Ferguson, B., Tall, A., and Olsen, D. (2014). National cyber
range overview. In 2014 IEEE Military Communica-
tions Conference, pages 123–128.
Jirsík, T., Husák, M.,
ˇ
Celeda, P., and Eichler, Z. (2014).
Cloud-based security research testbed: A DDoS use
case. In 2014 IEEE Network Operations and Man-
agement Symposium (NOMS).
KYPO (Last accessed on May 16, 2017). https://kypo.cz/.
Lee Rossey (2015). SimSpace Cyber Range. ACSAC 2015
Panel: Cyber Experimentation of the Future (CEF):
Catalyzing a New Generation of Experimental Cyber-
security Research.
Linux Foundation (Last accessed on Mar 22, 2017). Open
vSwitch. http://openvswitch.org/.
MCR (Last accessed on Mar 22, 2017). The Michigan Cy-
ber Range. https://www.merit.edu/cyberrange/.
Medková, J., Husák, M., Vizváry, M., and
ˇ
Celeda, P.
(2017). Honeypot Testbed for Network Defence Strat-
egy Evaluation. In Proceedings of the 2017 IFIP/IEEE
International Symposium on Integrated Network Man-
agement, pages 887–888. IEEE Computer Society.
Mirkovic, J., Benzel, T. V., Faber, T., Braden, R., Wro-
clawski, J. T., and Schwab, S. (2010). The DETER
Project. In 2010 IEEE International Conference on
Technologies for Homeland Security (HST ’10).
NATO CCDCOE (Last accessed on May 16, 2017).
Locked Shields. http://ccdcoe.org/event/cyber-
defence-exercises.html.
NCR (Last accessed on Mar 22, 2017). The Na-
tional Cyber Range. http://www.acq.osd.mil/dte-
trmc/docs/Docs/NCR/2015_NCR
Špa
ˇ
cek, S.,
ˇ
Celeda, P., Drašar, M., and Vizváry, M. (2017).
Analyzing an Off-the-Shelf Surveillance Software:
Hacking Team Case Study. Security and Protection
of Information, (IX).
Raj, A. S., Alangot, B., Prabhu, S., and Achuthan, K.
(2016). Scalable and Lightweight CTF Infrastruc-
tures Using Application Containers. In 2016 USENIX
Workshop on Advances in Security Education (ASE
16), Austin, TX. USENIX Association.
Schwab, S., Wilson, B., Ko, C., and Hussain, A. (2007).
SEER: A security experimentation environment for
DETER. In Proceedings of the DETER Commu-
nity Workshop on Cyber Security Experimentation and
Test on DETER Community Workshop on Cyber Secu-
rity Experimentation and Test 2007. USENIX Associ-
ation.
Security Competence (Last accessed on Mar 22,
2017). Hacking-Lab. http://www.hacking-lab-
ctf.com/technical.html.
Siaterlis, C., Garcia, A. P., and Genge, B. (2013). On the
Use of Emulab Testbeds for Scientifically Rigorous
Experiments. IEEE Communications Surveys Tutori-
als, 15(2):929–942.
Tovar
ˇ
nák, D. and Pitner, T. (2014). Continuous queries
over distributed streams of heterogeneous monitor-
ing data in cloud datacenters. In 2014 9th Interna-
tional Conference on Software Engineering and Ap-
plications (ICSOFT-EA), pages 470–481.
Vigna, G., Borgolte, K., Corbetta, J., Doupe, A., Fratanto-
nio, Y., Invernizzi, L., Kirat, D., and Shoshitaishvili,
Y. (2014). Ten Years of iCTF: The Good, The Bad,
and The Ugly. In 2014 USENIX Summit on Gam-
ing, Games, and Gamification in Security Education
(3GSE 14).
Vykopal, J. and Barták, M. (2016). On the Design of Secu-
rity Games: From Frustrating to Engaging Learning.
In 2016 USENIX Workshop on Advances in Security
Education (ASE 16), Austin, TX. USENIX Associa-
tion.
Vykopal, J. and Cegan, J. (2017). Finding Exercise Equi-
librium: How to Support the Game Balance at the
Very Beginning? In Proceedings of the 2017 ACM
SIGCSE Technical Symposium on Computer Science
Education, SIGCSE ’17, pages 719–719, New York,
NY, USA. ACM.
Welch, D., Ragsdale, D., and Schepens, W. (2002). Training
for information assurance. Computer, 35(4):30–37.
White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S.,
Newbold, M., Hibler, M., Barb, C., and Joglekar, A.
(2002). An Integrated Experimental Environment for
Distributed Systems and Networks. pages 255–270,
Boston, MA.
Wroclawski, J., Mirkovic, J., Faber, T., and Schwab, S.
(2008). A two-constraint approach to risky cybersecu-
rity experiment management. In Sarnoff Symposium.
Invited paper.
KYPO Cyber Range: Design and Use Cases
321