pith. sign in
Pith Number

pith:BM24ZGHE

pith:2026:BM24ZGHEYETSP3J3RG3XJBZAA3
not attested not anchored not stored refs resolved

LITE-SOC: Lightweight Security Operations Center Simulator for Cybersecurity Education

Cherry Mangla, Martin Higgins, Shawn Thompson

A lightweight web-based simulator lets students practice SOC alert triage, prioritization, and communication in regular classrooms.

arxiv:2605.17703 v1 · 2026-05-17 · cs.CR · cs.HC

Add to your LaTeX paper
\usepackage{pith}
\pithnumber{BM24ZGHEYETSP3J3RG3XJBZAA3}

Prints a linked badge after your title and injects PDF metadata. Compiles on arXiv. Learn more

Record completeness

1 Bitcoin timestamp
2 Internet Archive
3 Author claim open · sign in to claim
4 Citations open
5 Replications open
Portable graph bundle live · download bundle · merged state
The bundle contains the canonical record plus signed events. A mirror can host it anywhere and recompute the same current state with the deterministic merge algorithm.

Claims

C1strongest claim

LITE-SOC was developed to provide a simpler alternative to full operational SOC environments for giving students a practical introduction to SOC workflows such as triage, prioritization, and decision-making.

C2weakest assumption

The assumption that synthetic event streams and the platform's visualization, annotation, and chat features are sufficiently realistic to develop transferable triage and communication skills in students.

C3one line summary

LITE-SOC is a lightweight web-based platform that simulates Security Operations Center alert streams and provides separate student and instructor interfaces for guided classroom exercises on triage and decision-making.

References

13 extracted · 13 resolved · 0 Pith anchors

[1] Secu- rity by Design Issues in Autonomous Vehicles, 2025 · doi:10.1109/mitp.2024.3527268
[2] Spatial-Temporal Anomaly Detection for Sensor Attacks in Autonomous Vehicles, 2023
[3] Security Operations Center: A Systematic Study and Open Challenges, 2020 · doi:10.1109/access.2020.3045514
[4] Cyber Ranges and Testbeds for Education, Training, and Research, 2020 · doi:10.1109/msec.2020.2978510
[5] Gamification in Cybersecurity Education: A State of the Art Review and Research Agenda, 2024 · doi:10.1108/jarhe-02-202

Formal links

2 machine-checked theorem links

Receipt and verification
First computed 2026-05-20T00:04:53.615686Z
Builder pith-number-builder-2026-05-17-v1
Signature Pith Ed25519 (pith-v1-2026-05) · public key
Schema pith-number/v1.0

Canonical hash

0b35cc98e4c12727ed3b89b774872006e2b9c728296b22a23ecc7aab4d93a7db

Aliases

arxiv: 2605.17703 · arxiv_version: 2605.17703v1 · doi: 10.48550/arxiv.2605.17703 · pith_short_12: BM24ZGHEYETS · pith_short_16: BM24ZGHEYETSP3J3 · pith_short_8: BM24ZGHE
Agent API
Verify this Pith Number yourself
curl -sH 'Accept: application/ld+json' https://pith.science/pith/BM24ZGHEYETSP3J3RG3XJBZAA3 \
  | jq -c '.canonical_record' \
  | python3 -c "import sys,json,hashlib; b=json.dumps(json.loads(sys.stdin.read()), sort_keys=True, separators=(',',':'), ensure_ascii=False).encode(); print(hashlib.sha256(b).hexdigest())"
# expect: 0b35cc98e4c12727ed3b89b774872006e2b9c728296b22a23ecc7aab4d93a7db
Canonical record JSON
{
  "metadata": {
    "abstract_canon_sha256": "eaecdee7682ebfac35dfdf01be12827f871e778fe504afb91ea71890aac07133",
    "cross_cats_sorted": [
      "cs.HC"
    ],
    "license": "http://creativecommons.org/licenses/by/4.0/",
    "primary_cat": "cs.CR",
    "submitted_at": "2026-05-17T23:57:30Z",
    "title_canon_sha256": "b3caa70c0d9ae2adf0c35ee6dd324ace45176053196b37bab4de63b543028cb0"
  },
  "schema_version": "1.0",
  "source": {
    "id": "2605.17703",
    "kind": "arxiv",
    "version": 1
  }
}