{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:38Z","timestamp":1763468258859,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T00:00:00Z","timestamp":1424736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DUE-1141341"],"award-info":[{"award-number":["DUE-1141341"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,2,24]]},"DOI":"10.1145\/2676723.2677290","type":"proceedings-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T14:09:31Z","timestamp":1424786971000},"page":"332-337","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Teaching Cybersecurity Analysis Skills in the Cloud"],"prefix":"10.1145","author":[{"given":"Richard S.","family":"Weiss","sequence":"first","affiliation":[{"name":"The Evergreen State College, Olympia, WA, USA"}]},{"given":"Stefan","family":"Boesen","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, NH, USA"}]},{"given":"James F.","family":"Sullivan","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Michael E.","family":"Locasto","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Jens","family":"Mache","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR, USA"}]},{"given":"Erik","family":"Nilsen","sequence":"additional","affiliation":[{"name":"Lewis &amp; Clark College, Portland, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.101"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68979-9_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734303"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538939"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076740"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348713.1348716"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2372336.2372350"},{"key":"e_1_3_2_1_10_1","volume-title":"Simulating cyber operations: A cyber security training framework","author":"FITE B.","year":"2014","unstructured":"FITE , B. Simulating cyber operations: A cyber security training framework , 2014 . http:\/\/www.sans.org\/reading-room\/whitepapers\/bestprac\/simulating-cyber-operationscyber-security-training-framework-34510. FITE, B. Simulating cyber operations: A cyber security training framework, 2014. http:\/\/www.sans.org\/reading-room\/whitepapers\/bestprac\/simulating-cyber-operationscyber-security-training-framework-34510."},{"key":"e_1_3_2_1_11_1","first-page":"12","volume":"33","author":"FRYER-BIGGS Z.","year":"2000","unstructured":"FRYER-BIGGS , Z. DoD faces cyber expert talent shortage. Computer 33 , 12 ( 2000 ), 52--59. FRYER-BIGGS, Z. DoD faces cyber expert talent shortage. Computer 33, 12 (2000), 52--59.","journal-title":"Computer"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.112"},{"key":"e_1_3_2_1_13_1","volume-title":"Presented as part of the 6th Workshop on Cyber Security Experimentation and Test (Berkeley","author":"GONDREE M.","year":"2013","unstructured":"GONDREE , M. , AND PETERSON , Z. N. Valuing security by getting {d0x3d!}: Experiences with a network security board game . In Presented as part of the 6th Workshop on Cyber Security Experimentation and Test (Berkeley , CA, 2013 ), USENIX. GONDREE, M., AND PETERSON, Z. N. Valuing security by getting {d0x3d!}: Experiences with a network security board game. In Presented as part of the 6th Workshop on Cyber Security Experimentation and Test (Berkeley, CA, 2013), USENIX."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538990"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of the 3rd USENIX CSET","author":"PETERSON P. A.","year":"2010","unstructured":"PETERSON , P. A. , AND REIHER , P. L. Security exercises for the online classroom with deter . Proc. of the 3rd USENIX CSET ( 2010 ). PETERSON, P. A., AND REIHER, P. L. Security exercises for the online classroom with deter. Proc. of the 3rd USENIX CSET (2010)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953213"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953174"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/885767.885770"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume":"29","author":"WEISS R.","year":"2013","unstructured":"WEISS , R. , MACHE , J. , AND NILSEN , E. Top 10 hands-on cybersecurity exercises. Journal of Computing Sciences in Colleges 29 , 1 ( 2013 ), 140--147. WEISS, R., MACHE, J., AND NILSEN, E. Top 10 hands-on cybersecurity exercises. Journal of Computing Sciences in Colleges 29, 1 (2013), 140--147.","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_3_2_1_20_1","first-page":"483","volume-title":"Proceedings of the 19th National Information Systems Security Conference","author":"WHITE G.","year":"1996","unstructured":"WHITE , G. , AND NORDSTROM , G. Security across the Curriculum: Using Computer Security to Teach Computer Science Principles . In Proceedings of the 19th National Information Systems Security Conference ( 1996 ), NIST, pp. 483 -- 488 . WHITE, G., AND NORDSTROM, G. Security across the Curriculum: Using Computer Security to Teach Computer Science Principles. In Proceedings of the 19th National Information Systems Security Conference (1996), NIST, pp. 483--488."},{"volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI'14)","author":"ZHUANG Y.","key":"e_1_3_2_1_21_1","unstructured":"ZHUANG , Y. , GESSIOU , E. , PORTZER , S. , FUND , F. , MUHAMMAD , M. , BESCHASTNIKH , I. , AND CAPPOS , J. Netcheck : Network diagnoses from blackbox traces . In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI'14) , USENIX. ZHUANG, Y., GESSIOU, E., PORTZER, S., FUND, F., MUHAMMAD, M., BESCHASTNIKH, I., AND CAPPOS, J. Netcheck: Network diagnoses from blackbox traces. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI'14), USENIX."}],"event":{"name":"SIGCSE '15: The 46th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Kansas City Missouri USA","acronym":"SIGCSE '15"},"container-title":["Proceedings of the 46th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676723.2677290","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676723.2677290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:00Z","timestamp":1750227120000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676723.2677290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,24]]},"references-count":21,"alternative-id":["10.1145\/2676723.2677290","10.1145\/2676723"],"URL":"https:\/\/doi.org\/10.1145\/2676723.2677290","relation":{},"subject":[],"published":{"date-parts":[[2015,2,24]]},"assertion":[{"value":"2015-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}