{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:31:12Z","timestamp":1725471072259},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457770"},{"type":"electronic","value":"9783540462347"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11876663_41","type":"book-chapter","created":{"date-parts":[[2006,9,28]],"date-time":"2006-09-28T15:09:18Z","timestamp":1159456158000},"page":"488-493","source":"Crossref","is-referenced-by-count":2,"title":["New Media for Teaching Applied Cryptography and Network Security"],"prefix":"10.1007","author":[{"given":"Ji","family":"Hu","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Cordel","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"41_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/4434.895087","volume":"8","author":"M. Bishop","year":"2000","unstructured":"Bishop, M.: Education in information security. IEEE Concurrency\u00a08(4), 4\u20138 (2000)","journal-title":"IEEE Concurrency"},{"key":"41_CR2","unstructured":"Dike, J.: User-mode Linux. In: Proceedings of the 5th Annual Linux Showcase & Conference, Oakland, California, USA (2001)"},{"key":"41_CR3","unstructured":"Esslinger, B.: Cryptool - spielerischer einstieg in klassische und moderne kryptographie: Neue version - fundierte awareness in deutsch und englisch. Datenschutz und Datensicherheit\u00a026(10) (2002)"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Goldberg, R.P.: Survey of virtual machine research. IEEE Computer, 34\u201345 (1974)","DOI":"10.1109\/MC.1974.6323581"},{"issue":"4","key":"41_CR5","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.cose.2004.02.005","volume":"23","author":"J. Hu","year":"2004","unstructured":"Hu, J., Meinel, C.: Tele-Lab IT-Security on CD: Portable, reliable and safe IT Security training. Computers & Security\u00a023(4), 282\u2013289 (2004)","journal-title":"Computers & Security"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Hu, J.: Tele-Lab IT Security: An Architecture for Interactive Lessons for Security Education. In: Proceedings of ACM SIGCSE Norfolk, Virginia, USA (2004)","DOI":"10.1145\/971300.971440"},{"key":"41_CR7","unstructured":"Hu, J., Cordel, D., Meinel, C.: Virtual machine management for Tele-Lab IT-Security server. In: Proceedings of IEEE ISCC 2005, pp. 448\u2013453 (2005)"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Irvine, C.E., Thompson, M.F.: Expressing an information security policy within a security simulation game. In: Proceedings of the Sixth Workshop on Education in Computer Security (WECS6), Monterey, USA, pp. 43\u201349 (2004)","DOI":"10.21236\/ADA435316"},{"issue":"3","key":"41_CR9","first-page":"53","volume":"2","author":"D. Ragsdale","year":"2003","unstructured":"Ragsdale, D., Lathrop, S., Dodge, R.: Enhancing information warfare education through the use of virtual and isolated networks. Journal of Information Warfare\u00a02(3), 53\u201365 (2003)","journal-title":"Journal of Information Warfare"},{"issue":"1","key":"41_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/4236.656066","volume":"2","author":"T. Richardson","year":"1998","unstructured":"Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual network computing. IEEE Internet Computing\u00a02(1), 33\u201338 (1998)","journal-title":"IEEE Internet Computing"},{"key":"41_CR11","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/S0360-1315(98)00049-9","volume":"31","author":"N.C. Rowe","year":"1998","unstructured":"Rowe, N.C., Schiavo, S.: An intelligent tutor for intrusion detection on computer systems. Computers and Education\u00a031, 395\u2013404 (1998)","journal-title":"Computers and Education"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Schillings, V., Meinel, C.: Tele-TASK - tele-teaching anywhere solution kit. In: Proceedings of ACM SIGUCCS 2002, Providence, USA (2002)","DOI":"10.1145\/588646.588673"},{"key":"41_CR13","unstructured":"Spillman, R.: CAP: A software tool for teaching classical cryptology. In: Proceedings of the 6th National Colloquium on Information System Security Education, Redmond, Washington, USA (2002)"},{"issue":"3","key":"41_CR14","first-page":"8","volume":"2","author":"G. Vigna","year":"2003","unstructured":"Vigna, G.: Teaching hands-on network security: Testbeds and live exercises. Journal of Information Warfare\u00a02(3), 8\u201324 (2003)","journal-title":"Journal of Information Warfare"}],"container-title":["Lecture Notes in Computer Science","Innovative Approaches for Learning and Knowledge Sharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11876663_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:49:25Z","timestamp":1605642565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11876663_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457770","9783540462347"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11876663_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}