{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:50Z","timestamp":1750219970302,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010790","name":"Erasmus+","doi-asserted-by":"publisher","award":["1701-EPP-1-2020-1-LT-EPPKA2-SSA-B","621701-EPP-1-2020-1-LT-EPPKA2-SSA-B"],"award-info":[{"award-number":["1701-EPP-1-2020-1-LT-EPPKA2-SSA-B","621701-EPP-1-2020-1-LT-EPPKA2-SSA-B"]}],"id":[{"id":"10.13039\/501100010790","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012550","name":"Nemzeti Kutat\u00e1si, Fejleszt\u00e9si \u00e9s Innovaci\u00f3s Alap","doi-asserted-by":"publisher","award":["TKP2021-NVA"],"award-info":[{"award-number":["TKP2021-NVA"]}],"id":[{"id":"10.13039\/501100012550","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3605002","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DJM-CYBER: A Joint Master in Advanced Cybersecurity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1722-9701","authenticated-orcid":false,"given":"Yianna","family":"Danidou","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, European University Cyprus, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0842-4951","authenticated-orcid":false,"given":"Sara","family":"Ricci","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5525-1259","authenticated-orcid":false,"given":"Antonio","family":"Skarmeta","sequence":"additional","affiliation":[{"name":"Universidad de Murcia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8382-9185","authenticated-orcid":false,"given":"Jiri","family":"Hosek","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4710-5283","authenticated-orcid":false,"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6188-4936","authenticated-orcid":false,"given":"Imre","family":"Lendak","sequence":"additional","affiliation":[{"name":"Faculty of Informatics, E\u00f6tv\u00f6s Lor\u00e1nd University, Hungary and Faculty of Technical Sciences, University of Novi Sad, Serbia"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101769"},{"key":"e_1_3_2_1_2_1","volume-title":"How to Avoid a Replay of \"Crypto Wars\" in Security Research. login Usenix Mag. 39, 4","author":"Bratus Sergey","year":"2014","unstructured":"Sergey Bratus, Iv\u00e1n Arce, Michael\u00a0E. Locasto, and Stefano Zanero. 2014. Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of \"Crypto Wars\" in Security Research. login Usenix Mag. 39, 4 (2014). https:\/\/www.usenix.org\/publications\/login\/august14\/bratus"},{"key":"e_1_3_2_1_3_1","unstructured":"CONCORDIA. 2022. Teach-the-Teachers in high-school. Methodology and Guidelines. (2022). https:\/\/www.concordia-h2020.eu\/wp-content\/uploads\/2022\/11\/Teach-the-TeachersMethodology-for-publication.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"CyberSec4Europe. 2023. Final Educational and Assessment Framework (CyberSec4Europe). https:\/\/cybersec4europe.eu\/wp-content\/uploads\/2022\/07\/D6.6-Final-Educational-and-Assessment-Framework_submitted.pdf"},{"key":"e_1_3_2_1_5_1","unstructured":"Petr Dzurenda and Sara Ricci. 2022. R3.4.1 Mapping the framework to existing courses and schemes. https:\/\/rewireproject.eu\/wp-content\/uploads\/2023\/03\/REWIRE_R3.4.1_Deliverable-v8-Final-EC-Check.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"ENISA. 2022. European Cybersecurity Skills Framework Role Profiles. https:\/\/www.enisa.europa.eu\/publications\/european-cybersecurity-skills-framework-role-profiles"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"CSEC2017 Joint\u00a0Task Force. 2017. Cybersecurity Curricula 2017 \u2014 Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Retrieved from Association for Computing Machinery: https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/csec2017.pdf.","DOI":"10.1145\/3184594"},{"key":"e_1_3_2_1_8_1","unstructured":"Jan Hajny. 2020. D9.2 Curricula descriptions. https:\/\/www.sparta.eu\/assets\/deliverables\/SPARTA-D9.2-Curricula-descriptions-PU-M18.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469183"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543799"},{"key":"e_1_3_2_1_11_1","unstructured":"Igor Nai\u00a0Fovino Ricardo Neisse Juan Hernandez\u00a0Ramos Nicoleta Polemi Gian-Luca Ruzzante Markus Figwer and Alessandro Lazari. 2019. A Proposal for a European Cybersecurity Taxonomy. Retrieved from EUROPA - European Union website the official EU website: https:\/\/publications.jrc.ec.europa.eu\/repository\/bitstream\/JRC118089\/taxonomy-v2.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Rodney Petersen Danielle Santos Matthew\u00a0C. Smith Karen\u00a0A. Wetzel and Greg Witte. 2020. NIST Special Publication 800-181 Revision 1: Workforce Framework for Cybersecurity (NICE Framework). available online at https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-181r1.pdf. https:\/\/doi.org\/10.6028\/NIST.SP.800-181r1","DOI":"10.6028\/NIST.SP.800-181r1"},{"key":"e_1_3_2_1_13_1","unstructured":"Awais Rashid Howard Chivers George Danezis Emil\u00a0C. Lupu and Andrew Martin. 2019. CyBOK \u2014 The Cyber Security Body of Knowledge \u2014 Version 1.0. Retrieved from CyBOK: https:\/\/www.cybok.org\/media\/downloads\/CyBOK-version-1.0.pdf."},{"key":"e_1_3_2_1_14_1","unstructured":"REWIRE. 2020. Cybersecurity Skills Alliance \u2013 A New Vision for Europe (REWIRE). https:\/\/rewireproject.eu\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543821"},{"key":"e_1_3_2_1_16_1","unstructured":"WG5 PAPER - European Cybersecurity Education and Professional Training Minimum Reference Curriculum - SWG 5.2. 2021. European Cybersecurity Education and Professional Training Minimum Reference Curriculum - SWG 5.2. Retrieved from European Cyber Security Organisation (ECSO): https:\/\/www.ecs-org.eu\/documents\/publications\/61967913d3f81.pdf."}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","acronym":"ARES 2023","location":"Benevento Italy"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3605002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:16Z","timestamp":1750182556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":16,"alternative-id":["10.1145\/3600160.3605002","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3605002","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}