, The cLEMCy architecture, 2017.

W. J. Adams, E. Gavas, T. Lacey, and S. Leblanc, Collective views of the NSA/CSS cyber defense exercise on curricula and learning objectives, Proceedings of the Second Workshop on Cyber Security Experimentation and Test. USENIX Association, 2009.

R. Anderson, Why information security is hard-an economic perspective, Proceedings of the 17th Annual Computer Security Applications Conference, 2001.

,

R. Anderson and T. Moore, Information security economics -and beyond, Advances in Cryptology -Proceedings of Crypto, vol.4622, pp.68-91, 2007.

A. Conklin, The use of a collegiate cyber defense competition in information security education, Proceedings of the Second Annual Conference on Information Security Curriculum Development, pp.16-18, 2005.

C. Cowan, S. Arnold, S. Beattie, C. Wright, and J. Viega, Defcon capture the flag: Defending vulnerable code from intense attack, Proceedings of the 2003 DARPA Information Survivability Conference and Exposition, 2003.

L. J. Hoffman, T. Rosenberg, R. Dodge, and D. Ragsdale, Exploring a national cybersecurity exercise for universities, IEEE Security & Privacy, vol.3, issue.5, pp.27-33, 2005.

B. Leban, M. Bendre, and P. Tabriz, Web application exploits and defenses, 2017.

R. R. Linde, Operating system penetration, Proceedings of the AFIPS '75 National Computer Conference, pp.361-268, 1975.

B. E. Mullins, T. H. Lacey, R. F. Mills, J. M. Trechter, and S. D. Bass, How the cyber defense exercise shaped an information-assurance curriculum, IEEE Security& Privacy, vol.5, issue.5, pp.40-49, 2007.

P. Pusey, M. Gondree, and Z. Peterson, The outcomes of cybersecurity competitions and implications for underrepresented populations, IEEE Security & Privacy, vol.14, issue.6, pp.90-95, 2016.

P. Pusey, C. W. Obrien, and L. Lightner, Preparing for the collegiate cyber defense competition (CCDC): A guide for new teams and recommendations for experienced players, National Cyberwatch Center, 2015.

G. Vigna, Teaching network security through live exercises, Proceedings of the IFlP TC11/WGll.8 Third Annual World Conference on Information Security Education. IFIP Advances in Information and Communication Technology, vol.125, pp.3-18, 2003.

G. Vigna, K. Borgolte, J. Corbetta, A. Doupe, Y. Fratantonio et al., Ten years of iCTF: The good, the bad, and the ugly, Proceedings of the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education. USENIX Association, 2014.

J. Werther, M. Zhivich, T. Leek, and N. Zeldovich, Experiences in cyber security education: The MIT lincoln laboratory capture-the-flag exercise, Proceedings of the Fourth Workshop on Cyber Security Experimentation and Test. USENIX Association, 2011.