{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:03:17Z","timestamp":1749096197834,"version":"3.41.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016620","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Designing a Flexible, Practice-Oriented Digital Forensics Cyber Exercise Aligned with the NICE Framework"],"prefix":"10.1109","author":[{"given":"Christoph","family":"Dorner","sequence":"first","affiliation":[{"name":"Institute of IT Security Research, St. P&#x00F6;lten University of Applied Sciences,St. P&#x00F6;lten,Austria"}]},{"given":"Christoph","family":"Lang-Muhr","sequence":"additional","affiliation":[{"name":"Institute of IT Security Research, St. P&#x00F6;lten University of Applied Sciences,St. P&#x00F6;lten,Austria"}]}],"member":"263","reference":[{"journal-title":"ISC2, Resreport","article-title":"How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce 2023","year":"2023","key":"ref1"},{"volume-title":"Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, ser. Forensics 2011. Elsevier Science","year":"2011","author":"Casey","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181r1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70062-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176998"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/09500690802582241"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/9781315229652"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3436756.3437041"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.25046\/aj050572"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3344170"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.11610\/isij.5319"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-024-09816-w"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3369255.3369266"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3184594"},{"volume-title":"The Cyber Security Body of Knowledge","year":"2021","author":"Rashid","key":"ref15"},{"volume-title":"European Cybersecurity Skills Framework (ECSF)","key":"ref16"},{"volume-title":"CIISec | The Home Of Cyber Professionals","year":"2023","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8355"},{"journal-title":"Council of the European Union","article-title":"Council recommendation of 22 May 2017 on the European Qualifications Framework for lifelong learning and repealing the recommendation of the European Parliament and of the Council of 23 April 2008 on the establishment of the European Qualifications Framework for lifelong learning","year":"2017","key":"ref19"},{"volume-title":"Committee on National Security Systems (CNSS) Glossary","year":"2022","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-61r2"},{"volume-title":"Digital Forensics [NICE Framework Work Role] NICCS","key":"ref22"},{"volume-title":"Incident Response [NICE Framework Work Role] | NICCS","key":"ref23"},{"volume-title":"Cybercrime Investigation [NICE Framework Work Role] NICCS","key":"ref24"},{"journal-title":"Framework Work framework\/work-role\/digital-evidence-analysis","key":"ref25","article-title":"Digital Evidence Analysis [NICE NICCS"},{"issue":"8","key":"ref26","article-title":"Anderson and Krathwohl Bloom\u2019s Taxonomy Revised","volume":"12","author":"Wilson","year":"2001","journal-title":"Creative Education"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2025,4,22]]},"location":"London, United Kingdom","end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016620.pdf?arnumber=11016620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:31:32Z","timestamp":1749015092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016620","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}