{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:54:11Z","timestamp":1743011651045,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642373732"},{"type":"electronic","value":"9783642373749"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37374-9_18","type":"book-chapter","created":{"date-parts":[[2013,4,3]],"date-time":"2013-04-03T13:58:16Z","timestamp":1364997496000},"page":"179-186","source":"Crossref","is-referenced-by-count":3,"title":["Robo-Teacher: A Computational Simulation Based Educational System to Improve Cyber Security"],"prefix":"10.1007","author":[{"given":"Bin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Kamran","family":"Shafi","sequence":"additional","affiliation":[]},{"given":"Hussein A.","family":"Abbass","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Morningstar, C., Farmer, F.R.: The lessons of Lucasfilm\u2019s habitat. In: Cyberspace: First Steps1991, pp. 273\u2013302. MIT Press (1991)"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.cose.2006.10.005","volume":"26","author":"B.D. Cone","year":"2007","unstructured":"Cone, B.D., et al.: A video game for cyber security training and awareness. Computers &amp; Security\u00a026(1), 63\u201372 (2007)","journal-title":"Computers &amp; Security"},{"key":"18_CR3","first-page":"2","volume-title":"Proceedings of the 21st International Jont Conference on Artifical Intelligence 2009","author":"C. Conati","year":"2009","unstructured":"Conati, C.: Intelligent tutoring systems: new challenges and directions. In: Proceedings of the 21st International Jont Conference on Artifical Intelligence 2009, pp. 2\u20137. Morgan Kaufmann Publishers Inc., Pasadena (2009)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Hart, D.G.: Using AMI to realize the Smart Grid. In: 2008 IEEE in Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century (2008)","DOI":"10.1109\/PES.2008.4596961"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Momoh, J.: Smart Grid: Fundamentals of Design and Analysis. John Wiley & Sons (2012)","DOI":"10.1002\/9781118156117"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Brown, R.E.: Impact of Smart Grid on distribution system design. In: 2008 IEEE in Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century (2008)","DOI":"10.1109\/PES.2008.4596843"},{"key":"18_CR7","unstructured":"Abbass, H.: computational Red teaming and cyber challenges (2009), \n                      http:\/\/mams.rmit.edu.au\/fpowkftaovbo.pdf"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Bennett, C., Highfill, D.: Networking AMI Smart Meters. In: Energy 2030 Conference, ENERGY 2008. IEEE (2008)","DOI":"10.1109\/ENERGY.2008.4781067"},{"issue":"3","key":"18_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P. McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and Privacy Challenges in the Smart Grid. IEEE Security & Privacy\u00a07(3), 75\u201377 (2009)","journal-title":"IEEE Security & Privacy"},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K. Deb","year":"2002","unstructured":"Deb, K., et al.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation\u00a06(2), 182\u2013197 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"}],"container-title":["Advances in Intelligent Systems and Computing","Robot Intelligence Technology and Applications 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37374-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T02:27:37Z","timestamp":1674872857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-37374-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642373732","9783642373749"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37374-9_18","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}