{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:04:41Z","timestamp":1743077081878,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031790065"},{"type":"electronic","value":"9783031790072"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-79007-2_9","type":"book-chapter","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T20:02:32Z","timestamp":1738094552000},"page":"161-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Gamified Learning Approach for\u00a0IoT Security Education Using Capture-the-Flag Competitions: Architecture and\u00a0Insights"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9049-7254","authenticated-orcid":false,"given":"Mohammad","family":"Hamad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3866-3769","authenticated-orcid":false,"given":"Andreas","family":"Finkenzeller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2657-0402","authenticated-orcid":false,"given":"Monowar","family":"Hasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5241-3809","authenticated-orcid":false,"given":"Marc-Oliver","family":"Pahl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4096-2584","authenticated-orcid":false,"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,29]]},"reference":[{"key":"9_CR1","unstructured":"CTFd: Capture the flag platform. https:\/\/ctfd.io\/"},{"key":"9_CR2","unstructured":"Future-IoT PhD School. https:\/\/school.future-iot.org. Accessed 25 sept 2024"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1007\/s11423-019-09718-8","volume":"68","author":"H Al-Samarraie","year":"2020","unstructured":"Al-Samarraie, H., Shamsuddin, A., Alzahrani, A.I.: A flipped classroom model in higher education: a review of the evidence across disciplines. Educ. Tech. Res. Dev. 68(3), 1017\u20131051 (2020)","journal-title":"Educ. Tech. Res. Dev."},{"issue":"9","key":"9_CR4","doi-asserted-by":"publisher","first-page":"11759","DOI":"10.1007\/s10639-022-11451-4","volume":"28","author":"T Balon","year":"2023","unstructured":"Balon, T., Baggili, I.: CyberCompetitions: a survey of competitions, tools, and systems to support cybersecurity education. Educ. Inf. Technol. 28(9), 11759\u201311791 (2023)","journal-title":"Educ. Inf. Technol."},{"issue":"3","key":"9_CR5","doi-asserted-by":"publisher","first-page":"3011","DOI":"10.1007\/s10639-021-10704-y","volume":"27","author":"BJ Bla\u017ei\u010d","year":"2022","unstructured":"Bla\u017ei\u010d, B.J.: Changing the landscape of cybersecurity education in the EU: will the new approach produce the required cybersecurity skills? Educ. Inf. Technol. 27(3), 3011\u20133036 (2022)","journal-title":"Educ. Inf. Technol."},{"key":"9_CR6","unstructured":"Canbaz, M.A., OHearon, K., McKee, M., Hossain, M.N.: IoT privacy and security in teaching institutions: inside the classroom and beyond. In: 2021 ASEE Virtual Annual Conference Content Access (2021)"},{"key":"9_CR7","unstructured":"Carlisle, M., Chiaramonte, M., Caswell, D.: Using CTFs for an undergraduate cyber education. In: 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 2015) (2015)"},{"key":"9_CR8","unstructured":"Chetwyn, R.A., Erd\u0151di, L.: Cheat detection in cyber security capture the flag games-an automated cyber threat hunting approach. In: Proceedings of the 28th C &ESAR, p.\u00a0175 (2021)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Cole, S.V.: Impact of capture the flag (CTF)-style vs. traditional exercises in an introductory computer security class. In: Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education, vol. 1. pp. 470\u2013476 (2022)","DOI":"10.1145\/3502718.3524806"},{"issue":"2","key":"9_CR10","first-page":"9","volume":"2022","author":"J Collins","year":"2023","unstructured":"Collins, J., Ford, V.: Teaching by practice: shaping secure coding mentalities through cybersecurity CTFs. J. Cybersecur. Educ. Res. Pract. 2022(2), 9 (2023)","journal-title":"J. Cybersecur. Educ. Res. Pract."},{"key":"9_CR11","unstructured":"Denning, T., Shostack, A., Kohno, T.: Practical lessons from creating the $$\\{$$Control-Alt-Hack$$\\}$$ card game and research challenges for games in education and research. In: 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 2014) (2014)"},{"issue":"4","key":"9_CR12","doi-asserted-by":"publisher","first-page":"3384","DOI":"10.1109\/JIOT.2022.3221857","volume":"10","author":"M Hamad","year":"2022","unstructured":"Hamad, M., Finkenzeller, A., Liu, H., Lauinger, J., Prevelakis, V., Steinhorst, S.: SEEMQTT: secure end-to-end MQTT-based communication for mobile IoT systems using secret sharing and trust delegation. IEEE Internet Things J. 10(4), 3384\u20133406 (2022)","journal-title":"IEEE Internet Things J."},{"key":"9_CR13","unstructured":"Kakouros, N., Johnson, P., Lagerstr\u00f6m, R.: Detecting plagiarism in penetration testing education. In: Nordsec 2020, The 25th Nordic Conference on Secure IT Systems, 23\u201324 November 2020, Online (2020)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/978-3-030-63396-7_34","volume-title":"Information Systems","author":"S Karagiannis","year":"2020","unstructured":"Karagiannis, S., Papaioannou, T., Magkos, E., Tsohou, A.: Game-based information security\/privacy education and awareness: theory and practice. In: Themistocleous, M., Papadaki, M., Kamal, M.M. (eds.) Information Systems, pp. 509\u2013525. Springer, Cham (2020)"},{"key":"9_CR15","unstructured":"Miell, I., Sayers, A.: Docker in Practice. Simon and Schuster (2019)"},{"issue":"11","key":"9_CR16","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/MCOM.2017.1700394","volume":"55","author":"MO Pahl","year":"2017","unstructured":"Pahl, M.O.: The iLab concept: making teaching better, at scale. IEEE Commun. Mag. 55(11), 178\u2013185 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1700394","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"9_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compedu.2008.06.004","volume":"52","author":"M Papastergiou","year":"2009","unstructured":"Papastergiou, M.: Digital game-based learning in high school computer science education: impact on educational effectiveness and student motivation. Comput. Educ. 52(1), 1\u201312 (2009). https:\/\/doi.org\/10.1016\/j.compedu.2008.06.004","journal-title":"Comput. Educ."},{"key":"9_CR18","unstructured":"Soni, D., Makwana, A.: A survey on MQTT: a protocol of internet of things (IoT). In: International Conference on Telecommunication, Power Analysis and Computing Techniques (ICTPACT-2017), vol.\u00a020, pp. 173\u2013177 (2017)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"\u0160v\u00e1bensk\u1ef3, V., Vykopal, J., Cermak, M., La\u0161tovi\u010dka, M.: Enhancing cybersecurity skills by creating serious games. In: Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, pp. 194\u2013199 (2018)","DOI":"10.1145\/3197091.3197123"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Wukkadada, B., Wankhede, K., Nambiar, R., Nair, A.: Comparison with HTTP and MQTT in internet of things (IoT). In: 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 249\u2013253. IEEE (2018)","DOI":"10.1109\/ICIRCA.2018.8597401"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Zouahi, H.: Gamifying cybersecurity education: a CTF-based approach to engaging students in software security laboratories (2024). https:\/\/ojs.library.queensu.ca\/index.php\/PCEEA\/article\/view\/17071","DOI":"10.24908\/pceea.2023.17071"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-79007-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T20:02:40Z","timestamp":1738094560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-79007-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031790065","9783031790072"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-79007-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Karlstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nordsec2024.kau.se\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}