{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:58:23Z","timestamp":1776931103571,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,6]]},"DOI":"10.1145\/3769694.3771140","type":"proceedings-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T10:03:58Z","timestamp":1766829838000},"page":"219-225","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Driving Factors Behind Adopting Virtual Testbeds for ICS Cybersecurity Education."],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3763-3300","authenticated-orcid":false,"given":"Taiwo Peter","family":"Akinremi","sequence":"first","affiliation":[{"name":"School of Information Technology, University of Cincinnati, Cincinnati, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6411-4398","authenticated-orcid":false,"given":"Joel Kwesi","family":"Appiah","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati, Cincinnati, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5440-8456","authenticated-orcid":false,"given":"Amir Reza","family":"Asadi","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati, Cincinnati, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7934-4976","authenticated-orcid":false,"given":"Opetunde","family":"Ibitoye","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati, Cincinnati, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9602-6322","authenticated-orcid":false,"given":"Saheed","family":"Popoola","sequence":"additional","affiliation":[{"name":"School of Information Technology, University of Cincinnati, Cincinnati, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3626205.3659148"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SATC65530.2025.11137109"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Muna Al-Hawawreh and Elena Sitnikova. 2020. Developing a security testbed for industrial internet of things. IEEE Internet of Things Journal 8 7 (2020) 5558\u20135573.","DOI":"10.1109\/JIOT.2020.3032093"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/IETC47856.2020.9249163"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2523501.2523506"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366908"},{"key":"e_1_3_3_1_8_2","unstructured":"Jacqueline Chandler Miranda Cumpston Tianjing Li Matthew\u00a0J Page and VJHW Welch. 2019. Cochrane handbook for systematic reviews of interventions. Hoboken: Wiley (2019)."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0Conte de Leon Christopher\u00a0E Goes Michael\u00a0A Haney and Axel\u00a0W Krings. 2018. ADLES: Specifying deploying and sharing hands-on cyber-exercises. Computers & Security 74 (2018) 12\u201340.","DOI":"10.1016\/j.cose.2017.12.007"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/SIN54109.2021.9699375"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC52156.2021.9467852"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cyber-RCI55324.2022.10032670"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC61953.2024.10603140"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581046"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26502-5_2"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.23919\/EAEEIE55804.2023.10181644"},{"key":"e_1_3_3_1_17_2","unstructured":"Staffs Keele and others. 2007. Guidelines for performing systematic literature reviews in software engineering."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Minseo Kim Seungho Jeon Jake Cho and Seonghyeon Gong. 2024. Data-Driven ICS Network Simulation for Synthetic Data Generation. Electronics 13 10 (2024) 1920.","DOI":"10.3390\/electronics13101920"},{"key":"e_1_3_3_1_19_2","unstructured":"Matthew\u00a0J Kirkland Stu Steiner and Daniel Conte\u00a0de Leon. 2021. vWaterLabs: Design and characteristics of a virtual testbed for water-focused ICS cybersecurity education. Journal of Computing Sciences in Colleges 36 8 (2021) 33\u201342."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2017.8323960"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3638782.3638814"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Alessandro Liberati Douglas\u00a0G Altman Jennifer Tetzlaff Cynthia Mulrow Peter\u00a0C G\u00f8tzsche John\u00a0PA Ioannidis Mike Clarke Philip\u00a0J Devereaux Jos Kleijnen and David Moher. 2009. The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. Annals of internal medicine 151 4 (2009) W\u201365.","DOI":"10.7326\/0003-4819-151-4-200908180-00136"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Chenyang Liu Yazeed Alrowaili Neetesh Saxena and Charalambos Konstantinou. 2021. Cyber risks to critical smart grid assets of industrial control systems. Energies 14 17 (2021) 5501.","DOI":"10.3390\/en14175501"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0L Marino Chathurika\u00a0S Wickramasinghe Vivek\u00a0Kumar Singh Jake Gentle Craig Rieger and Milos Manic. 2021. The virtualized cyber-physical testbed for machine learning anomaly detection: A wind powered grid case study. IEEE Access 9 (2021) 159475\u2013159494.","DOI":"10.1109\/ACCESS.2021.3127169"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/EAEEIE50507.2021.9530927"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI58743.2023.10297207"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Mohammad Noorizadeh Mohammad Shakerpour Nader Meskin Devrim Unal and Khashayar Khorasani. 2021. A cyber-security methodology for a cyber-physical industrial control system testbed. IEEe Access 9 (2021) 16239\u201316253.","DOI":"10.1109\/ACCESS.2021.3053135"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Mourad Ouzzani Hossam Hammady Zbys Fedorowicz and Ahmed Elmagarmid. 2016. Rayyan\u2014a web and mobile app for systematic reviews. Systematic reviews 5 (2016) 1\u201310.","DOI":"10.1186\/s13643-016-0384-4"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Jos\u00e9 Pereira\u00a0dos Reis Fernando Brito\u00a0e Abreu Glauco de Figueiredo\u00a0Carneiro and Craig Anslow. 2022. Code smells detection and visualization: a systematic literature review. Archives of Computational Methods in Engineering 29 1 (2022) 47\u201394.","DOI":"10.1007\/s11831-021-09566-x"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Ondrej Pospisil Petr Blazek Karel Kuchar Radek Fujdiak and Jiri Misurec. 2021. Application perspective on cybersecurity testbed for industrial control systems. Sensors 21 23 (2021) 8119.","DOI":"10.3390\/s21238119"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Andres Robles-Durazno Naghmeh Moradpoor James McWhinnie Gordon Russell and Jorge Porcel-Bustamante. 2021. Implementation and evaluation of physical hybrid and virtual testbeds for cybersecurity analysis of industrial control systems. Symmetry 13 3 (2021) 519.","DOI":"10.3390\/sym13030519"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON62879.2024.10754707"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"HM Shamsuzzaman MD Mosleuzzaman A Mia and A Nandi. 2024. Cybersecurity Risk Mitigation in Industrial Control Systems Analyzing Physical Hybrid And Virtual Test Bed Applications. Academic Journal on Artificial Intelligence Machine Learning Data Science and Management Information Systems 1 01 (2024) 19\u201339.","DOI":"10.69593\/ajaimldsmis.v1i01.123"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Shachar Siboni Vinay Sachidananda Yair Meidan Michael Bohadana Yael Mathov Suhas Bhairav Asaf Shabtai and Yuval Elovici. 2018. Security testbed for Internet-of-Things devices. IEEE transactions on reliability 68 1 (2018) 23\u201344.","DOI":"10.1109\/TR.2018.2864536"},{"key":"e_1_3_3_1_35_2","unstructured":"Stu Steiner Matthew\u00a0J Kirkland and Daniel Conte\u00a0de Leon. 2021. Vwaterlabs: Developing hands-on laboratories for water-focused industrial control systems cybersecurity education. Journal of Computing Sciences in Colleges 36 10 (2021) 24\u201329."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.23919\/SPECTS52716.2021.9639278"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"crossref","unstructured":"Thavavel Vaiyapuri Zohra Sbai Haya Alaskar and Nourah\u00a0Ali Alaseem. 2021. Deep learning approaches for intrusion detection in IIoT networks\u2013opportunities and future directions. International Journal of Advanced Computer Science and Applications 12 4 (2021).","DOI":"10.14569\/IJACSA.2021.0120411"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2018.8483203"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN58197.2023.10223405"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556732"}],"event":{"name":"ACM SIGCITE 2025: 26th Annual ACM Conference on Cybersecurity and Information Technology Education","location":"Sacramento , California , USA","acronym":"ACM SIGCITE 2025","sponsor":["SIGCITE ACM Special Interest Group on Cybersecurity & Information Technology Education"]},"container-title":["Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769694.3771140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:05Z","timestamp":1769472005000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769694.3771140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":39,"alternative-id":["10.1145\/3769694.3771140","10.1145\/3769694"],"URL":"https:\/\/doi.org\/10.1145\/3769694.3771140","relation":{},"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"2025-12-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}