1. R. Beuran C. Pham D. Tang K. Chinen Y. Tan and Y. Shinoda. 2017. CyTrONE: An Integrated Cybersecurity Training Framework. In ICISSP. 157--166. R. Beuran C. Pham D. Tang K. Chinen Y. Tan and Y. Shinoda. 2017. CyTrONE: An Integrated Cybersecurity Training Framework. In ICISSP. 157--166.
2. J. Burket P. Chapman T. Becker C. Ganas and D. Brumley. 2015. Automatic Problem Generation for Capture-the-Flag Competitions. 2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 15) (2015). J. Burket P. Chapman T. Becker C. Ganas and D. Brumley. 2015. Automatic Problem Generation for Capture-the-Flag Competitions. 2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 15) (2015).
3. CyRIS
4. 2008. Technical Guide to Information Security Testing and Assessment;Scarfone K.;NIST Special Publication,2008
5. Z. Schreuders T. Shaw G. Ravichandran J. Keighley M. Ordean etal 2017. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events. In USENIX. USENIX Association. Z. Schreuders T. Shaw G. Ravichandran J. Keighley M. Ordean et al. 2017. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events. In USENIX. USENIX Association.