{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:20:58Z","timestamp":1778152858237,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004493","name":"International Atomic Energy Agency","doi-asserted-by":"publisher","award":["CRP J02008"],"award-info":[{"award-number":["CRP J02008"]}],"id":[{"id":"10.13039\/501100004493","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011688","name":"Electronic Components and Systems for European Leadership","doi-asserted-by":"publisher","award":["783163"],"award-info":[{"award-number":["783163"]}],"id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,18]]},"DOI":"10.1145\/3424954.3424959","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T19:47:00Z","timestamp":1610480820000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["AIT Cyber Range"],"prefix":"10.1145","author":[{"given":"Maria","family":"Leitner","sequence":"first","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Maximilian","family":"Frank","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Wolfgang","family":"Hotwagner","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Gregor","family":"Langner","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Oliver","family":"Maurhart","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Timea","family":"Pahi","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Lenhard","family":"Reuter","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Florian","family":"Skopik","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Manuel","family":"Warum","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"PLC-based Cyber-Attack Detection: A Last Line of Defence. In IAEA International Conference on Nuclear Security: Sustaining and Strengthening Efforts. IAEA, 10","author":"Allison David","year":"2020","unstructured":"David Allison , Paul Smith , Kieran McLaughlin , Fan Zhang , Jamie Coble , and Rodney Busquim . 2020 . PLC-based Cyber-Attack Detection: A Last Line of Defence. In IAEA International Conference on Nuclear Security: Sustaining and Strengthening Efforts. IAEA, 10 . https:\/\/conferences.iaea.org\/event\/181\/contributions\/15513\/ David Allison, Paul Smith, Kieran McLaughlin, Fan Zhang, Jamie Coble, and Rodney Busquim. 2020. PLC-based Cyber-Attack Detection: A Last Line of Defence. In IAEA International Conference on Nuclear Security: Sustaining and Strengthening Efforts. IAEA, 10. https:\/\/conferences.iaea.org\/event\/181\/contributions\/15513\/"},{"key":"e_1_3_2_1_2_1","volume-title":"European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 73--81","author":"Brilingait\u0117 Agn\u0117","year":"2017","unstructured":"Agn\u0117 Brilingait\u0117 , Linas Bukauskas , and Eduardas Kutka . 2017 . Development of an Educational Platform for Cyber Defence Training . In European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 73--81 . Agn\u0117 Brilingait\u0117, Linas Bukauskas, and Eduardas Kutka. 2017. Development of an Educational Platform for Cyber Defence Training. In European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 73--81."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"e_1_3_2_1_5_1","volume-title":"Understanding Cyber Ranges: From Hype to Reality. WG5 PAPER. European Cyber Security Organisation (ECSO)","author":"ECSO.","unstructured":"ECSO. 2020. Understanding Cyber Ranges: From Hype to Reality. WG5 PAPER. European Cyber Security Organisation (ECSO) , Brussels, Belgium . 31 pages. https:\/\/www.ecs-org.eu\/documents\/uploads\/understanding-cyber-ranges-from-hype-to-reality.pdf ECSO. 2020. Understanding Cyber Ranges: From Hype to Reality. WG5 PAPER. European Cyber Security Organisation (ECSO), Brussels, Belgium. 31 pages. https:\/\/www.ecs-org.eu\/documents\/uploads\/understanding-cyber-ranges-from-hype-to-reality.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.27"},{"key":"e_1_3_2_1_8_1","volume-title":"2017 IEEE 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress. IEEE","author":"Frank M.","year":"2017","unstructured":"M. Frank , M. Leitner , and T. Pahi . 2017. Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education . In 2017 IEEE 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress. IEEE , Orlando, FL, USA, 38--46. https:\/\/doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec. 2017 .23 10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.23 M. Frank, M. Leitner, and T. Pahi. 2017. Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. In 2017 IEEE 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress. IEEE, Orlando, FL, USA, 38--46. https:\/\/doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.23"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2782813"},{"key":"e_1_3_2_1_10_1","volume-title":"Becoming Invisible Hands of National Live-Fire Attack-Defense Cyber Exercise. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). IEEE","author":"Kim J.","unstructured":"J. Kim , Y. Maeng , and M. Jang . 2019 . Becoming Invisible Hands of National Live-Fire Attack-Defense Cyber Exercise. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). IEEE , Stockholm, Sweden, 77--84. J. Kim, Y. Maeng, and M. Jang. 2019. Becoming Invisible Hands of National Live-Fire Attack-Defense Cyber Exercise. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). IEEE, Stockholm, Sweden, 77--84."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102470"},{"key":"e_1_3_2_1_12_1","volume-title":"Digital Transformation in Semiconductor Manufacturing (Lecture Notes in Electrical Engineering)","author":"Kucek Stela","unstructured":"Stela Kucek and Maria Leitner . 2020. Training the Human-in-the-Loop in Industrial Cyber Ranges . In Digital Transformation in Semiconductor Manufacturing (Lecture Notes in Electrical Engineering) , Sophia Keil, Rainer Lasch, Fabian Lindner, and Jacob Lohmer (Eds.). Springer International Publishing , Cham , 107--118. https:\/\/doi.org\/10.1007\/978-3-030-48602-0_10 10.1007\/978-3-030-48602-0_10 Stela Kucek and Maria Leitner. 2020. Training the Human-in-the-Loop in Industrial Cyber Ranges. In Digital Transformation in Semiconductor Manufacturing (Lecture Notes in Electrical Engineering), Sophia Keil, Rainer Lasch, Fabian Lindner, and Jacob Lohmer (Eds.). Springer International Publishing, Cham, 107--118. https:\/\/doi.org\/10.1007\/978-3-030-48602-0_10"},{"key":"e_1_3_2_1_13_1","volume-title":"Situational Awareness for Strategic Decision Making on a National Level","author":"Leitner Maria","unstructured":"Maria Leitner , Timea Pahi , and Florian Skopik . 2017. Situational Awareness for Strategic Decision Making on a National Level . In Collaborative Cyber Threat Intelligence, Florian Skopik (Ed.). CRC Press , 225--276. Maria Leitner, Timea Pahi, and Florian Skopik. 2017. Situational Awareness for Strategic Decision Making on a National Level. In Collaborative Cyber Threat Intelligence, Florian Skopik (Ed.). CRC Press, 225--276."},{"key":"e_1_3_2_1_14_1","unstructured":"U.S. Department of Commerce National Institute of Standards and Technology. 2018. Cyber Ranges. Technical Report. NIST US. https:\/\/www.nist.gov\/system\/files\/documents\/2018\/02\/13\/cyber_ranges.pdf  U.S. Department of Commerce National Institute of Standards and Technology. 2018. Cyber Ranges. Technical Report. NIST US. https:\/\/www.nist.gov\/system\/files\/documents\/2018\/02\/13\/cyber_ranges.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011087"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890935"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.777341"},{"key":"e_1_3_2_1_18_1","volume-title":"The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Vigna Giovanni","unstructured":"Giovanni Vigna , Kevin Borgolte , Jacopo Corbetta , Adam Doup\u00e9 , Yanick Fratantonio , Luca Invernizzi , Dhilung Kirat , and Yan Shoshitaishvili . 2014. Ten Years of iCTF: The Good , The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) . USENIX Association , San Diego, CA , 7. Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doup\u00e9, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good, The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). USENIX Association, San Diego, CA, 7."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190713"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2016.02.006"},{"key":"e_1_3_2_1_21_1","volume-title":"Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Computers & Security 88 (Jan","author":"Yamin Muhammad Mudassar","year":"2020","unstructured":"Muhammad Mudassar Yamin , Basel Katt , and Vasileios Gkioulos . 2020. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Computers & Security 88 (Jan . 2020 ), 101636. https:\/\/doi.org\/10.1016\/j.cose.2019.101636 10.1016\/j.cose.2019.101636 Muhammad Mudassar Yamin, Basel Katt, and Vasileios Gkioulos. 2020. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Computers & Security 88 (Jan. 2020), 101636. https:\/\/doi.org\/10.1016\/j.cose.2019.101636"}],"event":{"name":"EICC 2020: European Interdisciplinary Cybersecurity Conference","location":"Rennes France","acronym":"EICC 2020"},"container-title":["Proceedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424954.3424959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:09Z","timestamp":1750197729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424959"}},"subtitle":["Flexible Cyber Security Environment for Exercises, Training and Research"],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":19,"alternative-id":["10.1145\/3424954.3424959","10.1145\/3424954"],"URL":"https:\/\/doi.org\/10.1145\/3424954.3424959","relation":{},"subject":[],"published":{"date-parts":[[2020,11,18]]},"assertion":[{"value":"2021-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}