{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:31:10Z","timestamp":1756384270858},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:00:00Z","timestamp":1723420800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:00:00Z","timestamp":1723420800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,12]]},"DOI":"10.1109\/clei64178.2024.10700452","type":"proceedings-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:33:31Z","timestamp":1728408811000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Process Mining-Based Assessment of Cyber Range Trainings"],"prefix":"10.1109","author":[{"given":"Guillermo","family":"Guerrero","sequence":"first","affiliation":[{"name":"Instituto de Computaci&#x00F3;n, Universidad de la Rep&#x00FA;blica,Facultad de Ingenier&#x00ED;a,Montevideo,Uruguay,11300"}]},{"given":"Gustavo","family":"Betarte","sequence":"additional","affiliation":[{"name":"Instituto de Computaci&#x00F3;n, Universidad de la Rep&#x00FA;blica,Facultad de Ingenier&#x00ED;a,Montevideo,Uruguay,11300"}]},{"given":"Juan Diego","family":"Campo","sequence":"additional","affiliation":[{"name":"Instituto de Computaci&#x00F3;n, Universidad de la Rep&#x00FA;blica,Facultad de Ingenier&#x00ED;a,Montevideo,Uruguay,11300"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-49851-4","volume-title":"Process Mining Data Science in Action","author":"van der Aalst","year":"2016"},{"journal-title":"Mitre att&ck: Design and philosophy","year":"2018","author":"Strom","key":"ref2"},{"volume-title":"The cyber range: A guide. guidance document for the use cases, features, and types of cyber ranges in cybersecurity education, certification and training","year":"2023","key":"ref3"},{"volume-title":"Cyber ranges","year":"2018","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11610\/isij.3503"},{"volume-title":"Cyberwiser.eu: Cyber range and capacity building in cibersecurity","year":"2023","key":"ref6"},{"volume-title":"Kypo cyber range platform","year":"2023","key":"ref7"},{"key":"ref8","article-title":"Clusus: a cyber range for network attack simulations","author":"Flinterman","year":"2019","journal-title":"Delft, Paises Bajos"},{"volume-title":"D. C. J.A.I. of Science, and Technology","year":"2021","author":"Organization","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527963"},{"volume-title":"Cloud computing","year":"2023","key":"ref11"},{"volume-title":"The virtualization api","year":"2023","key":"ref12"},{"volume-title":"Microsoft","year":"2023","key":"ref13"},{"volume-title":"Packer","year":"2023","key":"ref14"},{"volume-title":"Terraform","year":"2023","key":"ref15"},{"volume-title":"Ansible","year":"2023","key":"ref16"},{"volume-title":"Welcom to python.org","year":"2023","key":"ref17"},{"volume-title":"Elastic stack","year":"2023","key":"ref18"},{"volume-title":"Modernize secops with elastic security","year":"2023","key":"ref19"},{"key":"ref20","article-title":"Reingenieria del laboratorio de seguridad informatica analisis, dise\u00f1o e implementaci\u00f3n de un cyber range","volume-title":"Montevideo","author":"Gallardo","year":"2021"},{"volume-title":"Elastic agent","year":"2023","key":"ref21"},{"volume-title":"MoodIe documentation","year":"2023","key":"ref22"},{"volume-title":"Caldera","year":"2023","key":"ref23"},{"volume-title":"Apache guacamole","year":"2023","key":"ref24"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-96655-3","article-title":"Robust process mining with guarantees","volume-title":"International Conference on Business Process Management","author":"Leemans"},{"volume-title":"Red ciberlac","year":"2023","author":"CiberLaC","key":"ref26"},{"volume-title":"Hydra","year":"2023","key":"ref27"},{"volume-title":"John the ripper password cracker","year":"2023","key":"ref28"},{"volume-title":"Linpeas - linux privilege escalation awesome script","year":"2023","key":"ref29"},{"volume-title":"Inductive visual Miner Manual","year":"2017","author":"Leemans","key":"ref30"},{"volume-title":"Visual miner","year":"2023","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11494744_25"},{"volume-title":"Prom tools","year":"2023","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01442-0"},{"key":"ref35","article-title":"A cheat detection system for an educational pentesting cyber range: an intrusion deficit approach","volume-title":"Master thesis, KTH Royal Institute of Technology School of Electrical Engineering and Computer Science","author":"Kakouros","year":"2020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844646"},{"key":"ref37","first-page":"787","article-title":"Evaluating two approaches to assessing student progress in cybersecurity exercises","volume-title":"Proceedings of the 53rd ACM Technical Symposium on Computer Science Education, ser. SIGCSE 2022","author":"Svabensky"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00047"},{"first-page":"449","volume-title":"Process mining analysis of puzzle-based cybersecurity training","year":"2022","key":"ref39"},{"key":"ref40","article-title":"Orange is the new purple","author":"Wright","year":"2017","journal-title":"BlackHat"},{"volume-title":"Cyra.uy: Hacia un cyber range academico","year":"2023","author":"Corujo","key":"ref41"},{"volume-title":"Toward a knowledge graph of cybersecurity countermeasures","year":"2021","author":"Kaloroumakis","key":"ref42"},{"key":"ref43","first-page":"349","volume-title":"Streaming Process Mining","author":"Burattin","year":"2022"}],"event":{"name":"2024 L Latin American Computer Conference (CLEI)","start":{"date-parts":[[2024,8,12]]},"location":"Buenos Aires, Argentina","end":{"date-parts":[[2024,8,16]]}},"container-title":["2024 L Latin American Computer Conference (CLEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10700041\/10700060\/10700452.pdf?arnumber=10700452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T05:47:04Z","timestamp":1728452824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10700452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,12]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/clei64178.2024.10700452","relation":{},"subject":[],"published":{"date-parts":[[2024,8,12]]}}}