{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T19:10:13Z","timestamp":1759000213191,"version":"3.44.0"},"reference-count":0,"publisher":"Centro Latino Americano de Estudios en Informatica","issue":"5","license":[{"start":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T00:00:00Z","timestamp":1757721600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CLEIej"],"abstract":"<jats:p>Cyber ranges are specialized computer systems designed to simulate realistic cybersecurity scenarios for training purposes. An in-depth evaluation process is essential for determining whether users have met their training objectives. This article examines the implementation of Tectonic, an academic cyber range, along with a thorough assessment methodology for both offensive and defensive scenarios. This approach employs process mining to analyze training activities from various perspectives. The methodology has been applied to training sessions conducted within Tectonic.<\/jats:p>","DOI":"10.19153\/cleiej.28.5.2","type":"journal-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T18:50:10Z","timestamp":1758999010000},"source":"Crossref","is-referenced-by-count":0,"title":["Assessment of Red and Blue Team Training in the Cyber Range Tectonic using Process Mining"],"prefix":"10.19153","volume":"28","author":[{"given":"Guillermo","family":"Guerrero","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Betarte","sequence":"additional","affiliation":[]},{"given":"Juan Diego","family":"Campo","sequence":"additional","affiliation":[]}],"member":"8231","published-online":{"date-parts":[[2025,9,13]]},"container-title":["CLEI Electronic Journal"],"original-title":[],"link":[{"URL":"https:\/\/clei.org\/cleiej\/index.php\/cleiej\/article\/download\/798\/545","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/clei.org\/cleiej\/index.php\/cleiej\/article\/download\/798\/545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T18:50:10Z","timestamp":1758999010000},"score":1,"resource":{"primary":{"URL":"https:\/\/clei.org\/cleiej\/index.php\/cleiej\/article\/view\/798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,13]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,9,27]]}},"URL":"https:\/\/doi.org\/10.19153\/cleiej.28.5.2","relation":{},"ISSN":["0717-5000"],"issn-type":[{"value":"0717-5000","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,13]]}}}