{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:03:52Z","timestamp":1755839032141,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,7]]},"DOI":"10.1145\/3368308.3415364","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T02:32:51Z","timestamp":1602124371000},"page":"324-329","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Teaching Web-Attacks on a Raspberry Pi Cyber Range"],"prefix":"10.1145","author":[{"given":"Sang Keun","family":"Oh","sequence":"first","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Nathaniel","family":"Stickney","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Daniel","family":"Hawthorne","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]},{"given":"Suzanne J.","family":"Matthews","sequence":"additional","affiliation":[{"name":"United States Military Academy, West Point, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ABET. 2019. Criteria for Accrediting Computing Programs 2019 -- 2020. https:\/\/www.abet.org\/accreditation\/accreditation-criteria\/criteria-for-accrediting-computing-programs-2019--2020\/  ABET. 2019. Criteria for Accrediting Computing Programs 2019 -- 2020. https:\/\/www.abet.org\/accreditation\/accreditation-criteria\/criteria-for-accrediting-computing-programs-2019--2020\/"},{"volume-title":"Proceedings of the 20th Annual SIG Conference on Information Technology Education (SIGITE'19)","author":"Baciu-Ureche Ovidiu-Gabriel","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006206401570166"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795481"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107627"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287534"},{"key":"e_1_3_2_1_7_1","volume-title":"Cluster Computing","volume":"17","author":"Cox Simon J.","year":"2014"},{"key":"e_1_3_2_1_9_1","unstructured":"Docker Inc. 2019 a. Docker: Enterprise Application Container Platform. https:\/\/www.docker.com\/  Docker Inc. 2019 a. Docker: Enterprise Application Container Platform. https:\/\/www.docker.com\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Docker Inc. 2019 b. Docker Hub. https:\/\/hub.docker.com\/  Docker Inc. 2019 b. Docker Hub. https:\/\/hub.docker.com\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Docker Inc. 2019 c. Swarm mode overview. https:\/\/docs.docker.com\/engine\/swarm\/  Docker Inc. 2019 c. Swarm mode overview. https:\/\/docs.docker.com\/engine\/swarm\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Docker Samples. 2019. Docker Swarm Visualizer. https:\/\/github.com\/dockersamples\/docker-swarm-visualizer  Docker Samples. 2019. Docker Swarm Visualizer. https:\/\/github.com\/dockersamples\/docker-swarm-visualizer"},{"key":"e_1_3_2_1_13_1","unstructured":"farisv. 2018. Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker. https:\/\/github.com\/farisv\/CJ2018-Final-CTF  farisv. 2018. Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker. https:\/\/github.com\/farisv\/CJ2018-Final-CTF"},{"key":"e_1_3_2_1_14_1","unstructured":"Curtis Franklin. 2017. 7 University-Connected Cyber Ranges to Know Now. https:\/\/www.darkreading.com\/cloud\/7-university-connected-cyber-ranges-to-know-now\/d\/d-id\/1331224  Curtis Franklin. 2017. 7 University-Connected Cyber Ranges to Know Now. https:\/\/www.darkreading.com\/cloud\/7-university-connected-cyber-ranges-to-know-now\/d\/d-id\/1331224"},{"key":"e_1_3_2_1_15_1","unstructured":"GenCyber. 2019. 2019 GenCyber Call for Proposal. https:\/\/www.gen-cyber.com\/proposals\/rfp\/gc-2019\/)  GenCyber. 2019. 2019 GenCyber Call for Proposal. https:\/\/www.gen-cyber.com\/proposals\/rfp\/gc-2019\/)"},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2019. google\/gvisor. https:\/\/github.com\/google\/gvisor  Google. 2019. google\/gvisor. https:\/\/github.com\/google\/gvisor"},{"key":"e_1_3_2_1_17_1","unstructured":"R. Guiler. 2018. Building a Cyber Training Range on a Budget. https:\/\/www.youtube.com\/watch?v=NQaVqN1HFPs  R. Guiler. 2018. Building a Cyber Training Range on a Budget. https:\/\/www.youtube.com\/watch?v=NQaVqN1HFPs"},{"key":"e_1_3_2_1_18_1","volume-title":"Electronics","volume":"5","author":"Hajji Wajdi","year":"2016"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Bil Hallaq Andrew Nicholson Richard Smith Leandros Maglaras Helge Janicke and Kevin Jones. 2018. CYRAN: a hybrid cyber range for testing security on ICS\/SCADA systems. In Cyber Security and Threats: Concepts Methodologies Tools and Applications. IGI Global UK 622--637. https:\/\/doi.org\/10.4018\/978--1--5225--5634--3.ch033  Bil Hallaq Andrew Nicholson Richard Smith Leandros Maglaras Helge Janicke and Kevin Jones. 2018. CYRAN: a hybrid cyber range for testing security on ICS\/SCADA systems. In Cyber Security and Threats: Concepts Methodologies Tools and Applications. IGI Global UK 622--637. https:\/\/doi.org\/10.4018\/978--1--5225--5634--3.ch033","DOI":"10.4018\/978-1-5225-5634-3.ch033"},{"volume-title":"ACM\/IEEE\/AIS SIGSEC\/IFIP Cybersecurity Curricular Guideline. Technical Report CSEC2017","year":"2017","author":"Joint Task Force on Cybersecurity Education.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","volume-title":"ArPi Lab: A Low-cost Remote Laboratory for Control Education. IFAC Proceedings Volumes","volume":"47","author":"Kal\u00faz Martin","year":"2014"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844552"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6779064"},{"key":"e_1_3_2_1_25_1","unstructured":"Alex Knisely. 2019. UA joins Ohio Cyber Range in $1.18M agreement. https:\/\/www.uakron.edu\/im\/news\/ua-joins-ohio-cyber-range-in-1--18m-agreement\/  Alex Knisely. 2019. UA joins Ohio Cyber Range in $1.18M agreement. https:\/\/www.uakron.edu\/im\/news\/ua-joins-ohio-cyber-range-in-1--18m-agreement\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSec.2015.7435523"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159558"},{"key":"e_1_3_2_1_28_1","unstructured":"Sang Oh. 2019 a. Docker Hub Cyber Range Image for Raspberry Pi. https:\/\/hub.docker.com\/r\/sko9370\/rpi  Sang Oh. 2019 a. Docker Hub Cyber Range Image for Raspberry Pi. https:\/\/hub.docker.com\/r\/sko9370\/rpi"},{"key":"e_1_3_2_1_29_1","unstructured":"Sang Oh. 2019 b. sko9370\/CyberRangePi. https:\/\/github.com\/sko9370\/CyberRangePi  Sang Oh. 2019 b. sko9370\/CyberRangePi. https:\/\/github.com\/sko9370\/CyberRangePi"},{"key":"e_1_3_2_1_30_1","unstructured":"Opsxcq. 2018. opsxcq\/docker-vulnerable-dvwa. https:\/\/github.com\/opsxcq\/docker-vulnerable-dvwa  Opsxcq. 2018. opsxcq\/docker-vulnerable-dvwa. https:\/\/github.com\/opsxcq\/docker-vulnerable-dvwa"},{"key":"e_1_3_2_1_31_1","unstructured":"P3 International. 2019. Kill A Watt Meter - Electricity Usage Monitor. http:\/\/www.p3international.com\/products\/p4400.html  P3 International. 2019. Kill A Watt Meter - Electricity Usage Monitor. http:\/\/www.p3international.com\/products\/p4400.html"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.36"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011087"},{"key":"e_1_3_2_1_34_1","unstructured":"PiRacks. 2019. PiRacks Raspberry Pi (3 2 1 A 1 B Zero) Clear Acrylic 4-Stacker Rack Enclosure Box Storage System Case. https:\/\/www.amazon.com\/dp\/B077D4J3M5  PiRacks. 2019. PiRacks Raspberry Pi (3 2 1 A 1 B Zero) Clear Acrylic 4-Stacker Rack Enclosure Box Storage System Case. https:\/\/www.amazon.com\/dp\/B077D4J3M5"},{"key":"e_1_3_2_1_35_1","first-page":"46","article-title":"Virginia Cyber Range","volume":"19","author":"Radziwill Nicole M","year":"2017","journal-title":"Software Quality Professional"},{"key":"e_1_3_2_1_36_1","unstructured":"Arvind S Raj Bithin Alangot Seshagiri Prabhu and Krishnashree Achuthan. 2016. Scalable and Lightweight $$CTF$$ Infrastructures Using Application Containers (Pre-recorded Presentation). In 2016 $$USENIX$$ Workshop on Advances in Security Education ($$ASE$$ 16) .  Arvind S Raj Bithin Alangot Seshagiri Prabhu and Krishnashree Achuthan. 2016. Scalable and Lightweight $$CTF$$ Infrastructures Using Application Containers (Pre-recorded Presentation). In 2016 $$USENIX$$ Workshop on Advances in Security Education ($$ASE$$ 16) ."},{"key":"e_1_3_2_1_37_1","unstructured":"Raspberry Pi Foundation. 2019. Raspberry Pi 3 Model B+. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b-plus\/  Raspberry Pi Foundation. 2019. Raspberry Pi 3 Model B+. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b-plus\/"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/19361611003601280"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870862"},{"volume-title":"The Glasgow Raspberry Pi Cloud: A Scale Model for Cloud Computing Infrastructures. In 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops. IEEE","year":"2013","author":"Tso F. P.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","unstructured":"Tyler. 2019. How to run a Raspberry Pi cluster with Docker Swarm. https:\/\/howchoo.com\/g\/njy4zdm3mwy\/how-to-run-a-raspberry-pi-cluster-with-docker-swarm  Tyler. 2019. How to run a Raspberry Pi cluster with Docker Swarm. https:\/\/howchoo.com\/g\/njy4zdm3mwy\/how-to-run-a-raspberry-pi-cluster-with-docker-swarm"},{"key":"e_1_3_2_1_42_1","unstructured":"Viginia Business. 2017. Virginia Cyber Range to grow under new agreement. http:\/\/www.virginiabusiness.com\/reports\/article\/virginia-cyber-range-to-grow-under-new-agreement  Viginia Business. 2017. Virginia Cyber Range to grow under new agreement. http:\/\/www.virginiabusiness.com\/reports\/article\/virginia-cyber-range-to-grow-under-new-agreement"},{"key":"e_1_3_2_1_43_1","unstructured":"Giovanni Vigna. 2004. iCTF. https:\/\/ictf.cs.ucsb.edu\/  Giovanni Vigna. 2004. iCTF. https:\/\/ictf.cs.ucsb.edu\/"},{"key":"e_1_3_2_1_44_1","unstructured":"Giovanni Vigna Kevin Borgolte Jacopo Corbetta Adam Doup\u00e9 Yanick Fratantonio Luca Invernizzi Dhilung Kirat and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good The Bad and The Ugly. In 2014 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 14). USENIX Association San Diego CA 7. http:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/vigna  Giovanni Vigna Kevin Borgolte Jacopo Corbetta Adam Doup\u00e9 Yanick Fratantonio Luca Invernizzi Dhilung Kirat and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good The Bad and The Ugly. In 2014 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 14). USENIX Association San Diego CA 7. http:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/vigna"},{"key":"e_1_3_2_1_45_1","first-page":"6","article-title":"Hands-on Computer Security with a Raspberry Pi","volume":"31","author":"Villa Adam H.","year":"2016","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006428203100321"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190713"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597959.2597970"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics5030056"}],"event":{"name":"SIGITE '20: The 21st Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Virtual Event USA","acronym":"SIGITE '20"},"container-title":["Proceedings of the 21st Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368308.3415364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368308.3415364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:06Z","timestamp":1750197726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368308.3415364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,7]]},"references-count":47,"alternative-id":["10.1145\/3368308.3415364","10.1145\/3368308"],"URL":"https:\/\/doi.org\/10.1145\/3368308.3415364","relation":{},"subject":[],"published":{"date-parts":[[2020,10,7]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}