{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T16:10:04Z","timestamp":1750781404679,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3726301.3733242","type":"proceedings-article","created":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:16:41Z","timestamp":1750504601000},"page":"3-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Reflection Test of Time: RINSE: the real-time immersive network simulation environment for network security exercises"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-6979","authenticated-orcid":false,"given":"David","family":"Nicol","sequence":"first","affiliation":[{"name":"Grainger College of Engineering, Information Trust Institute, University of Illinois Urbana Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61814-8_10"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Nabin Chowdhury and Vasileios Gkioulos. 2021. Cyber security training for critical infrastructure protection: A literature review. Computer Science Review 40 (2021) 100361. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100361","DOI":"10.1016\/j.cosrev.2021.100361"},{"key":"e_1_3_3_1_4_2","unstructured":"dblp bibliography. 2025. David M. Nicol publications. https:\/\/dblp.org\/pid\/n\/DavidMNicol.html. [Online; accessed 30-April-2025]."},{"key":"e_1_3_3_1_5_2","unstructured":"dblp bibliography. 2025. Dong (Kevin) Jin publications. https:\/\/dblp.org\/pid\/118\/8012.html. [Online; accessed 30-April-2025]."},{"key":"e_1_3_3_1_6_2","unstructured":"dblp bibliography. 2025. Guanhua Yan publications. https:\/\/dblp.org\/pid\/13\/4177.html. [Online; accessed 30-April-2025]."},{"key":"e_1_3_3_1_7_2","unstructured":"dblp bibliography. 2025. Jason Liu publications. https:\/\/dblp.org\/pid\/07\/6819-1.html. [Online; accessed 30-April-2025]."},{"key":"e_1_3_3_1_8_2","volume-title":"INTED 2019: 13th International Technology, Education and Development Conference. 11-13 March, 2019, Valencia (Spain), Conference Proceedings","author":"Hautam\u00e4ki Jari","year":"2019","unstructured":"Jari Hautam\u00e4ki, Mika Karjalainen, P\u00e4ivi H\u00e4kkinen, and Timo H\u00e4m\u00e4l\u00e4inen. 2019. Cyber security exercise\u2013literature review to pedagogical methodology. In INTED 2019: 13th International Technology, Education and Development Conference. 11-13 March, 2019, Valencia (Spain), Conference Proceedings. International Association of Technology Education and Development."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Linbo Hui Mowei Wang Liang Zhang Lu Lu and Yong Cui. 2022. Digital twin for networking: A data-driven performance modeling perspective. IEEE Network 37 3 (2022) 202\u2013209.","DOI":"10.1109\/MNET.119.2200080"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Hamdi Kavak Jose\u00a0J Padilla Daniele Vernon-Bido Saikou\u00a0Y Diallo Ross Gore and Sachin Shetty. 2021. Simulation for cybersecurity: state of the art and future directions. Journal of Cybersecurity 7 1 (2021) tyab005.","DOI":"10.1093\/cybsec\/tyab005"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756901"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34210-3_4"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Vladislav\u00a0D Veksler Norbou Buchler Blaine\u00a0E Hoffman Daniel\u00a0N Cassenti Char Sample and Shridat Sugrim. 2018. Simulations in cyber-security: a review of cognitive modeling of network attackers defenders and users. Frontiers in psychology 9 (2018) 691.","DOI":"10.3389\/fpsyg.2018.00691"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Yiwen Wu Ke Zhang and Yan Zhang. 2021. Digital twin networks: A survey. IEEE Internet of Things Journal 8 18 (2021) 13789\u201313804.","DOI":"10.1109\/JIOT.2021.3079510"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Mudassar Yamin and Basel Katt. 2022. Modeling and executing cyber security exercise scenarios in cyber ranges. Computers & Security 116 (2022) 102635.","DOI":"10.1016\/j.cose.2022.102635"}],"event":{"name":"SIGSIM-PADS '25: 39th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Santa Fe USA","acronym":"SIGSIM-PADS '25"},"container-title":["Proceedings of the 39th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726301.3733242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T15:33:56Z","timestamp":1750779236000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726301.3733242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":14,"alternative-id":["10.1145\/3726301.3733242","10.1145\/3726301"],"URL":"https:\/\/doi.org\/10.1145\/3726301.3733242","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]},"assertion":[{"value":"2025-06-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}