{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T18:52:15Z","timestamp":1771786335104,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/educon.2017.7942934","type":"proceedings-article","created":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T20:42:10Z","timestamp":1496954530000},"page":"771-779","source":"Crossref","is-referenced-by-count":21,"title":["Conceptual analysis of cyber security education based on live competitions"],"prefix":"10.1109","author":[{"given":"Menelaos","family":"Katsantonis","sequence":"first","affiliation":[]},{"given":"Panayotis","family":"Fouliras","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Mavridis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/tea.3660310109"},{"key":"ref38","article-title":"The theory underlying concept maps and how to construct and use them","author":"novak","year":"2008","journal-title":"JHCM Technical Report Cmap Tools 2006&#x2013;01 Rev 01&#x2013;2008 Florida Institute for Human and Machine Cognition"},{"key":"ref33","article-title":"Experiences with practice-focused undergraduate security education","author":"fanelli","year":"2010","journal-title":"Proceedings of the 3rd Workshop on Cyber Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2047594.2047675"},{"key":"ref31","article-title":"Collective Views of the NSA\/CSS Cyber Defense Exercise on Curricula and Learning Objectives","author":"adams","year":"2009","journal-title":"Proceedings of the 2008 USENIX Cyber-Security Experimentation and Test (CSET) Workshop"},{"key":"ref30","article-title":"A Scaffolded, Metamorphic CTF for Reverse Engineering","author":"feng","year":"2015","journal-title":"2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE&#x2018;15)"},{"key":"ref37","first-page":"125","article-title":"CmapTools: A knowledge modeling and sharing environment","volume":"1","author":"ca\u00f1as","year":"2004","journal-title":"Concept Maps Theory Methodology Technology Proceedings of the First International Conference on Concept Mapping"},{"key":"ref36","article-title":"DetEX: Hands-On Cyber Defense Exercise for Undergraduate Students","author":"glumich","year":"2011","journal-title":"Proceedings of the 2011 International Conference on Security and Management (SAM&#x2018;11)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.112"},{"key":"ref34","article-title":"This is not a game: early observations on using alternate reality games for teaching security concepts to first-year undergraduates","author":"flushman","year":"2015","journal-title":"8th Workshop on Cyber Security Experimentation and Test (CSET 15)"},{"key":"ref10","article-title":"Learning Obstacles in the Capture The Flag Model","author":"chung","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.23"},{"key":"ref11","article-title":"Experiences in cyber security education, The mit lincoln laboratory capture-the-flag exercise","author":"werther","year":"2011","journal-title":"The 4th Workshop on Cyber Secuirty Experimentation and Test San Francisco CA United states"},{"key":"ref12","article-title":"An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education","author":"chothia","year":"2015","journal-title":"2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE&#x2018;15)"},{"key":"ref13","article-title":"Using CTFs for an Undergraduate Cyber Education","author":"carlisle","year":"2015","journal-title":"2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE&#x2018;15)"},{"key":"ref14","article-title":"Multidisciplinary Experiential Learning for Holistic Cybersecurity Education, Research and Evaluation","author":"rege","year":"2015","journal-title":"Proceedings of the USENIX Summit on Gaming Games and Gamification in Security Education (3GSE)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.10.013"},{"key":"ref16","article-title":"An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner Readiness","author":"pusey","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref17","article-title":"Developing Small Team-based Cyber Security Exercises","author":"mauer","year":"2012","journal-title":"Proceedings of the International Conference on Security and Management (SAM) p 1 The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp)"},{"key":"ref18","article-title":"Class capture-the-flag exercises","author":"mirkovic","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.621"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_18"},{"key":"ref4","article-title":"Effectiveness of cybersecurity competitions","author":"cheung","year":"2012","journal-title":"Proceedings of the International Conference on Security and Management (SAM) p 1 The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/19361611003601280"},{"key":"ref3","article-title":"Ten years of ictf: The good, the bad, and the ugly","author":"vigna","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref6","article-title":"The Fun and future of CTF","author":"davis","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref29","article-title":"Building the Next Generation of Cyber Security Professionals","author":"martini","year":"2014","journal-title":"Twenty Second European Conference on Information Systems Tel Aviv"},{"key":"ref5","article-title":"Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015","author":"mirkovic","year":"2015","journal-title":"2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE&#x2018;15)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14215-4_8"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/2076732.2076740","article-title":"Hit'em where it hurts: a live security exercise on cyber situational awareness","author":"doup\u00e9","year":"2011","journal-title":"Proceedings of the 27th Annual Computer Security Applications Conference ACM"},{"key":"ref2","first-page":"70","article-title":"Cyber Defense Exercises and their Role in Cyber Warfare","volume":"6","author":"bratosin","year":"2014","journal-title":"Journal of Mobile Embedded and Distributed Systems"},{"key":"ref9","article-title":"Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education","author":"dabrowski","year":"2015","journal-title":"2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE&#x2018;15)"},{"key":"ref1","author":"team","year":"2016","journal-title":"Ctftime org \/ all about ctf (capture the flag)"},{"key":"ref20","first-page":"172","article-title":"Guide for designing cyber security exercises","author":"patriciu","year":"2009","journal-title":"Proceedings of the 8th WSEAS International Conference on E-Activities and information security and privacy"},{"key":"ref22","article-title":"Factors impacting performance in competitive cyber exercises","author":"silva","year":"2014","journal-title":"Proceedings of the Interservice\/Interagency Training Simulation and Education Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34210-3_4"},{"key":"ref24","article-title":"Disturbed Playing: Another Kind of Educational Security Games","author":"koch","year":"2012","journal-title":"Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test USENIX Association"},{"key":"ref41","article-title":"PicoCTF: A game-based computer security competition for high school students","author":"chapman","year":"2014","journal-title":"Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1145\/1597849.1384336","volume":"40","author":"catuogno","year":"2008","journal-title":"ACM SIGCSE Bulletin"},{"key":"ref26","article-title":"Using Games to Enrich Continuous Cyber Training","volume":"33","author":"allen","year":"2015","journal-title":"Johns Hopkins APL Technical Digest"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.120"}],"event":{"name":"2017 IEEE Global Engineering Education Conference (EDUCON)","location":"Athens, Greece","start":{"date-parts":[[2017,4,25]]},"end":{"date-parts":[[2017,4,28]]}},"container-title":["2017 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7936435\/7942803\/07942934.pdf?arnumber=7942934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T23:44:07Z","timestamp":1692834247000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7942934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/educon.2017.7942934","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}