{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T15:03:57Z","timestamp":1746716637669,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624680","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T23:55:42Z","timestamp":1638316542000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Emotional Analysis of Learning Cybersecurity with Games"],"prefix":"10.1109","author":[{"given":"Maria","family":"Valero","sequence":"first","affiliation":[]},{"given":"Lei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[]},{"given":"Shahriar","family":"Sobhan","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Handlin","sequence":"additional","affiliation":[]},{"given":"Jinghua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3439568"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41196-1_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274239"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47653-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucli.2014.11.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.seizure.2016.04.006"},{"key":"ref16","first-page":"739","article-title":"Brain computer interface and its types-a study","volume":"3","author":"anupama","year":"2012","journal-title":"International Journal of Advances in Engineering & Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3042965"},{"journal-title":"Wssu edu","article-title":"2d-access-control","year":"2021","key":"ref18"},{"journal-title":"Wssu edu","article-title":"2d-buffer-overflow","year":"2021","key":"ref19"},{"journal-title":"Master Degree in Cybersecurity","year":"2021","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-59351-6_9"},{"journal-title":"A Casual Revolution Reinventing Video Games and Their Players","year":"2010","author":"juul","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/1046878120933312"},{"year":"2021","key":"ref8"},{"key":"ref7","first-page":"1012","article-title":"Using emotiv epoc neuroheadset to acquire data in brain-computer interface","volume":"3","author":"fouad","year":"2015","journal-title":"International Journal of Advanced Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0262-9"},{"article-title":"Kennesaw state university hpc facilities and resources","year":"2021","author":"boyle","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/1046878120933312"},{"journal-title":"influxDB","year":"2019","key":"ref20"},{"key":"ref22","first-page":"47","article-title":"Mind-body medicine: a model of the comparative clinical impact of the acute stress and relaxation responses","volume":"92","author":"dusek","year":"2009","journal-title":"Minnesota Med"},{"journal-title":"Grafana","year":"2018","key":"ref21"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2021,11,2]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624680.pdf?arnumber=9624680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:49Z","timestamp":1652201629000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624680","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}