{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:25:18Z","timestamp":1750501518306,"version":"3.37.3"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"ERDF","doi-asserted-by":"publisher","award":["CZ.02.1.01\/0.0\/0.0\/16_019\/0000822"],"award-info":[{"award-number":["CZ.02.1.01\/0.0\/0.0\/16_019\/0000822"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/eurospw55150.2022.00047","type":"proceedings-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:22:52Z","timestamp":1656364972000},"page":"394-402","source":"Crossref","is-referenced-by-count":6,"title":["Applying Process Discovery to Cybersecurity Training: An Experience Report"],"prefix":"10.1109","author":[{"given":"Martin","family":"Macak","sequence":"first","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czech Republic"}]},{"given":"Radek","family":"Oslejsek","sequence":"additional","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czech Republic"}]},{"given":"Barbora","family":"Buhnova","sequence":"additional","affiliation":[{"name":"Masaryk University,Faculty of Informatics,Brno,Czech Republic"}]}],"member":"263","reference":[{"key":"ref39","first-page":"376","article-title":"Process mining in primary care: A literature review","volume":"247","author":"williams","year":"2018","journal-title":"Studies in Health Technology and Informatics"},{"key":"ref38","article-title":"Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-flag Exercise","author":"werther","year":"2011","journal-title":"Proceedings of the 4th Conference on Cyber Security Experimentation and Test CSET'11"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3159450.3159561"},{"key":"ref32","article-title":"Ten Years of iCTF: The Good, The Bad, and The Ugly","author":"vigna","year":"2014","journal-title":"2014 USENIX Summit Gaming Games Gamification Secur Educ 3GSE 14"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/978-3-662-49851-4"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.3390\/s20247148"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/MSP.2017.54"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/2839509.2844646"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3328778.3366893"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.5220\/0006428203100321"},{"key":"ref10","article-title":"The Fun and Future of CTF","author":"davis","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1016\/j.cose.2019.101636"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.eswa.2019.05.003"},{"key":"ref12","article-title":"Data-driven insight into the puzzle-based cybersecurity training","volume":"102","author":"bursk\u00e1","year":"2022","journal-title":"Computers & Graphics"},{"key":"ref13","first-page":"40","article-title":"Disco: Discover your processes","volume":"940","author":"g\u00fcnther","year":"2012","journal-title":"BPM (Demos)"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.3390\/app10165702"},{"year":"2010","author":"keim","journal-title":"Mastering the Information Age Solving Problems with Visual Analytics","key":"ref15"},{"key":"ref16","first-page":"43","article-title":"Visual analytics in process mining: Classification of process mining techniques","author":"kriglstein","year":"2016","journal-title":"EuroVA EuroVis"},{"key":"ref17","first-page":"100120","article-title":"Process mining usage in cybersecurity and software reliability analysis: A systematic literature review","author":"macak","year":"2021","journal-title":"Arrays"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-030-95405-5_28"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s10639-021-10564-6"},{"key":"ref28","first-page":"194","article-title":"Enhancing Cybersecurity Skills by Creating Serious Games","author":"\u0161v\u00e1bensk\u00fd","year":"2018","journal-title":"Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TVCG.2017.2743990"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TVCG.2014.2346481"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s11409-013-9107-6"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1002\/widm.1230"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ISDA.2009.159"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.cose.2018.06.001"},{"key":"ref8","first-page":"53","article-title":"Towards custom-designed professional training contents and curriculums through educational process mining","author":"cairns","year":"0","journal-title":"The Fourth International Conference on Advances in Information Mining and Management"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2567574.2567604"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICTKE.2012.6408562"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.3390\/app11041809"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s11036-019-01442-0"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.28945\/181"},{"key":"ref22","first-page":"18","article-title":"Learning analytics on coursera event data: a process mining approach","author":"mukala","year":"0","journal-title":"5th International Symposium on Data-Driven Process Discovery and Analysis SIMPDA 2015"},{"year":"2010","author":"mirkovic","journal-title":"The Deter Project","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3011077.3011087"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1145\/3478431.3499414","article-title":"Evaluating two approaches to assessing student progress in cybersecurity exercises","author":"\u0161v\u00e1bensk\u00fd","year":"2022","journal-title":"Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22) (To appear)"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1111\/cgf.13728"},{"year":"0","author":"rossey","journal-title":"SimSpace cyber range ACSAC 2015 Panel Cyber Experimentation of the Future (CEF) Catalyzing a New Generation of Experimental Cybersecurity Research","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1002\/9781118998205.ch1"}],"event":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","start":{"date-parts":[[2022,6,6]]},"location":"Genoa, Italy","end":{"date-parts":[[2022,6,10]]}},"container-title":["2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/9799286\/9799291\/09799415.pdf?arnumber=9799415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:18:09Z","timestamp":1658780289000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9799415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":41,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/eurospw55150.2022.00047","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}