{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:05:02Z","timestamp":1771700702024,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Nemzeti Kutat\u00e1si, Fejleszt\u00e9si \u00e9s Innovaci\u00f3s Alap","doi-asserted-by":"publisher","award":["TKP2021-NVA-29"],"award-info":[{"award-number":["TKP2021-NVA-29"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Erasmus+","doi-asserted-by":"publisher","award":["621701-EPP-1-2020-1-LT-EPPKA2-SSA-B 'REWIRE'"],"award-info":[{"award-number":["621701-EPP-1-2020-1-LT-EPPKA2-SSA-B 'REWIRE'"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky","doi-asserted-by":"publisher","award":["VJ03030003"],"award-info":[{"award-number":["VJ03030003"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670467","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4366-3950","authenticated-orcid":false,"given":"Petr","family":"Dzurenda","sequence":"first","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0842-4951","authenticated-orcid":false,"given":"Sara","family":"Ricci","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2896-2303","authenticated-orcid":false,"given":"Marek","family":"Sikora","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9048-4381","authenticated-orcid":false,"given":"Michal","family":"Stejskal","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6188-4936","authenticated-orcid":false,"given":"Imre","family":"Lend\u00e1k","sequence":"additional","affiliation":[{"name":"University of Novi Sad, Serbia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4049-1954","authenticated-orcid":false,"given":"Pedro","family":"Adao","sequence":"additional","affiliation":[{"name":"Instituto Superior T\u00e9cnico, ULisboa, and Instituto de Telecomunica\u00e7\u00f5es, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0582-9"},{"key":"e_1_3_2_1_2_1","volume-title":"European business intelligence summer school","author":"Bontempi Gianluca","unstructured":"Gianluca Bontempi, Souhaib Ben\u00a0Taieb, and Yann-A\u00ebl\u00a0Le Borgne. 2012. Machine learning strategies for time series forecasting. In European business intelligence summer school. Springer, 62\u201377."},{"key":"e_1_3_2_1_3_1","unstructured":"Petr Dzurenda and Sara Ricci. 2022. R3.4.1 Mapping the framework to existing courses and schemes. https:\/\/rewireproject.eu\/wp-content\/uploads\/2023\/03\/REWIRE_R3.4.1_Deliverable-v8-Final-EC-Check.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"ENISA. 2022. European Cybersecurity Skills Framework Role Profiles. https:\/\/www.enisa.europa.eu\/publications\/european-cybersecurity-skills-framework-role-profiles"},{"key":"e_1_3_2_1_5_1","unstructured":"ENISA. 2023. Communication on the Cybersecurity Skills Academy. https:\/\/digital-strategy.ec.europa.eu\/en\/library\/communication-cybersecurity-skills-academy"},{"key":"e_1_3_2_1_6_1","volume-title":"Cybersecurity curricular guidance for associate-degree programs","author":"Cyber2yr2020\u00a0Task Group","unstructured":"Cyber2yr2020\u00a0Task Group. 2020. Cybersecurity curricular guidance for associate-degree programs. Association for Computing Machinery."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469183"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543799"},{"key":"e_1_3_2_1_9_1","unstructured":"ICS2. 2023. Cybersecurity Workforce Study. https:\/\/www.isc2.org\/Research"},{"key":"e_1_3_2_1_10_1","unstructured":"Jan Jerabek Edmundas Piesarskas Imre Lend\u00e1k Viktor Varga Gyorgy Dan Sara Ricci Paulius Pakutinskas and Donatas Alksnys. 2022. R2.2.2 Cybersecurity Skills Needs Analysis. https:\/\/rewireproject.eu\/wp-content\/uploads\/2022\/04\/R2.2.2-Cybersecurity-Skills-Needs-Analysis_FINAL_v1.1.pdf"},{"key":"e_1_3_2_1_11_1","volume-title":"Addressing the eu cybersecurity skills shortage and gap through higher education","author":"Nurse RC","year":"2021","unstructured":"Jason\u00a0RC Nurse, Konstantinos Adamos, Athanasios Grammatopoulos, and Fabio Di\u00a0Franco. 2021. Addressing the eu cybersecurity skills shortage and gap through higher education. European Union Agency for Cybersecurity (ENISA) Report (2021)."},{"key":"e_1_3_2_1_12_1","unstructured":"Brno\u00a0University of Technology. 2023-2024. curriculum \"Information Security\". https:\/\/www.vut.cz\/en\/students\/programmes\/programme\/8369"},{"key":"e_1_3_2_1_13_1","volume-title":"Combinatorial optimization: algorithms and complexity","author":"Papadimitriou H","unstructured":"Christos\u00a0H Papadimitriou and Kenneth Steiglitz. 1998. Combinatorial optimization: algorithms and complexity. Courier Corporation."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Rodney Petersen Danielle Santos Matthew\u00a0C. Smith Karen\u00a0A. Wetzel and Greg Witte. 2020. NIST Special Publication 800-181 Revision 1: Workforce Framework for Cybersecurity (NICE Framework). available online at https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-181r1.pdf. https:\/\/doi.org\/10.6028\/NIST.SP.800-181r1","DOI":"10.6028\/NIST.SP.800-181r1"},{"key":"e_1_3_2_1_15_1","volume-title":"Global Cybersecurity Outlook","author":"Pipikaite A","year":"2022","unstructured":"A Pipikaite, G Bueermann, A Joshi, and J Jurgens. 2022. Global Cybersecurity Outlook 2022. In Geneva: World Economic Forum."},{"key":"e_1_3_2_1_16_1","volume-title":"REWIRE: Cybersecurity Skills Alliance - A new Vision for Europe. https:\/\/rewireproject.eu\/","author":"REWIRE.","year":"2020","unstructured":"REWIRE. 2020. REWIRE: Cybersecurity Skills Alliance - A new Vision for Europe. https:\/\/rewireproject.eu\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543821"},{"key":"e_1_3_2_1_18_1","volume-title":"Learning representations by back-propagating errors. nature 323, 6088","author":"Rumelhart E","year":"1986","unstructured":"David\u00a0E Rumelhart, Geoffrey\u00a0E Hinton, and Ronald\u00a0J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533\u2013536."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Karen Wetzel. 2021. NICE framework competencies: assessing learners for cybersecurity work. Technical Report. National Institute of Standards and Technology.","DOI":"10.6028\/NIST.IR.8355-draft2"},{"key":"e_1_3_2_1_20_1","volume-title":"Comparative study of CNN and RNN for natural language processing. arXiv preprint arXiv:1702.01923","author":"Yin Wenpeng","year":"2017","unstructured":"Wenpeng Yin, Katharina Kann, Mo Yu, and Hinrich Sch\u00fctze. 2017. Comparative study of CNN and RNN for natural language processing. arXiv preprint arXiv:1702.01923 (2017)."}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670467","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:51:10Z","timestamp":1755881470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":20,"alternative-id":["10.1145\/3664476.3670467","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670467","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}