{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:48:11Z","timestamp":1725493691792},"publisher-location":"New York, NY","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387732688"},{"type":"electronic","value":"9780387732695"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-73269-5_10","type":"book-chapter","created":{"date-parts":[[2007,10,26]],"date-time":"2007-10-26T15:49:04Z","timestamp":1193413744000},"page":"73-80","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Experiences from Educating Practitioners in Vulnerability Analysis"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Lindskog","sequence":"first","affiliation":[]},{"given":"Hans","family":"Hedbom","sequence":"additional","affiliation":[]},{"given":"Leonardo A.","family":"Martucci","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,10,26]]},"reference":[{"key":"10_CR1","unstructured":"Bastille Linux. The Bastille hardening program: Increased security for your OS. \nhttp:\/\/www.bastille-linux.org\/\n\n, Accessed January 23, 2007."},{"key":"10_CR2","unstructured":"Common Criteria Implementation Board. Common criteria for information technology security evaluation, version 3.1. \nhttp:\/\/www.commoncriteriaportal.org\/\n\n, September 2006."},{"key":"10_CR3","unstructured":"Ethereal, Inc. Ethereal: A network protocol analyzer. \nhttp:\/\/www.ethereal.com\n\n, Accessed January 23, 2007."},{"key":"10_CR4","unstructured":"Insecure.org. Network mapper. \nhttp:\/\/insecure.org\/nmap\/\n\n, Accessed January 23, 2007."},{"key":"10_CR5","unstructured":"S. Lindskog, U. Lindqvist, and E. Jonsson. IT security research and education in synergy. In Proceedings of the 1st World Conference in Information Security Education (WISE\u20191), pages 147\u2013162, Stockholm, Sweden, June 17\u201319, 1999."},{"key":"10_CR6","unstructured":"L. A. Martucci, H. Hedbom, S. Lindskog, and S. Fischer-H\u00fcbner. Educating system testers in vulnerability analysis: Laboratory development and deployment. In Proceedings of the Seventh Workshop on Education in Computer Security (WECS\u20197), pages 51\u201365, Monterey, CA, USA, January 4\u20136, 2006."},{"key":"10_CR7","unstructured":"Mixter. Gut beh\u00fctet. C\u2019T\u2013Magazin f\u00fcr Computer Technik, pages 202\u2013207, June 17\u201319, 2002."},{"key":"10_CR8","unstructured":"National Institute of Standards and Technology (NIST). NIST statistical test suite. \nhttp:\/\/csrc.nist.gov\/rng\/rng2.html\n\n, Accessed January 23, 2007."},{"key":"10_CR9","unstructured":"Nessus Project. Nessus vulnerability scanner. \nhttp:\/\/www.nessus.org\/\n\n, Accessed January 23, 2007."},{"key":"10_CR10","unstructured":"Oxid.it. Cain & Abel. \nhttp:\/\/www.oxid.it\/\n\n, Accessed January 23, 2007."},{"key":"10_CR11","unstructured":"Openwall Project. John the ripper password cracker. \nhttp:\/\/www.openwall.com\/john\/\n\n, Accessed January 23, 2007."},{"key":"10_CR12","unstructured":"University of Oulo. PROTOS security testing of protocol implementations. \nhttp:\/\/www.ee.oulu.fi\/research\/ouspg\/protos\/index.html\n\n, Accessed January 23, 2007."}],"container-title":["IFIP Advances in Information and Communication Technology","Fifth World Conference on Information Security Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73269-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,21]],"date-time":"2020-03-21T03:02:35Z","timestamp":1584759755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73269-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387732688","9780387732695"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73269-5_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2007]]},"assertion":[{"value":"26 October 2007","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}