{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:47Z","timestamp":1750220867793,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3317727","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Design for an educational cyber range"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Brunner","sequence":"first","affiliation":[{"name":"United States Military Academy"}]},{"given":"Sang Keun","family":"Oh","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Jesse","family":"Ramirez","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Paul","family":"Houck","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Nathaniel","family":"Stickney","sequence":"additional","affiliation":[{"name":"United States Military Academy"}]},{"given":"Raymond","family":"Blaine","sequence":"additional","affiliation":[{"name":"Cyber Research Center"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Build the future of Open Infrastructure https:\/\/www.openstack.org\/  {n. d.}. Build the future of Open Infrastructure https:\/\/www.openstack.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. ESXi | Bare Metal Hypervisor. https:\/\/www.vmware.com\/products\/esxi-and-esx.html  {n. d.}. ESXi | Bare Metal Hypervisor. https:\/\/www.vmware.com\/products\/esxi-and-esx.html"},{"key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. libvirt: The virtualization API. https:\/\/libvirt.org\/index.html  {n. d.}. libvirt: The virtualization API. https:\/\/libvirt.org\/index.html"},{"key":"e_1_3_2_1_4_1","unstructured":"{n. d.}. Proxmox - powerful open-source server solutions. https:\/\/www.proxmox.com\/en\/  {n. d.}. Proxmox - powerful open-source server solutions. https:\/\/www.proxmox.com\/en\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Cyber Ranges https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2018\/02\/13\/cyber_ranges.pdf  2018. Cyber Ranges https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2018\/02\/13\/cyber_ranges.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"Roy Thomas Fielding. 2000. Architectural styles and the design of network-based software architectures. University of California Irvine http:\/\/dl.acm.org\/citation.cfm?id=932295  Roy Thomas Fielding. 2000. Architectural styles and the design of network-based software architectures. University of California Irvine http:\/\/dl.acm.org\/citation.cfm?id=932295"},{"key":"e_1_3_2_1_7_1","unstructured":"Paul Hernandez. 2018. New Data Show Demand for Cybersecurity Professionals Accelerating. https:\/\/www.nist.gov\/news-events\/news\/2018\/11\/new-data-show-demand-cybersecurity-professionals-accelerating  Paul Hernandez. 2018. New Data Show Demand for Cybersecurity Professionals Accelerating. https:\/\/www.nist.gov\/news-events\/news\/2018\/11\/new-data-show-demand-cybersecurity-professionals-accelerating"},{"key":"e_1_3_2_1_8_1","unstructured":"K. Duda P. Agarwal L. Kreeger T. Sridhar M. Bursell C. Wright M. Mahalingam D. Dutt. 2014. Virtual extensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc7348.txt.pdf  K. Duda P. Agarwal L. Kreeger T. Sridhar M. Bursell C. Wright M. Mahalingam D. Dutt. 2014. Virtual extensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc7348.txt.pdf"}],"event":{"name":"HotSoS: Hot Topics in the Science of Security Symposium","sponsor":["National Security Agency National Security Agency"],"location":"Nashville Tennessee USA","acronym":"HotSoS"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3317727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:48Z","timestamp":1750202628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":8,"alternative-id":["10.1145\/3314058.3317727","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3317727","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}