{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T04:34:43Z","timestamp":1759206883337,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642394539"},{"type":"electronic","value":"9783642394546"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39454-6_9","type":"book-chapter","created":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T00:54:13Z","timestamp":1370998453000},"page":"80-89","source":"Crossref","is-referenced-by-count":10,"title":["Instrumenting Competition-Based Exercises to Evaluate Cyber Defender Situation Awareness"],"prefix":"10.1007","author":[{"given":"Theodore","family":"Reed","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Nauer","sequence":"additional","affiliation":[]},{"given":"Austin","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Tadda, G.P.: Measuring performance of Cyber situation awareness systems. In: Proceedings of the 11th International Conference on Information Fusion. Rome Res. Site, Air Force Res. Lab., Rome, NY, pp. 1\u20138 (2008)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Glicksberg, I., Gross, O.: Notes on Games over the Square. In: Kuhn, H.W., Tucker, A.W. (eds.) Contributions to the Theory of Games. Annals of Mathematics Studies 28, vol.\u00a0II, pp. 173\u2013183. Princeton University Press (1950)","DOI":"10.1515\/9781400881970-010"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1067343.1067372","volume-title":"Proceedings of the 2004 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology (ACE 2004)","author":"K. Gilleade","year":"2004","unstructured":"Gilleade, K., Dix, A.: Using frustration in the design of adaptive videogames. In: Proceedings of the 2004 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology (ACE 2004), pp. 228\u2013232. ACM, New York (2004)"},{"key":"9_CR4","unstructured":"Ogievetsky, V.: PlotWeaver (2013), \n                    \n                      https:\/\/graphics.stanford.edu\/wikis\/cs448b-09-fall\/FP-OgievetskyVadim"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Mullins, B., Lacey, T., Mills, R., Trechter, J., Bass, S.: How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum. In: IEEE Symposium on Security and Privacy, pp. 40\u201349 (2007)","DOI":"10.1109\/MSP.2007.111"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-14215-4_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"N. Childers","year":"2010","unstructured":"Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M., Vigna, G.: Organizing large scale hacking competitions. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol.\u00a06201, pp. 132\u2013152. Springer, Heidelberg (2010)"},{"key":"9_CR7","first-page":"51","volume-title":"Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC 2011)","author":"A. Doup","year":"2011","unstructured":"Doup, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., Cavedon, L., Vigna, G.: Hit \u2019em where it hurts: a live security exercise on cyber situational awareness. In: Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC 2011), pp. 51\u201361. ACM, New York (2011)"},{"key":"9_CR8","unstructured":"Cowan, C., Arnold, S., Beattie, S., Wright, C., Viega, J.: Defcon Capture the Flag: defending vulnerable code from intense attack. In: Proceedings of the DARPA Information Survivability Conference and Exposition (2003)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-34210-3_4","volume-title":"Secure IT Systems","author":"T. Sommestad","year":"2012","unstructured":"Sommestad, T., Hallberg, J.: Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. In: J\u00f8sang, A., Carlsson, B. (eds.) NordSec 2012. LNCS, vol.\u00a07617, pp. 47\u201360. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39454-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:48:23Z","timestamp":1582411703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39454-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642394539","9783642394546"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39454-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}