{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:23:59Z","timestamp":1773548639876,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["Research and Innovation Program PE00000014, ?SEcurity and RIghts in the CyberSpace (SERICS)?, under the National Recovery and Resilience Plan, Mission 4 Education and Research - Component 2 From Research to Enterprise - Investment 1.3"],"award-info":[{"award-number":["Research and Innovation Program PE00000014, ?SEcurity and RIghts in the CyberSpace (SERICS)?, under the National Recovery and Resilience Plan, Mission 4 Education and Research - Component 2 From Research to Enterprise - Investment 1.3"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["EMPHAsis Evolution' project (CUP J89J22003110005), under Azione 1.1.5 POR Calabria FESR-FSE 2014-2020'"],"award-info":[{"award-number":["EMPHAsis Evolution' project (CUP J89J22003110005), under Azione 1.1.5 POR Calabria FESR-FSE 2014-2020'"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3617553.3617888","type":"proceedings-article","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T03:27:41Z","timestamp":1701401261000},"page":"29-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Cyber Range and Cyber Defense Exercises: Gamification Meets University Students"],"prefix":"10.1145","author":[{"given":"Enrico","family":"Russo","sequence":"first","affiliation":[{"name":"University of Genoa, Genoa, Italy"}]},{"given":"Marina","family":"Ribaudo","sequence":"additional","affiliation":[{"name":"University of Genoa, Genoa, Italy"}]},{"given":"Alessandro","family":"Orlich","sequence":"additional","affiliation":[{"name":"University of Genoa, Genoa, Italy"}]},{"given":"Giacomo","family":"Longo","sequence":"additional","affiliation":[{"name":"University of Genoa, Genoa, Italy"}]},{"given":"Alessandro","family":"Armando","sequence":"additional","affiliation":[{"name":"University of Genoa, Genoa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Boltcms.  https:\/\/boltcms.io\/ \t\t\t\t  2023. Boltcms.  https:\/\/boltcms.io\/"},{"key":"e_1_3_2_1_2_1","volume-title":"2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 574\u2013579","author":"Beltr\u00e1n M.","unstructured":"M. Beltr\u00e1n , M. Calvo , and S. Gonz\u00e1lez . 2018. Experiences Using Capture The Flag Competitions to Introduce Gamification in Undergraduate Computer Security Labs . In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 574\u2013579 . M. Beltr\u00e1n, M. Calvo, and S. Gonz\u00e1lez. 2018. Experiences Using Capture The Flag Competitions to Introduce Gamification in Undergraduate Computer Security Labs. In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 574\u2013579."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101607"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11041809"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368308.3415405"},{"key":"e_1_3_2_1_6_1","unstructured":"CTFd LLC. 2023. CTFd: The Easiest Capture The Flag Framework.  https:\/\/ctfd.io\/ \t\t\t\t  CTFd LLC. 2023. CTFd: The Easiest Capture The Flag Framework.  https:\/\/ctfd.io\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Deciso B.V.. 2021. OPNsense firewall.  https:\/\/opnsense.org\/ \t\t\t\t  Deciso B.V.. 2021. OPNsense firewall.  https:\/\/opnsense.org\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007747104050413"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581046"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70852-8_12"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62433-0_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Ubiquitous Computing, and Dependable Applications (JoWUA), 4","author":"Leitner Maria","year":"2021","unstructured":"Maria Leitner , Maximilian Frank , Gregor Langner , Max Landauer , Florian Skopik , Paul Smith , Benjamin Akhras , Wolfgang Hotwagner , Stela Kucek , Timea Pahi , Lenhard Reuter , and Manuel Warum . 2021. Enabling exercises, education and research with a comprehensive cyber range. Journal of Wireless Mobile Networks , Ubiquitous Computing, and Dependable Applications (JoWUA), 4 ( 2021 ), December, issn:2093-5374 Maria Leitner, Maximilian Frank, Gregor Langner, Max Landauer, Florian Skopik, Paul Smith, Benjamin Akhras, Wolfgang Hotwagner, Stela Kucek, Timea Pahi, Lenhard Reuter, and Manuel Warum. 2021. Enabling exercises, education and research with a comprehensive cyber range. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4 (2021), December, issn:2093-5374"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125686"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2023.101426"},{"key":"e_1_3_2_1_15_1","volume-title":"Peterson","author":"Mirkovic Jelena","year":"2014","unstructured":"Jelena Mirkovic and Peter A. H . Peterson . 2014 . Class Capture-the-Flag Exercises. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). USENIX Association , San Diego, CA. https:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/mirkovic Jelena Mirkovic and Peter A. H. Peterson. 2014. Class Capture-the-Flag Exercises. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/mirkovic"},{"key":"e_1_3_2_1_16_1","unstructured":"Moodle Pty Ltd. 2023. Moodle - Open-source learning platform.  https:\/\/moodle.com\/ \t\t\t\t  Moodle Pty Ltd. 2023. Moodle - Open-source learning platform.  https:\/\/moodle.com\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-59351-6_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101837"},{"key":"e_1_3_2_1_19_1","volume-title":"Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26\u201331, 2019, Proceedings 21","author":"Scholefield Sam","year":"2019","unstructured":"Sam Scholefield and Lynsay A Shepherd . 2019 . Gamification techniques for raising cyber security awareness. In HCI for Cybersecurity , Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26\u201331, 2019, Proceedings 21 . 191\u2013203. Sam Scholefield and Lynsay A Shepherd. 2019. Gamification techniques for raising cyber security awareness. In HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26\u201331, 2019, Proceedings 21. 191\u2013203."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon55549.2022.9811018"},{"key":"e_1_3_2_1_21_1","unstructured":"The MITRE Corporation. 2019. CVE-2019-15107. https:\/\/www.cve.org\/CVERecord?id=CVE-2019-15107 \t\t\t\t  The MITRE Corporation. 2019. CVE-2019-15107. https:\/\/www.cve.org\/CVERecord?id=CVE-2019-15107"},{"key":"e_1_3_2_1_22_1","unstructured":"The MITRE Corporation. 2022. CVE-2022-36532. https:\/\/www.cve.org\/CVERecord?id=CVE-2022-36532 Accessed on 02\/05\/2023 \t\t\t\t  The MITRE Corporation. 2022. CVE-2022-36532. https:\/\/www.cve.org\/CVERecord?id=CVE-2022-36532 Accessed on 02\/05\/2023"},{"key":"e_1_3_2_1_23_1","unstructured":"The MITRE Corporation. 2023. Common Attack Pattern Enumeration and Classification. https:\/\/capec.mitre.org\/index.html Accessed on 02\/05\/2023 \t\t\t\t  The MITRE Corporation. 2023. Common Attack Pattern Enumeration and Classification. https:\/\/capec.mitre.org\/index.html Accessed on 02\/05\/2023"},{"key":"e_1_3_2_1_24_1","unstructured":"The MITRE Corporation. 2023. CVE-2023-22809. https:\/\/www.cve.org\/CVERecord?id=CVE-2023-22809 Accessed on 02\/05\/2023 \t\t\t\t  The MITRE Corporation. 2023. CVE-2023-22809. https:\/\/www.cve.org\/CVERecord?id=CVE-2023-22809 Accessed on 02\/05\/2023"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81242-3_17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.21"},{"key":"e_1_3_2_1_27_1","volume-title":"2016 USENIX Workshop on Advances in Security Education (ASE 16)","author":"Vykopal Jan","year":"2016","unstructured":"Jan Vykopal and Milo\u0161 Bart\u00e1k . 2016 . On the Design of Security Games: From Frustrating to Engaging Learning . In 2016 USENIX Workshop on Advances in Security Education (ASE 16) . USENIX Association, Austin, TX. https:\/\/www.usenix.org\/conference\/ase16\/workshop-program\/presentation\/vykopal Jan Vykopal and Milo\u0161 Bart\u00e1k. 2016. On the Design of Security Games: From Frustrating to Engaging Learning. In 2016 USENIX Workshop on Advances in Security Education (ASE 16). USENIX Association, Austin, TX. https:\/\/www.usenix.org\/conference\/ase16\/workshop-program\/presentation\/vykopal"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006428203100321"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366893"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190713"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(19)30052-1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102635"}],"event":{"name":"Gamify '23: 2nd International Workshop on Gamification in Software Development, Verification, and Validation","location":"San Francisco CA USA","acronym":"Gamify '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2nd International Workshop on Gamification in Software Development, Verification, and Validation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617553.3617888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:45:58Z","timestamp":1750178758000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617553.3617888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":32,"alternative-id":["10.1145\/3617553.3617888","10.1145\/3617553"],"URL":"https:\/\/doi.org\/10.1145\/3617553.3617888","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}