{"id":"https://openalex.org/W3174606250","doi":"https://doi.org/10.1109/tlt.2021.3091904","title":"Cyber Range for Research-Inspired Learning of \u201cAttack Defense by Pretense\u201d Principle and Practice","display_name":"Cyber Range for Research-Inspired Learning of \u201cAttack Defense by Pretense\u201d Principle and Practice","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3174606250","doi":"https://doi.org/10.1109/tlt.2021.3091904","mag":"3174606250"},"language":"en","primary_location":{"id":"doi:10.1109/tlt.2021.3091904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tlt.2021.3091904","pdf_url":null,"source":{"id":"https://openalex.org/S130363450","display_name":"IEEE Transactions on Learning Technologies","issn_l":"1939-1382","issn":["1939-1382","2372-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Learning Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046785087","display_name":"Komal Bhupendra Vekaria","orcid":null},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Komal Bhupendra Vekaria","raw_affiliation_strings":["Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072008189","display_name":"Prasad Calyam","orcid":"https://orcid.org/0000-0002-7666-5389"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prasad Calyam","raw_affiliation_strings":["Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA"],"raw_orcid":"https://orcid.org/0000-0002-7666-5389","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103008272","display_name":"Songjie Wang","orcid":"https://orcid.org/0000-0002-6967-579X"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Songjie Wang","raw_affiliation_strings":["Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011982631","display_name":"Ramya Payyavula","orcid":null},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramya Payyavula","raw_affiliation_strings":["Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075671115","display_name":"Matthew Rockey","orcid":null},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Rockey","raw_affiliation_strings":["Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010528654","display_name":"Nafis Ahmed","orcid":"https://orcid.org/0000-0002-5465-5729"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nafis Ahmed","raw_affiliation_strings":["Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, and Computer Science, University of Missouri, Columbia, MO, USA","institution_ids":["https://openalex.org/I76835614"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5046785087"],"corresponding_institution_ids":["https://openalex.org/I76835614"],"apc_list":null,"apc_paid":null,"fwci":4.2712,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.94592988,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"14","issue":"3","first_page":"322","last_page":"337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.779147744178772},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6500006914138794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.58942049741745},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.5852372646331787},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.4617052674293518},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.44026219844818115},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4389019310474396},{"id":"https://openalex.org/keywords/software-portability","display_name":"Software portability","score":0.4135414659976959}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.779147744178772},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6500006914138794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.58942049741745},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.5852372646331787},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4617052674293518},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.44026219844818115},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4389019310474396},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.4135414659976959},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tlt.2021.3091904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tlt.2021.3091904","pdf_url":null,"source":{"id":"https://openalex.org/S130363450","display_name":"IEEE Transactions on Learning Technologies","issn_l":"1939-1382","issn":["1939-1382","2372-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Learning Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G8116775031","display_name":null,"funder_award_id":"H98230-20-1-0297","funder_id":"https://openalex.org/F4320311089","funder_display_name":"National Security Agency"}],"funders":[{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W64843173","https://openalex.org/W1568336093","https://openalex.org/W1590223485","https://openalex.org/W1978351213","https://openalex.org/W2026529069","https://openalex.org/W2053142757","https://openalex.org/W2062418772","https://openalex.org/W2093477505","https://openalex.org/W2296335794","https://openalex.org/W2302944952","https://openalex.org/W2515710585","https://openalex.org/W2561957589","https://openalex.org/W2569377769","https://openalex.org/W2616645708","https://openalex.org/W2757307166","https://openalex.org/W2766579349","https://openalex.org/W2783431117","https://openalex.org/W2883102310","https://openalex.org/W2883685929","https://openalex.org/W2900734365","https://openalex.org/W2951226853","https://openalex.org/W2969951939","https://openalex.org/W2976423724","https://openalex.org/W3146115948","https://openalex.org/W6602649227","https://openalex.org/W6634050436","https://openalex.org/W6635438373","https://openalex.org/W6697144307","https://openalex.org/W6731806414","https://openalex.org/W6766775690"],"related_works":["https://openalex.org/W107105315","https://openalex.org/W1584537303","https://openalex.org/W4388155270","https://openalex.org/W4367156293","https://openalex.org/W2750549761","https://openalex.org/W1978658790","https://openalex.org/W2785227142","https://openalex.org/W572531444","https://openalex.org/W2945962340","https://openalex.org/W4241787744"],"abstract_inverted_index":{"There":[0,56],"is":[1,57],"an":[2,91],"increasing":[3],"trend":[4],"in":[5,28,39,54,119,136,163,194],"cloud":[6],"adoption":[7],"of":[8,31,52,70,86,139,219,227,239],"enterprise":[9],"applications":[10,19],"in,":[11],"for":[12],"example,":[13],"manufacturing,":[14],"healthcare,":[15],"and":[16,84,100,117,131,147,212,237,248],"finance.":[17],"Such":[18],"are":[20,68],"routinely":[21],"subject":[22],"to":[23,36,48,61,94,104,124,160,174,189,196],"targeted":[24,74],"cyberattacks,":[25],"which":[26],"result":[27],"significant":[29],"loss":[30],"sensitive":[32],"data":[33,37],"(e.g.,":[34,46,167],"due":[35,47],"exfiltration":[38,51],"advanced":[40],"persistent":[41],"threats)":[42],"or":[43],"valuable":[44],"utilities":[45],"resource":[49],"the":[50,81,87,106,137,186,191,204,217,225],"power":[53],"cryptojacking).":[55],"a":[58],"critical":[59],"need":[60],"train":[62],"highly":[63],"skilled":[64],"cybersecurity":[65,108],"professionals,":[66],"who":[67],"capable":[69],"defending":[71],"against":[72],"such":[73],"attacks.":[75],"In":[76],"this":[77],"article,":[78],"we":[79,215],"present":[80],"design,":[82],"development,":[83],"evaluation":[85,226,246],"Mizzou":[88,110,221],"Cyber":[89,111,222],"Range,":[90],"online":[92],"platform":[93],"learn":[95],"basic/advanced":[96],"cyber":[97],"defense":[98,178],"concepts":[99],"perform":[101],"training":[102],"exercises":[103,146],"engender":[105],"next-generation":[107],"workforce.":[109],"Range":[112,223],"features":[113],"flexibility,":[114],"scalability,":[115],"portability,":[116],"extendability":[118],"delivering":[120],"cyberattack/defense":[121],"learning":[122,141,156,187,229],"modules":[123,142,157,188],"students.":[125],"We":[126],"detail":[127],"our":[128,220],"\u201cresearch-inspired":[129],"learning\u201d":[130],"\u201clearn-apply-create\u201d":[132],"three-phase":[133],"pedagogy":[134],"methodologies":[135],"development":[138],"four":[140],"that":[143,202],"include":[144],"laboratory":[145],"self-study":[148],"activities":[149],"using":[150,164,230],"realistic":[151],"cloud-based":[152],"application":[153],"testbeds.":[154],"The":[155],"allow":[158],"students":[159],"gain":[161],"skills":[162],"latest":[165],"technologies":[166],"elastic":[168],"capacity":[169],"provisioning,":[170],"software-defined":[171],"everything":[172],"infrastructure)":[173],"implement":[175],"sophisticated":[176],"\u201cattack":[177],"by":[179],"pretense\u201d":[180],"techniques.":[181],"Students":[182],"can":[183],"also":[184],"use":[185],"understand":[190],"attacker-defender":[192],"game":[193],"order":[195],"create":[197],"disincentives":[198],"(i.e.,":[199],"pretense":[200],"initiation)":[201],"make":[203],"attacker's":[205],"tasks":[206],"more":[207],"difficult,":[208],"costly,":[209],"time":[210],"consuming,":[211],"uncertain.":[213],"Lastly,":[214],"show":[216],"benefits":[218],"through":[224],"student":[228],"auto-grading,":[231],"rank":[232],"assessments":[233],"with":[234],"peer":[235],"standing,":[236],"monitoring":[238],"students'":[240],"performance":[241],"via":[242],"feedback":[243],"from":[244],"prelab":[245],"surveys":[247],"postlab":[249],"technical":[250],"assessments.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
