{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:48Z","timestamp":1750220088949,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of the Interior of the Czech Republic","award":["VI20202022158"],"award-info":[{"award-number":["VI20202022158"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,7]]},"DOI":"10.1145\/3502718.3524819","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T10:28:30Z","timestamp":1657189710000},"page":"449-455","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Process Mining Analysis of Puzzle-Based Cybersecurity Training"],"prefix":"10.1145","author":[{"given":"Martin","family":"Macak","sequence":"first","affiliation":[{"name":"Masaryk University, Brno, Czech Rep"}]},{"given":"Radek","family":"Oslejsek","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Rep"}]},{"given":"Barbora","family":"Buhnova","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Rep"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01442-0"},{"key":"e_1_3_2_1_2_1","volume-title":"Process mining techniques for analysing patterns and strategies in students' self-regulated learning. Metacognition and learning","author":"Bannert Maria","year":"2014","unstructured":"Maria Bannert , Peter Reimann , and Christoph Sonnenberg . 2014. Process mining techniques for analysing patterns and strategies in students' self-regulated learning. Metacognition and learning , Vol. 9 , 2 ( 2014 ), 161--185. Maria Bannert, Peter Reimann, and Christoph Sonnenberg. 2014. Process mining techniques for analysing patterns and strategies in students' self-regulated learning. Metacognition and learning , Vol. 9, 2 (2014), 161--185."},{"key":"e_1_3_2_1_3_1","volume-title":"Process mining for Python (PM4Py): bridging the gap between process-and data science. arXiv preprint arXiv:1905.06169","author":"Berti Alessandro","year":"2019","unstructured":"Alessandro Berti , Sebastiaan J van Zelst , and Wil van der Aalst . 2019. Process mining for Python (PM4Py): bridging the gap between process-and data science. arXiv preprint arXiv:1905.06169 ( 2019 ). Alessandro Berti, Sebastiaan J van Zelst, and Wil van der Aalst. 2019. Process mining for Python (PM4Py): bridging the gap between process-and data science. arXiv preprint arXiv:1905.06169 (2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1230"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567574.2567604"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11041809"},{"key":"e_1_3_2_1_8_1","unstructured":"Circadence. 2021. Ares Project. https:\/\/projectares.academy\/  Circadence. 2021. Ares Project. https:\/\/projectares.academy\/"},{"volume-title":"The Fun and Future of CTF. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Davis Andy","key":"e_1_3_2_1_9_1","unstructured":"Andy Davis , Tim Leek , Michael Zhivich , Kyle Gwinnup , and William Leonard . 2014. The Fun and Future of CTF. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) . USENIX Association , San Diego, CA . Andy Davis, Tim Leek, Michael Zhivich, Kyle Gwinnup, and William Leonard. 2014. The Fun and Future of CTF. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). USENIX Association, San Diego, CA."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.05.003"},{"key":"e_1_3_2_1_11_1","volume-title":"Assessing Process Discovery Scalability in Data Intensive Environments. In 2015 IEEE\/ACM 2nd International Symposium on Big Data Computing (BDC) . 99--104","author":"Hern\u00e1ndez Sergio","year":"2015","unstructured":"Sergio Hern\u00e1ndez , Joaqu\u00edn Ezpeleta , S.J. van Zelst , and Wil M.P . van der Aalst. 2015 . Assessing Process Discovery Scalability in Data Intensive Environments. In 2015 IEEE\/ACM 2nd International Symposium on Big Data Computing (BDC) . 99--104 . https:\/\/doi.org\/10.1109\/BDC. 2015 .31 10.1109\/BDC.2015.31 Sergio Hern\u00e1ndez, Joaqu\u00edn Ezpeleta, S.J. van Zelst, and Wil M.P. van der Aalst. 2015. Assessing Process Discovery Scalability in Data Intensive Environments. In 2015 IEEE\/ACM 2nd International Symposium on Big Data Computing (BDC) . 99--104. https:\/\/doi.org\/10.1109\/BDC.2015.31"},{"key":"e_1_3_2_1_12_1","volume-title":"Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems. In Model-driven Simulation and Training Environments for Cybersecurity ,","author":"Kn\u00fcpfer Marcus","year":"2020","unstructured":"Marcus Kn\u00fcpfer , Tore Bierwirth , Lars Stiemert , Matthias Schopp , Sebastian Seeber , Daniela P\u00f6hn , and Peter Hillmann . 2020 . Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems. In Model-driven Simulation and Training Environments for Cybersecurity , , George Hatzivasilis and Sotiris Ioannidis (Eds.). Springer International Publishing , Cham , 3--21. Marcus Kn\u00fcpfer, Tore Bierwirth, Lars Stiemert, Matthias Schopp, Sebastian Seeber, Daniela P\u00f6hn, and Peter Hillmann. 2020. Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems. In Model-driven Simulation and Training Environments for Cybersecurity , , George Hatzivasilis and Sotiris Ioannidis (Eds.). Springer International Publishing, Cham, 3--21."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2021.100120"},{"volume-title":"Advanced Data Mining and Applications","author":"Macak Martin","key":"e_1_3_2_1_14_1","unstructured":"Martin Macak , Lukas Daubner , Julia Jamnicka , and Barbora Buhnova . 2022 b. Game Achievement Analysis: Process Mining Approach . In Advanced Data Mining and Applications , Bohan Li, Lin Yue, Jing Jiang, Weitong Chen, Xue Li, Guodong Long, Fei Fang, and Han Yu (Eds.). Springer International Publishing , Cham , 68--82. Martin Macak, Lukas Daubner, Julia Jamnicka, and Barbora Buhnova. 2022 b. Game Achievement Analysis: Process Mining Approach. In Advanced Data Mining and Applications, Bohan Li, Lin Yue, Jing Jiang, Weitong Chen, Xue Li, Guodong Long, Fei Fang, and Han Yu (Eds.). Springer International Publishing, Cham, 68--82."},{"key":"e_1_3_2_1_15_1","volume-title":"Using process mining for Git log analysis of projects in a software development course. Education and Information Technologies","author":"Macak Martin","year":"2021","unstructured":"Martin Macak , Daniela Kruzelova , Stanislav Chren , and Barbora Buhnova . 2021. Using process mining for Git log analysis of projects in a software development course. Education and Information Technologies ( 2021 ), 1--31. Martin Macak, Daniela Kruzelova, Stanislav Chren, and Barbora Buhnova. 2021. Using process mining for Git log analysis of projects in a software development course. Education and Information Technologies (2021), 1--31."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00047"},{"volume-title":"Puzzle-based learning","author":"Michalewicz Zbigniew","key":"e_1_3_2_1_17_1","unstructured":"Zbigniew Michalewicz and Matthew Michalewicz . 2008. Puzzle-based learning . Hybrid Publishers , Ormond, Australia . Zbigniew Michalewicz and Matthew Michalewicz. 2008. Puzzle-based learning .Hybrid Publishers, Ormond, Australia."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366935"},{"key":"e_1_3_2_1_19_1","volume-title":"5th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2015 . CEUR-WS. org, 18--32","author":"Mukala P","year":"2015","unstructured":"P Mukala , J Buijs , M Leemans , and W van der Aalst . 2015 . Learning analytics on coursera event data: a process mining approach . In 5th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2015 . CEUR-WS. org, 18--32 . P Mukala, J Buijs, M Leemans, and W van der Aalst. 2015. Learning analytics on coursera event data: a process mining approach. In 5th International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2015 . CEUR-WS. org, 18--32."},{"key":"e_1_3_2_1_20_1","volume-title":"Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. In 2019 IEEE Symposium on Visualization for Cyber Security (VizSec) . IEEE, 1--11","author":"Rus\u00e1k V\u00edt","year":"2019","unstructured":"V\u00edt Rus\u00e1k , Karol\u00edna Bursk\u00e1 , Valdemar v \u00e1bensk\u00fd , and Jan Vykopal . 2019 . Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. In 2019 IEEE Symposium on Visualization for Cyber Security (VizSec) . IEEE, 1--11 . https:\/\/doi.org\/10.1109\/VizSec48167.2019.9161386 10.1109\/VizSec48167.2019.9161386 V\u00edt Rus\u00e1k, Karol\u00edna Bursk\u00e1, Valdemar v\u00e1bensk\u00fd, and Jan Vykopal. 2019. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. In 2019 IEEE Symposium on Visualization for Cyber Security (VizSec) . IEEE, 1--11. https:\/\/doi.org\/10.1109\/VizSec48167.2019.9161386"},{"key":"e_1_3_2_1_21_1","volume-title":"V\u00edt. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18)","author":"Vykopal Jan","year":"2018","unstructured":"Jan Vykopal , Karol\u00edna Bursk\u00e1 , and V\u00edt. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18) (San Jose, California, USA). IEEE, San Jose, California, USA, 1--9. https:\/\/doi.org\/10.1109\/FIE. 2018 .8659299 10.1109\/FIE.2018.8659299 Jan Vykopal, Karol\u00edna Bursk\u00e1, and V\u00edt. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18) (San Jose, California, USA). IEEE, San Jose, California, USA, 1--9. https:\/\/doi.org\/10.1109\/FIE.2018.8659299"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1736186.1736216"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011087"},{"key":"e_1_3_2_1_24_1","volume-title":"Educational process mining: a tutorial and case study using Moodle data sets. Data mining and learning analytics: Applications in educational research","author":"Romero Crist\u00f3bal","year":"2016","unstructured":"Crist\u00f3bal Romero , Rebeca Cerezo , Alejandro Bogar'in , and Miguel S\u00e1nchez-Santill\u00e1n . 2016. Educational process mining: a tutorial and case study using Moodle data sets. Data mining and learning analytics: Applications in educational research , Vol. 1 ( 2016 ). Crist\u00f3bal Romero, Rebeca Cerezo, Alejandro Bogar'in, and Miguel S\u00e1nchez-Santill\u00e1n. 2016. Educational process mining: a tutorial and case study using Moodle data sets. Data mining and learning analytics: Applications in educational research , Vol. 1 (2016)."},{"key":"e_1_3_2_1_25_1","volume-title":"Katie Salen Tekinbacs , and Eric Zimmerman","author":"Salen Katie","year":"2004","unstructured":"Katie Salen , Katie Salen Tekinbacs , and Eric Zimmerman . 2004 . Rules of play: Game de sign fundamentals .MIT press. Katie Salen, Katie Salen Tekinbacs , and Eric Zimmerman. 2004. Rules of play: Game design fundamentals .MIT press."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/VL.1996.545307"},{"volume-title":"Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education. ACM, ACM","author":"\u00e1bensk\u00fd Valdemar","key":"e_1_3_2_1_27_1","unstructured":"Valdemar vS v \u00e1bensk\u00fd , Jan Vykopal , Milan Cermak , and Martin Lavs tovivc ka. 2018. Enhancing Cybersecurity Skills by Creating Serious Games . In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education. ACM, ACM , New York, NY, USA, 194--199. Valdemar vS v\u00e1bensk\u00fd , Jan Vykopal, Milan Cermak, and Martin Lavs tovivc ka. 2018. Enhancing Cybersecurity Skills by Creating Serious Games. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education. ACM, ACM, New York, NY, USA, 194--199."},{"key":"e_1_3_2_1_28_1","volume-title":"Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens.","author":"Ukwandu Elochukwu","year":"2020","unstructured":"Elochukwu Ukwandu , Mohamed Amine Ben Farah , Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. 2020 . A Review of Cyber-Ranges and Test-Beds: Current and Future Trends. Sensors , Vol. 20 , 24 (2020). Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. 2020. A Review of Cyber-Ranges and Test-Beds: Current and Future Trends. Sensors , Vol. 20, 24 (2020)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4"},{"volume-title":"The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education","author":"Vigna Giovanni","key":"e_1_3_2_1_30_1","unstructured":"Giovanni Vigna , Kevin Borgolte , Jacopo Corbetta , Adam Doup\u00e9 , Yanick Fratantonio , Luca Invernizzi , Dhilung Kirat , and Yan Shoshitaishvili . 2014. Ten Years of iCTF: The Good , The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education . USENIX Association , San Diego, CA . Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doup\u00e9, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good, The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education. USENIX Association, San Diego, CA."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006428203100321"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844646"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.54"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 4th Conference on Cyber Security Experimentation and Test","author":"Werther Joseph","year":"2011","unstructured":"Joseph Werther , Michael Zhivich , Tim Leek , and Nickolai Zeldovich . 2011 . Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-flag Exercise . In Proceedings of the 4th Conference on Cyber Security Experimentation and Test ( San Francisco, CA) (CSET'11). USENIX Association, Berkeley, CA, USA. Joseph Werther, Michael Zhivich, Tim Leek, and Nickolai Zeldovich. 2011. Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-flag Exercise. In Proceedings of the 4th Conference on Cyber Security Experimentation and Test (San Francisco, CA) (CSET'11). USENIX Association, Berkeley, CA, USA."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101636"},{"key":"e_1_3_2_1_36_1","volume-title":"Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. In 2021 IEEE Frontiers in Education Conference (FIE)","author":"Vykopal Jan","year":"2021","unstructured":"Jan Vykopal , Daniel Tovar? \u00e1k , and Pavel ?eleda. 2021 . Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. In 2021 IEEE Frontiers in Education Conference (FIE) ( New York, NY, USA). IEEE, New York, NY, USA, 1--9. https:\/\/doi.org\/10.1109\/FIE49875. 2021.9637052 10.1109\/FIE49875.2021.9637052 Jan Vykopal, Daniel Tovar?\u00e1k, and Pavel ?eleda. 2021. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. In 2021 IEEE Frontiers in Education Conference (FIE) (New York, NY, USA). IEEE, New York, NY, USA, 1--9. https:\/\/doi.org\/10.1109\/FIE49875.2021.9637052"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22)","author":"Weiss Richard","year":"2022","unstructured":"Richard Weiss , Jack Cook , Jan Vykopal ,, Jens Mache , Radoslav Chudovsk\u00fd , and Ankur Chattopadhyay . 2022 . Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises . In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22) (New York, NY, USA). ACM, New York, NY, USA, 787--793. https:\/\/doi.org\/10.1145\/3478431.3499414 10.1145\/3478431.3499414 Richard Weiss, Jack Cook, Jan Vykopal,, Jens Mache, Radoslav Chudovsk\u00fd, and Ankur Chattopadhyay. 2022. Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22) (New York, NY, USA). ACM, New York, NY, USA, 787--793. https:\/\/doi.org\/10.1145\/3478431.3499414"}],"event":{"name":"ITiCSE 2022: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Dublin Ireland","acronym":"ITiCSE 2022"},"container-title":["Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3502718.3524819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:47Z","timestamp":1750183787000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":37,"alternative-id":["10.1145\/3502718.3524819","10.1145\/3502718"],"URL":"https:\/\/doi.org\/10.1145\/3502718.3524819","relation":{},"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}