{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:05:00Z","timestamp":1771700700017,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2335046"],"award-info":[{"award-number":["2335046"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,13]]},"DOI":"10.1109\/fie61694.2024.10892909","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T18:43:35Z","timestamp":1740595415000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Interactive Framework for Cybersecurity Education and Future Workforce Development"],"prefix":"10.1109","author":[{"given":"Sujan","family":"Ghimire","sequence":"first","affiliation":[{"name":"University of Arizona,Department of Systems and Industrial Engineering,Tucson,AZ,85721"}]},{"given":"Muhtasim Alam","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,85721"}]},{"given":"Ryan","family":"Tsang","sequence":"additional","affiliation":[{"name":"University of California Davis,Department of Electrical and Computer Engineering,Davis,CA,95616"}]},{"given":"Richard","family":"Yarnell","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of Electrical and Computer Engineering,Orlando,FL,32826"}]},{"given":"Emma","family":"Heckert","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,85721"}]},{"given":"Jaeden","family":"Carpenter","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,85721"}]},{"given":"Yu-Zheng","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Systems and Industrial Engineering,Tucson,AZ,85721"}]},{"given":"Muntasir","family":"Mamun","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Systems and Industrial Engineering,Tucson,AZ,85721"}]},{"given":"Ronald F.","family":"DeMara","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of Electrical and Computer Engineering,Orlando,FL,32826"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"University of California Davis,Department of Computer Science,Davis,CA,95616"}]},{"given":"Pratik","family":"Satam","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Systems and Industrial Engineering,Tucson,AZ,85721"}]},{"given":"Soheil","family":"Salehi","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,85721"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"ref2","volume-title":"Hardware Security: a Hands-on Learning Approach","author":"Bhunia","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev51306.2021.00014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s40692-021-00194-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FIE49875.2021.9637252"},{"key":"ref6","author":"Bliss","year":"2021","journal-title":"A Research Ecosystem for Secure Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC50631.2021.00045"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED57927.2023.10129378"},{"key":"ref9","volume-title":"HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion","author":"Lin","year":"2023"},{"key":"ref10","volume-title":"NIST: National Vulnerability Database (NVD)","year":"2023"},{"key":"ref11","volume-title":"MITRE: Common Weakness Exposure (CWE) Database","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--19953"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--19964"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--21178"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101769"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0037-2"},{"key":"ref17","author":"Beaumont","year":"2011","journal-title":"Hardware Trojans-Prevention, Detection, Countermeasures (a Literature Review)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DCAS61159.2024.10539877"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30117-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.82"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--29688"},{"key":"ref23","volume-title":"SP: Certified Information System Security Professional","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSIC54682.2021.00032"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1076"},{"key":"ref26","article-title":"SSETGami: Secure Software Education Through Gamification","volume-title":"Proceedings on Cybersecurity Education, Re-search, and Practice","author":"Suarez","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2023.30"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS50664.2020.9224932"},{"key":"ref29","article-title":"A Survey of Serious Games for Cybersecurity Education and Training","volume-title":"Proceedings of the KSU Conference on Cybersecurity Education, Research & Practice","author":"Hill","year":"2020"},{"key":"ref30","volume-title":"Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit","author":"Bird","year":"2009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/mse.2007.48"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISEC57711.2023.10402162"},{"key":"ref33","article-title":"GLASS: Group Learning At Significant Scale via WiFi - Enabled Learner Design Teams in an ECE Flipped Classroom","volume-title":"American Society for Engineering Education (ASEE) Annual Conference & Exposition","volume":"2017-June","author":"DeMara","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FIE43999.2019.9028455"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2017.2706667"},{"key":"ref36","first-page":"13","article-title":"Strengthening STEM Laboratory Assessment Using Student-Narrative Portfolios Interwoven with Online Evaluation","volume-title":"Proceedings of Amer-ican Association for Engineering Education Southeastern Conference","author":"DeMara","year":"2016"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1145\/3649476.3658786","article-title":"Educational Tool-spaces for Convolutional Neural Network FPGA Design Space Exploration Using High-Level Synthesis","volume-title":"Proceedings of the Great Lakes Symposium on VLSI 2024, ser. GLSVLSI \u201924","author":"Yarnell","year":"2024"},{"key":"ref38","first-page":"1","article-title":"Exam Preparation through Directed Video Blogging using Electronically-Mediated Realtime Class-room Interaction","volume-title":"American Association for Engineering Education Southeastern Conference","author":"DeMara","year":"2016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274062"}],"event":{"name":"2024 IEEE Frontiers in Education Conference (FIE)","location":"Washington, DC, USA","start":{"date-parts":[[2024,10,13]]},"end":{"date-parts":[[2024,10,16]]}},"container-title":["2024 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10892093\/10892810\/10892909.pdf?arnumber=10892909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T07:28:29Z","timestamp":1740641309000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10892909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,13]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/fie61694.2024.10892909","relation":{},"subject":[],"published":{"date-parts":[[2024,10,13]]}}}