{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T22:45:00Z","timestamp":1773701100563,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"26-27","license":[{"start":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:00:00Z","timestamp":1578009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:00:00Z","timestamp":1578009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["2018R1D1A1B07047395"],"award-info":[{"award-number":["2018R1D1A1B07047395"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11042-019-08583-0","type":"journal-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T05:09:55Z","timestamp":1578028195000},"page":"34085-34101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Scenario-based cyber attack\u00b7defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network"],"prefix":"10.1007","volume":"80","author":[{"given":"Seongkyu","family":"Yeom","sequence":"first","affiliation":[]},{"given":"Dongil","family":"Shin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2665-3339","authenticated-orcid":false,"given":"Dongkyoo","family":"Shin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"8583_CR1","doi-asserted-by":"publisher","unstructured":"Abdelaal MA, Ebrahim GA, Anis WR (2019) A scalable network-aware virtual machine allocation strategy in multi-datacentre cloud computing environments. International Journal of Cloud Computing 8. https:\/\/doi.org\/10.1504\/IJCC.2019.101329","DOI":"10.1504\/IJCC.2019.101329"},{"key":"8583_CR2","doi-asserted-by":"crossref","unstructured":"Ahnlab-ASEC (2017) ASECREPORT, 87: 12\u201330","DOI":"10.7827\/TurkishStudies.12756"},{"key":"8583_CR3","doi-asserted-by":"crossref","unstructured":"Arduin PE (2018) The three categories of insider threats. John Wiley & Sons, Inc. 10: 59\u201367 doi: 10.1002\/9781119419785.ch3","DOI":"10.1002\/9781119419785.ch3"},{"key":"8583_CR4","doi-asserted-by":"crossref","unstructured":"Bulusu S, Laborde R, Wazan AS, Barr\u00e8re F, Benzekri A (2017) Describing advanced persistent threats using a multi-agent system approach. 2017 1st cyber security in networking conference (CSNet): 1-3 doi: 10.1109\/CSNET.2017.8241997","DOI":"10.1109\/CSNET.2017.8241997"},{"issue":"3","key":"8583_CR5","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1504\/IJSHC.2010.032688","volume":"1","author":"BD Czejdo","year":"2010","unstructured":"Czejdo BD, Baszun M (2010) Remote patient monitoring system and a medical social network. International Journal of Social and Humanistic Computing (IJSHC) 1(3):273\u2013281. https:\/\/doi.org\/10.1504\/IJSHC.2010.032688","journal-title":"International Journal of Social and Humanistic Computing (IJSHC)"},{"issue":"5","key":"8583_CR6","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/msp.2011.139","volume":"9","author":"W Du","year":"2011","unstructured":"Du W (2011) SEED: hands-on lab exercises for computer security education. IEEE Security & Privacy Magazine 9(5):70\u201373. https:\/\/doi.org\/10.1109\/msp.2011.139","journal-title":"IEEE Security & Privacy Magazine"},{"issue":"6","key":"8583_CR7","doi-asserted-by":"publisher","first-page":"567","DOI":"10.14257\/jse.2015.12.05","volume":"12","author":"J Eom","year":"2015","unstructured":"Eom J (2015) The improvement plan of a customized cyber-training structure for enhancing the capability of cyber security. Journal of Security Engineering 12(6):567\u2013580. https:\/\/doi.org\/10.14257\/jse.2015.12.05","journal-title":"Journal of Security Engineering"},{"key":"8583_CR8","unstructured":"Evans SC (2008) Securing WebGoat using ModSecurity. OWASP Foundation"},{"key":"8583_CR9","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TMM.2019.2893549","volume":"21","author":"S Garg","year":"2019","unstructured":"Garg S, Kaur K, Kumar N, Rodrigues J (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Transactions on Multimedia 21:566\u2013578. https:\/\/doi.org\/10.1109\/TMM.2019.2893549","journal-title":"IEEE Transactions on Multimedia"},{"key":"8583_CR10","unstructured":"Hack.me. The house of rising sandbox, https:\/\/hack.me"},{"key":"8583_CR11","unstructured":"HackerSchool. http:\/\/hackerschool.org"},{"key":"8583_CR12","doi-asserted-by":"crossref","unstructured":"Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) IoDDoS \u2014 the internet of distributed denial of Sevice attacks - a case study of the Mirai malware and IoT-based botnets. Proceedings of the 2nd international conference on internet of things, big data, and security. doi:10.5220\/0006246600470058","DOI":"10.5220\/0006246600470058"},{"key":"8583_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7737\/kmsr.2014.31.4.001","volume":"31","author":"G Hwang","year":"2014","unstructured":"Hwang G, Rim M, Song K, Lee J (2014) Future education skills needs analysis through patent analysis in the field of information security. The Korean Operations and Management Science Society 31:1\u201313. https:\/\/doi.org\/10.7737\/kmsr.2014.31.4.001","journal-title":"The Korean Operations and Management Science Society"},{"key":"8583_CR14","doi-asserted-by":"publisher","unstructured":"Kshetri N (2016) Big Data's big potential in developing economies: impact on agriculture. Health, and Environmental Security:1\u201329. https:\/\/doi.org\/10.1079\/9781780648682.0001","DOI":"10.1079\/9781780648682.0001"},{"key":"8583_CR15","doi-asserted-by":"publisher","first-page":"16066","DOI":"10.1109\/ACCESS.2019.2932020","volume":"7","author":"Q Li","year":"2019","unstructured":"Li Q, Li S, Xu B, Liu Y (2019) Intrusion detection in distributed frequency control of isolated microgrids. IEEE Access 7:16066\u201316077. https:\/\/doi.org\/10.1109\/ACCESS.2019.2932020","journal-title":"IEEE Access"},{"key":"8583_CR16","doi-asserted-by":"publisher","first-page":"102556","DOI":"10.1109\/ACCESS.2019.2932020","volume":"7","author":"P Li","year":"2019","unstructured":"Li P, Yang X (2019) On dynamic recovery of cloud storage system under advanced persistent threats. IEEE Access 7:102556\u2013103569. https:\/\/doi.org\/10.1109\/ACCESS.2019.2932020","journal-title":"IEEE Access"},{"key":"8583_CR17","unstructured":"Lipp M, Schwarz M, Gruss D, Prescher T, Haas W, Fogh A, Horn J, Mangard S, Kocher P, Genkin D, Yarom Y, Hamburg M (2018) Meltdown: Reading Kernel Memory from User Space. 27th USENIX Security Symposium (USENIX Security 18): 973\u2013990"},{"issue":"8","key":"8583_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MC.2014.224","volume":"47","author":"EL McDuffie","year":"2014","unstructured":"McDuffie EL, Piotrowski VP (2014) The future of Cybersecurity education. IEEE Computer 47(8):67\u201369. https:\/\/doi.org\/10.1109\/MC.2014.224","journal-title":"IEEE Computer"},{"issue":"6","key":"8583_CR19","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2013.155","volume":"11","author":"A McGettrick","year":"2013","unstructured":"McGettrick A (2013) Toward effective Cybersecurity education. IEEE Security & Privacy 11(6):66\u201368. https:\/\/doi.org\/10.1109\/MSP.2013.155","journal-title":"IEEE Security & Privacy"},{"key":"8583_CR20","unstructured":"OWASP Broken Web Applications Project, https:\/\/www.owasp.org\/index.php\/OWASP_Broken_Web_Applications_Project#tab=Main"},{"issue":"2","key":"8583_CR21","first-page":"371","volume":"5","author":"PB Pathak","year":"2016","unstructured":"Pathak PB (2016) A dangerous trend of cybercrime: Ransomware growing challenge. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 5(2):371\u2013373","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)"},{"key":"8583_CR22","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MMUL.2013.9","volume":"20","author":"SD Roy","year":"2013","unstructured":"Roy SD, Lotan G, Zeng W (2013) Social multimedia signals: sense, process, and put them to work. IEEE Multimedia 20:7\u201313. https:\/\/doi.org\/10.1109\/MMUL.2013.9","journal-title":"IEEE Multimedia"},{"key":"8583_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2010.188","volume":"43","author":"Y Tian","year":"2010","unstructured":"Tian Y, Srivastava J, Huang T, Contractor N (2010) Social multimedia computing. Computer 43:27\u201336. https:\/\/doi.org\/10.1109\/MC.2010.188","journal-title":"Computer"},{"key":"8583_CR24","unstructured":"VMware-Official Site: https:\/\/www.vmware.com\/"},{"key":"8583_CR25","unstructured":"Webhacking.kr. Oldzombie, http:\/\/webhacking.kr\/"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08583-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-019-08583-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08583-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T18:05:48Z","timestamp":1636740348000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-019-08583-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,3]]},"references-count":25,"journal-issue":{"issue":"26-27","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["8583"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08583-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,3]]},"assertion":[{"value":"14 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}