1. Adams, W.J., Gavas, E., Lacey, T., Leblanc, S.P.: Collective views of the NSA/CSS cyber defense exercise on curricula and learning objectives. In: Proceedings of the 2nd Conference on Cyber Security Experimentation and Test, CSET 2009, p. 2. USENIX Association, Berkeley (2009)
2. Cowan, C., Arnold, S., Beattie, S., Wright, C., Viega, J.: Defcon capture the flag: defending vulnerable code from intense attack. In: DARPA Information Survivability Conference and Exposition, vol. 1, p. 120 (2003)
3. Doupé, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., Cavedon, L., Vigna, G.: Hit ’em where it hurts: a live security exercise on cyber situational awareness. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 51–61. ACM, New York (2011)
4. Ernits, M., Tammekänd, J., Maennel, O.: I-tee: a fully automated cyber defense competition for students. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, pp. 113–114. ACM, New York (2015)
5. Fulton, S., Schweitzer, D., Dressler, J.: What are we teaching in cyber competitions? In: Frontiers in Education Conference (FIE 2012), pp. 1–5 (2012)