{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:29:49Z","timestamp":1765888189442,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T00:00:00Z","timestamp":1564272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,28]]},"DOI":"10.1145\/3332186.3332247","type":"proceedings-article","created":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T19:55:41Z","timestamp":1564516541000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["DeapSECURE"],"prefix":"10.1145","author":[{"given":"Wirawan","family":"Purwanto","sequence":"first","affiliation":[{"name":"Information Technology Services, Old Dominion University, Norfolk, Virginia, USA"}]},{"given":"Hongyi","family":"Wu","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Old Dominion University, Norfolk, Virginia, USA"}]},{"given":"Masha","family":"Sosonkina","sequence":"additional","affiliation":[{"name":"Modeling, Simulation, and Visualization Engineering, Old Dominion University, Norfolk, Virginia, USA"}]},{"given":"Karina","family":"Arcaute","sequence":"additional","affiliation":[{"name":"STEM Education and Professional Studies, Old Dominion University, Norfolk, Virginia, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,28]]},"reference":[{"unstructured":"National Initiative for Cybersecurity Education. 2019. Cyberseek heatmap. http:\/\/cyberseek.org\/heatmap.html. Retrieved April 5 2019.  National Initiative for Cybersecurity Education. 2019. Cyberseek heatmap. http:\/\/cyberseek.org\/heatmap.html. Retrieved April 5 2019.","key":"e_1_3_2_1_1_1"},{"volume-title":"Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI), 3933--3939","year":"2018","author":"Zhang Qiao","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/MCSE.2006.122"},{"volume-title":"https:\/\/software-carpentry.org\/. Retrieved","year":"2019","author":"Carpentry Software","key":"e_1_3_2_1_6_1"},{"volume-title":"XSEDE HPC Workshop Series.https:\/\/psc.edu\/xsede-hpc-series-all-workshops. Retrieved","year":"2019","author":"Pittsburgh Supercomputing Center","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/EduHPC.2018.00009"},{"volume-title":"Li Da Xu","year":"2018","author":"Lu Yang","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ICC.2018.8422830"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TCSI.2017.2702098"},{"volume-title":"Cray User Group Conference","year":"2011","author":"Gunasekaran Raghul","key":"e_1_3_2_1_12_1"},{"volume-title":"Retrieved","year":"2018","author":"Inc.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/3133956.3134015"},{"volume-title":"Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review. https:\/\/arxiv.org\/abs\/1802.03178. Retrieved","year":"2019","author":"Ullah Faheem","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/MSP.2013.138"},{"volume-title":"Retrieved","year":"2018","author":"Carpentries The","key":"e_1_3_2_1_17_1"}],"event":{"acronym":"PEARC '19","name":"PEARC '19: Practice and Experience in Advanced Research Computing","location":"Chicago IL USA"},"container-title":["Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3332186.3332247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3332186.3332247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:38Z","timestamp":1750206338000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3332186.3332247"}},"subtitle":["Empowering Students for Data- and Compute-Intensive Research in Cybersecurity through Training"],"short-title":[],"issued":{"date-parts":[[2019,7,28]]},"references-count":15,"alternative-id":["10.1145\/3332186.3332247","10.1145\/3332186"],"URL":"https:\/\/doi.org\/10.1145\/3332186.3332247","relation":{},"subject":[],"published":{"date-parts":[[2019,7,28]]},"assertion":[{"value":"2019-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}