{"id":"https://openalex.org/W7128780668","doi":"https://doi.org/10.1145/3770761.3777176","title":"A Classroom-Based Study of CyberGuardian: An Educational Game for Learning Cryptographic Primitives","display_name":"A Classroom-Based Study of CyberGuardian: An Educational Game for Learning Cryptographic Primitives","publication_year":2026,"publication_date":"2026-02-13","ids":{"openalex":"https://openalex.org/W7128780668","doi":"https://doi.org/10.1145/3770761.3777176"},"language":null,"primary_location":{"id":"doi:10.1145/3770761.3777176","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777176","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3770761.3777176","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038287143","display_name":"Shan Huang","orcid":"https://orcid.org/0000-0002-5358-720X"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shan Huang","raw_affiliation_strings":["University of Illinois Urbana-Champaign, Champaign, Illinois, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois Urbana-Champaign, Champaign, Illinois, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038676484","display_name":"Geoffrey Herman","orcid":"https://orcid.org/0000-0002-9501-2295"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Geoffrey L. Herman","raw_affiliation_strings":["University of Illinois at Urbana-Champaign, Urbana, Illinois, USA"],"affiliations":[{"raw_affiliation_string":"University of Illinois at Urbana-Champaign, Urbana, Illinois, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083555581","display_name":"Alan T. Sherman","orcid":"https://orcid.org/0000-0003-1130-4678"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alan Sherman","raw_affiliation_strings":["University of Maryland, Baltimore County, Baltimore, Maryland, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, Baltimore County, Baltimore, Maryland, USA","institution_ids":["https://openalex.org/I79272384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038287143"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31112127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1367","last_page":"1368"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.39239999651908875,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.39239999651908875,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.07150000333786011,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.05310000106692314,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7454000115394592},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.7120000123977661},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7102000117301941},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5728999972343445},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5389999747276306},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4260999858379364}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7667999863624573},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7454000115394592},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.7120000123977661},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7102000117301941},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5728999972343445},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5716999769210815},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5389999747276306},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4260999858379364},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3926999866962433},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35260000824928284},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3359000086784363},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.326200008392334},{"id":"https://openalex.org/C3018769082","wikidata":"https://www.wikidata.org/wiki/Q1506693","display_name":"Serious game","level":2,"score":0.2892000079154968},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.28529998660087585}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3770761.3777176","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777176","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3770761.3777176","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777176","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2570539810","https://openalex.org/W2884358995","https://openalex.org/W2901477756","https://openalex.org/W3105319862","https://openalex.org/W4299627282","https://openalex.org/W4302417921","https://openalex.org/W4400268410"],"related_works":[],"abstract_inverted_index":{"To":[0],"make":[1],"cybersecurity":[2,34],"concepts":[3],"more":[4],"accessible":[5],"to":[6,20,38,45,68,88,114],"non-technical":[7],"students,":[8],"we":[9],"present":[10],"our":[11],"classroom-based":[12],"study":[13],"of":[14,32],"CyberGuardian,":[15],"an":[16,95],"educational":[17],"game":[18,78],"designed":[19],"teach":[21],"cryptographic":[22,54,104,112],"primitives":[23,105,113],"through":[24,52],"simplified,":[25],"real-world":[26],"scenarios.":[27],"Players":[28],"assume":[29],"the":[30],"role":[31],"a":[33,75],"advisor,":[35],"providing":[36],"guidance":[37],"simulated":[39],"clients":[40],"and":[41,50,60,72,82,109],"analyzing":[42],"authentic":[43],"messages":[44],"assure":[46],"confidentiality,":[47],"data":[48],"integrity,":[49],"authentication":[51],"three":[53],"primitives:":[55],"symmetric":[56],"encryption,":[57,59],"asymmetric":[58],"digital":[61],"signature.":[62],"CyberGuardian":[63],"is":[64],"freely":[65],"available,":[66],"easy":[67],"deploy":[69],"at":[70],"scale,":[71],"implemented":[73],"as":[74],"single-player":[76],"offline":[77],"compatible":[79],"with":[80,99],"macOS":[81],"Windows.":[83],"Our":[84],"learning":[85],"objectives":[86],"are":[87],"enable":[89],"students":[90],"to:":[91],"(1)":[92],"Identify":[93],"how":[94,103],"adversary":[96],"can":[97,106],"interfere":[98],"communications;":[100],"(2)":[101],"Explain":[102],"mitigate":[107],"dangers;":[108],"(3)":[110],"Apply":[111],"reduce":[115],"vulnerabilities.":[116]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-14T00:00:00"}
