{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T19:07:16Z","timestamp":1778267236118,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481518","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"48-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Plug-and-Play: Framework for Remote Experimentation in Cyber Security"],"prefix":"10.1145","author":[{"given":"Klaudia","family":"Krawiecka","sequence":"first","affiliation":[{"name":"University of Oxford, UK"}]},{"given":"Jack","family":"Sturgess","sequence":"additional","affiliation":[{"name":"University of Oxford, UK"}]},{"given":"Alina","family":"Petrova","sequence":"additional","affiliation":[{"name":"University of Oxford, UK"}]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[{"name":"University of Oxford, UK"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3359012.3359029"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.26502\/acbr.50170011"},{"key":"e_1_3_2_1_4_1","volume-title":"Recruiting People With Disabilities as Research Participants: Challenges and Strategies to Address Them. Mental retardation 42 (01","author":"Becker Heather","year":"2005","unstructured":"Heather Becker , Greg Roberts , Janet Morrison , and Julie Silver . 2005. Recruiting People With Disabilities as Research Participants: Challenges and Strategies to Address Them. Mental retardation 42 (01 2005 ), 471\u20135. https:\/\/doi.org\/10.1352\/0047-6765(2004)42<471:RPWDAR>2.0.CO;2 10.1352\/0047-6765(2004)42<471:RPWDAR>2.0.CO;2 Heather Becker, Greg Roberts, Janet Morrison, and Julie Silver. 2005. Recruiting People With Disabilities as Research Participants: Challenges and Strategies to Address Them. Mental retardation 42 (01 2005), 471\u20135. https:\/\/doi.org\/10.1352\/0047-6765(2004)42<471:RPWDAR>2.0.CO;2"},{"key":"e_1_3_2_1_5_1","volume-title":"Experimental and quasi-experimental designs for research","author":"Campbell T.","unstructured":"Donald\u00a0 T. Campbell and Julian\u00a0 C. Stanley . 2015. Experimental and quasi-experimental designs for research . Ravenio Books . Donald\u00a0T. Campbell and Julian\u00a0C. Stanley. 2015. Experimental and quasi-experimental designs for research. Ravenio Books."},{"key":"e_1_3_2_1_6_1","volume-title":"Teach Remotely: How to Teach From Anywhere. https:\/\/sites.dartmouth.edu\/teachremote\/remote-lab-activities-and-experiences","author":"Dartmouth College","year":"2020","unstructured":"Dartmouth College . 2020 . Teach Remotely: How to Teach From Anywhere. https:\/\/sites.dartmouth.edu\/teachremote\/remote-lab-activities-and-experiences Dartmouth College. 2020. Teach Remotely: How to Teach From Anywhere. https:\/\/sites.dartmouth.edu\/teachremote\/remote-lab-activities-and-experiences"},{"key":"e_1_3_2_1_7_1","unstructured":"C\u00a0Mitchell Dayton. 2002. Some Key Concepts for the Design and Review of Empirical Research. ERIC Digest.(2002). C\u00a0Mitchell Dayton. 2002. Some Key Concepts for the Design and Review of Empirical Research. ERIC Digest.(2002)."},{"key":"e_1_3_2_1_8_1","unstructured":"Carrie Gardner Abby Waliga David Thaw and Sarah Churchman. 2019. Using Camouflaged Cyber Simulations as a Model to Ensure Validity in Cybersecurity Experimentation. arxiv:1905.07059\u00a0[cs.CR] Carrie Gardner Abby Waliga David Thaw and Sarah Churchman. 2019. Using Camouflaged Cyber Simulations as a Model to Ensure Validity in Cybersecurity Experimentation. arxiv:1905.07059\u00a0[cs.CR]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"e_1_3_2_1_10_1","unstructured":"Internet School Experimental\u00a0System (iSES). 2018. Collection of examples for remote laboratories. https:\/\/www.ises.info\/index.php\/en\/laboratory Internet School Experimental\u00a0System (iSES). 2018. Collection of examples for remote laboratories. https:\/\/www.ises.info\/index.php\/en\/laboratory"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services. 43\u201352","author":"Kjeldskov Jesper","year":"2014","unstructured":"Jesper Kjeldskov and Mikael\u00a0 B Skov . 2014 . Was it worth the hassle? Ten years of mobile HCI research discussions on lab and field evaluations . In Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services. 43\u201352 . Jesper Kjeldskov and Mikael\u00a0B Skov. 2014. Was it worth the hassle? Ten years of mobile HCI research discussions on lab and field evaluations. In Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services. 43\u201352."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICL.2012.6402077"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00265"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.3991\/ijoe.v4i2.447","article-title":"Remote Experiments in Control Engineering Education","volume":"4","author":"Naumovic B","year":"2008","unstructured":"Milica\u00a0 B Naumovic and Dragan Zivanovic . 2008 . Remote Experiments in Control Engineering Education Laboratory. Int. J. Online Eng. 4 , 2 (2008), 48 \u2013 53 . Milica\u00a0B Naumovic and Dragan Zivanovic. 2008. Remote Experiments in Control Engineering Education Laboratory. Int. J. Online Eng. 4, 2 (2008), 48\u201353.","journal-title":"Laboratory. Int. J. Online Eng."},{"key":"e_1_3_2_1_15_1","volume-title":"Cybersecurity Methodology for Specialized Behavior Analysis","author":"Padilla Edgar","unstructured":"Edgar Padilla , Jaime\u00a0 C. Acosta , and Christopher\u00a0 D. Kiekintveld . 2021. Cybersecurity Methodology for Specialized Behavior Analysis . In Digital Forensics and Cyber Crime, Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, and Suryadipta Majumdar (Eds.). Springer International Publishing , Cham , 237\u2013243. Edgar Padilla, Jaime\u00a0C. Acosta, and Christopher\u00a0D. Kiekintveld. 2021. Cybersecurity Methodology for Specialized Behavior Analysis. In Digital Forensics and Cyber Crime, Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, and Suryadipta Majumdar (Eds.). Springer International Publishing, Cham, 237\u2013243."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-020-00935-3"},{"key":"e_1_3_2_1_17_1","unstructured":"The\u00a0Royal Society. 2020. Science in Lockdown: the effects of COVID-19 on research and researchers. https:\/\/royalsociety.org\/blog\/2020\/05\/science-in-lockdown-part-one The\u00a0Royal Society. 2020. Science in Lockdown: the effects of COVID-19 on research and researchers. https:\/\/royalsociety.org\/blog\/2020\/05\/science-in-lockdown-part-one"},{"key":"e_1_3_2_1_18_1","volume-title":"Nothing About Us Without Us: Investigating the Role of Critical Disability Studies in HCI. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Spiel Katta","year":"2020","unstructured":"Katta Spiel , Kathrin Gerling , Cynthia\u00a0 L. Bennett , Emeline Brul\u00e9 , Rua\u00a0 M. Williams , Jennifer Rode , and Jennifer Mankoff . 2020 . Nothing About Us Without Us: Investigating the Role of Critical Disability Studies in HCI. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems ( Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20138. https:\/\/doi.org\/10.1145\/3334480.3375150 10.1145\/3334480.3375150 Katta Spiel, Kathrin Gerling, Cynthia\u00a0L. Bennett, Emeline Brul\u00e9, Rua\u00a0M. Williams, Jennifer Rode, and Jennifer Mankoff. 2020. Nothing About Us Without Us: Investigating the Role of Critical Disability Studies in HCI. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems(Honolulu, HI, USA) (CHI EA \u201920). Association for Computing Machinery, New York, NY, USA, 1\u20138. https:\/\/doi.org\/10.1145\/3334480.3375150"},{"key":"e_1_3_2_1_19_1","volume-title":"A comparison of field-based and lab-based experiments to evaluate user experience of personalised mobile devices. Advances in Human-Computer Interaction 2013","author":"Sun Xu","year":"2013","unstructured":"Xu Sun and Andrew May . 2013. A comparison of field-based and lab-based experiments to evaluate user experience of personalised mobile devices. Advances in Human-Computer Interaction 2013 ( 2013 ). Xu Sun and Andrew May. 2013. A comparison of field-based and lab-based experiments to evaluate user experience of personalised mobile devices. Advances in Human-Computer Interaction 2013 (2013)."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the ISPRS E-Learning, Vol.\u00a02005","author":"Thomsen Christian","year":"2005","unstructured":"Christian Thomsen , Harald Scheel , and Sabine Morgner . 2005 . Remote experiments in experimental physics . In Proceedings of the ISPRS E-Learning, Vol.\u00a02005 . Citeseer. Christian Thomsen, Harald Scheel, and Sabine Morgner. 2005. Remote experiments in experimental physics. In Proceedings of the ISPRS E-Learning, Vol.\u00a02005. Citeseer."}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","location":"Karlsruhe Germany","acronym":"EuroUSEC '21"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:32Z","timestamp":1750191452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":19,"alternative-id":["10.1145\/3481357.3481518","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481518","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}