{"id":"https://openalex.org/W3196540569","doi":"https://doi.org/10.1109/csr51186.2021.9527972","title":"Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model","display_name":"Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3196540569","doi":"https://doi.org/10.1109/csr51186.2021.9527972","mag":"3196540569"},"language":"en","primary_location":{"id":"doi:10.1109/csr51186.2021.9527972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527972","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019833425","display_name":"Jason Diakoumakos","orcid":"https://orcid.org/0000-0003-1406-602X"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Jason Diakoumakos","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017980751","display_name":"Evangelos Chaskos","orcid":"https://orcid.org/0000-0001-6116-834X"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Evangelos Chaskos","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054122221","display_name":"Nicholas Kolokotronis","orcid":"https://orcid.org/0000-0003-0660-8431"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Nicholas Kolokotronis","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074951699","display_name":"George Lepouras","orcid":"https://orcid.org/0000-0001-6094-3308"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"George Lepouras","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019833425"],"corresponding_institution_ids":["https://openalex.org/I158716096"],"apc_list":null,"apc_paid":null,"fwci":3.8024,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.93136059,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"186","last_page":"191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10731","display_name":"Educational Games and Gamification","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3204","display_name":"Developmental and Educational Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10731","display_name":"Educational Games and Gamification","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3204","display_name":"Developmental and Educational Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11197","display_name":"Digital Games and Media","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11574","display_name":"Artificial Intelligence in Games","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trainer","display_name":"Trainer","score":0.8307801485061646},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.656429648399353},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6443684697151184},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6317040920257568},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.559688925743103},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.5111599564552307},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.41945451498031616},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09149909019470215}],"concepts":[{"id":"https://openalex.org/C2780463512","wikidata":"https://www.wikidata.org/wiki/Q15122700","display_name":"Trainer","level":2,"score":0.8307801485061646},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.656429648399353},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6443684697151184},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6317040920257568},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.559688925743103},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.5111599564552307},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.41945451498031616},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09149909019470215},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr51186.2021.9527972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527972","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1563571483","https://openalex.org/W1890907732","https://openalex.org/W2007581198","https://openalex.org/W2049998594","https://openalex.org/W2109037514","https://openalex.org/W2165883368","https://openalex.org/W2276472860","https://openalex.org/W2289534764","https://openalex.org/W2330567702","https://openalex.org/W2479485957","https://openalex.org/W2578036549","https://openalex.org/W2741982191","https://openalex.org/W2794949966","https://openalex.org/W2902685184","https://openalex.org/W2924827335","https://openalex.org/W2990220343","https://openalex.org/W2992836310","https://openalex.org/W3021201221","https://openalex.org/W3047884242","https://openalex.org/W3105786939","https://openalex.org/W4239751935","https://openalex.org/W6639559746","https://openalex.org/W6694811741","https://openalex.org/W6781034597"],"related_works":["https://openalex.org/W3110311961","https://openalex.org/W4396897946","https://openalex.org/W3040950835","https://openalex.org/W4210648132","https://openalex.org/W4386107585","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W4285815382","https://openalex.org/W4385452110","https://openalex.org/W4399917864"],"abstract_inverted_index":{"Professional":[0],"training":[1,53,98],"is":[2,23,101,130,133],"essential":[3],"for":[4,46],"organizations":[5],"to":[6,62,88,116,135,140],"successfully":[7],"defend":[8],"their":[9],"assets":[10],"against":[11],"cyber-attacks.":[12],"Successful":[13],"detection":[14],"and":[15,55,92,113,121],"prevention":[16],"of":[17,96,105,143,151,156],"security":[18,33,48],"incidents":[19],"demands":[20],"that":[21,59,132],"personnel":[22],"not":[24],"just":[25],"aware":[26],"about":[27],"the":[28,38,44,94,97,111,114,118,141],"potential":[29],"threats,":[30],"but":[31],"its":[32],"expertise":[34],"goes":[35],"far":[36],"beyond":[37],"necessary":[39],"background":[40],"knowledge.":[41],"To":[42],"fill-in":[43],"gap":[45],"competent":[47],"professionals,":[49],"platforms":[50],"offering":[51],"realistic":[52],"environments":[54],"scenarios":[56],"are":[57,60],"designed":[58,134],"referred":[61,77],"as":[63,78],"cyber-ranges.":[64],"Multiple":[65],"cyber-ranges":[66],"listed":[67],"under":[68],"a":[69,106,126,146,149,157],"common":[70],"platform":[71],"can":[72],"simulate":[73],"more":[74],"complex":[75],"environments,":[76],"cyber-range":[79],"federations.":[80],"Security":[81],"education":[82],"approaches":[83],"often":[84],"implement":[85],"gamification":[86,107],"mechanics":[87],"increase":[89],"trainees\u2019":[90],"engagement":[91],"maximize":[93],"outcome":[95],"process.":[99],"Scoring":[100],"an":[102],"integral":[103],"part":[104,155],"scheme,":[108],"allowing":[109],"both":[110],"trainee":[112],"trainer":[115],"monitor":[117],"former\u2019s":[119],"performance":[120],"progress.":[122],"In":[123],"this":[124],"article,":[125],"novel":[127],"scoring":[128],"model":[129],"presented":[131],"be":[136],"agnostic":[137],"with":[138],"respect":[139],"source":[142],"information:":[144],"either":[145],"CR":[147],"or":[148],"variety":[150],"different":[152],"CRs":[153],"being":[154],"federated":[158],"environment.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
