{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:26:44Z","timestamp":1773772004694,"version":"3.50.1"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-20-1-0297"],"award-info":[{"award-number":["H98230-20-1-0297"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Learning Technol."],"published-print":{"date-parts":[[2021,6,1]]},"DOI":"10.1109\/tlt.2021.3091904","type":"journal-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T19:24:10Z","timestamp":1624476250000},"page":"322-337","source":"Crossref","is-referenced-by-count":16,"title":["Cyber Range for Research-Inspired Learning of \u201cAttack Defense by Pretense\u201d Principle and Practice"],"prefix":"10.1109","volume":"14","author":[{"given":"Komal Bhupendra","family":"Vekaria","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7666-5389","authenticated-orcid":false,"given":"Prasad","family":"Calyam","sequence":"additional","affiliation":[]},{"given":"Songjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ramya","family":"Payyavula","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Rockey","sequence":"additional","affiliation":[]},{"given":"Nafis","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.025"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/S0010-0277(99)00070-0","article-title":"A cognitive theory of pretense","volume":"74","author":"nichols","year":"2000","journal-title":"Cognition"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogdev.2017.05.002"},{"key":"ref13","article-title":"GENI-open cloud infrastructure","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011087"},{"key":"ref15","first-page":"173","article-title":"Cloud computing and its application to blended learning in engineering","author":"porumb","year":"2011","journal-title":"Proc 2nd Int Conf Cloud Comput GRIDs Virtualization"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2013.2282285"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2015.2424692"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125683"},{"key":"ref19","article-title":"Kypo&#x2014;A platform for cyber defence exercises","author":"?eleda","year":"2015","journal-title":"M&S Support to Oper Tasks Including War Gaming Logistics Cyber Defence NATO Sci Technol Org"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849716"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076752"},{"key":"ref27","article-title":"Mizzou cyber range learning modules","year":"2021","journal-title":"Mizzou Cyber Range learning modules"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1348713.1348716"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1361-3723(18)30064-2","article-title":"The role of crypto-currency in cyber crime","volume":"7","author":"higbee","year":"2018","journal-title":"Comput Fraud Secur"},{"key":"ref5","first-page":"408","article-title":"A distributed virtual laboratory architecture for cybersecurity training","author":"willems","year":"2011","journal-title":"Proc Int Conf Internet Technol Secured Trans"},{"key":"ref8","first-page":"1","article-title":"V-netlab: An approach for realizing logically isolated networks for security experiments","author":"sun","year":"2008","journal-title":"Proc Conf Cyber Secur Experimentation Test"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2978192.2978230"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440635"},{"key":"ref9","first-page":"1","article-title":"Design and implementation of a cyber physical testbed for security training","author":"pfister","year":"2019","journal-title":"Proc 12th USENIX Workshop Cyber Secur Experimentation Test"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3154273.3154346"},{"key":"ref20","author":"omni","year":"2021"},{"key":"ref22","first-page":"171","article-title":"Moodle: Using learning communities to create an open source course management system","author":"dougiamas","year":"2003","journal-title":"Proc EdMedia Innovate Learn Assoc Adv Comput Educ"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190713"},{"key":"ref24","article-title":"Spring Boot","author":"boot","year":"2021"},{"key":"ref23","author":"wireshark","year":"2021"},{"key":"ref26","article-title":"Docker: Lightweight Linux containers for consistent development and deployment","volume":"2014","author":"merkel","year":"2014","journal-title":"Linux J"},{"key":"ref25","first-page":"20","author":"bloom","year":"1956","journal-title":"Taxonomy of Educational Objectives Cognitive Domain"}],"container-title":["IEEE Transactions on Learning Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4620076\/9528861\/09463747.pdf?arnumber=9463747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:45Z","timestamp":1652194365000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9463747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,1]]},"references-count":29,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tlt.2021.3091904","relation":{},"ISSN":["1939-1382","2372-0050"],"issn-type":[{"value":"1939-1382","type":"electronic"},{"value":"2372-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,1]]}}}