185403.185412","volume":"26","author":"CE Landwehr","year":"1994","unstructured":"Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.: A taxonomy of computer program security flaws. ACM Comput. Surv. 26, 211\u2013254 (1994). https:\/\/doi.org\/10.1145\/185403.185412","journal-title":"ACM Comput. Surv."},{"key":"9_CR20","unstructured":"TryHackMe. https:\/\/tryhackme.com. Accessed 03 Jan 2023"},{"key":"9_CR21","unstructured":"Hack The Box. https:\/\/www.hackthebox.com\/. Accessed 03 Jan 2023"},{"key":"9_CR22","unstructured":"Root Me. https:\/\/www.root-me.org\/. Accessed 03 Jan 2023"},{"key":"9_CR23","unstructured":"PentesterLab. https:\/\/pentesterlab.com\/. Accessed 03 Jan 2023"},{"key":"9_CR24","unstructured":"Virtual Hacking Labs. https:\/\/www.virtualhackinglabs.com\/. Accessed 03 Jan 2023"},{"key":"9_CR25","unstructured":"OWASP Juice Shop. https:\/\/owasp.org\/www-project-juice-shop\/. Accessed 03 Jan 2023"},{"key":"9_CR26","unstructured":"FBCTF (2023). https:\/\/github.com\/facebookarchive\/fbctf"},{"key":"9_CR27","unstructured":"LLC, K.C.\/\/ Ctf.: CTFd. https:\/\/ctfd.io\/. Accessed 03 Jan 2023"},{"key":"9_CR28","unstructured":"picoCTF. https:\/\/picoctf.org\/. Accessed 03 Jan 2023"},{"key":"9_CR29","unstructured":"TinyCTF. https:\/\/github.com\/balidani\/tinyctf-platform"},{"key":"9_CR30","unstructured":"CISA: NICE Cybersecurity Workforce Framework. https:\/\/www.cisa.gov\/nice-cybersecurity-workforce-framework. Accessed 03 Jan 2023"}],"container-title":["Lecture Notes in Computer Science","Verification and Evaluation of Computer and Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49737-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T10:03:55Z","timestamp":1702893835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49737-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,19]]},"ISBN":["9783031497360","9783031497377"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49737-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,19]]},"assertion":[{"value":"19 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VECoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Verification and Evaluation of Computer and Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakech","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vecos2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/vecos-world.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}