{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:08:44Z","timestamp":1748750924666,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257679"},{"type":"electronic","value":"9783319257686"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25768-6_6","type":"book-chapter","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T08:09:51Z","timestamp":1446019791000},"page":"84-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Exercise Assistant for Practical Networking and IT Security Courses in Higher Education"],"prefix":"10.1007","author":[{"given":"Jens","family":"Haag","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Karsch","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Vranken","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Van Eekelen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"6_CR1","volume-title":"The Description Logic Handbook: Theory, Implementation, and Applications","author":"F Baader","year":"2003","unstructured":"Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, New York (2003)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/3-540-45848-4_59","volume-title":"Graph Drawing","author":"U Brandes","year":"2002","unstructured":"Brandes, U., Eiglsperger, M., Herman, I., Himsolt, M., Marshall, M.S.: GraphML progress report. In: Mutzel, P., J\u00fcnger, M., Leipert, S. (eds.) GD 2001. LNCS, vol. 2265, pp. 501\u2013512. Springer, Heidelberg (2002)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Colmerauer, A., Roussel, P.: The birth of prolog. In: Proceedings of HOPL-II The Second ACM SIGPLAN Conference on History of Programming Languages, pp. 37\u201352. ACM, New York (1993)","DOI":"10.1145\/155360.155362"},{"key":"6_CR4","volume-title":"User Mode Linux","author":"J Dike","year":"2006","unstructured":"Dike, J.: User Mode Linux. Prentice Hall, Upper Saddle River (2006)"},{"key":"6_CR5","unstructured":"Haag, J., Horsmann, T., Karsch, S., Vranken, H.: A distributed virtual computer security lab with central authority. In: Proceedings of the CSERC 2011 Computer Science Education Research Conference, Heerlen, The Netherlands, 7\u20138 April 2011, pp. 89\u201395. Open Universiteit, Heerlen, The Netherlands (2011)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Haag, J., Karsch, S., Vranken, H., Van Eekelen, M.: A virtual computer security lab as learning environment for networking and security courses. In: Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology. CSEIT 2012, Singapore, 19\u201320 November 2012. Global Science and Technology Forum (2012)","DOI":"10.5176\/2251-2195_CSEIT12.29"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: Evaluation of students\u2019 learning behaviour and success in a practical computer networking course. In: Proceedings of the Second ICEEE 2013 International Conference on E-learning and E-technologies in Education. Lodz, Poland, 23\u201325 September 2013","DOI":"10.1109\/ICeLeTE.2013.6644374"},{"key":"6_CR8","unstructured":"Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: An exercise assistant for practical networking courses. In: Proceedings of the 6th International Conference on Computer Supported Education. CSEDU 2014, pp. 97\u2013104. Barcelona, Spain (2014)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Pizzonia, M., Rimondini, M.: Netkit: easy emulation of complex networks on inexpensive hardware. In: Proceedings of the ICST International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, pp. 1\u201310 (2008)","DOI":"10.4108\/tridentcom.2008.3155"},{"key":"6_CR10","volume-title":"Virtual Machines: Versatile Platforms for Systems and Processes","author":"J Smith","year":"2005","unstructured":"Smith, J., Nair, R.: Virtual Machines: Versatile Platforms for Systems and Processes. Morgan Kaufmann, Amsterdam (2005)"},{"key":"6_CR11","volume-title":"Computer Networks","author":"AS Tanenbaum","year":"1985","unstructured":"Tanenbaum, A.S.: Computer Networks. Prentice Hall PTR, Upper Saddle River (1985)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Vranken, H., Haag, J., Horsmann, T., Karsch, S.: A distributed virtual computer security lab. In: Proceedings of the CSEDU 2011 3rd International Conference on Computer Supported Education, Vol. 1, Noordwijkerhout, 6\u20138 May 2011, pp. 110\u2013119. SciTePress, The Netherlands (2011)","DOI":"10.5220\/0003343801100119"},{"key":"6_CR13","unstructured":"Vranken, H., Koppelman, H.: A virtual computer security lab for distance education. In: Proceedings of the EuroIMSA 2009 5th IASTED European Conference on Internet and Multimedia Systems and Applications, Cambridge, UK, 13\u201315 July 2009, pp. 21\u201327. Acta Press, Calgary (2009)"},{"key":"6_CR14","unstructured":"Wielemaker, J.: Logic programming for knowledge-intensive interactive applications. Ph.D. Thesis, University of Amsterdam, The Netherlands (2009)"}],"container-title":["Communications in Computer and Information Science","Computer Supported Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25768-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:44:38Z","timestamp":1748670278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25768-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257679","9783319257686"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25768-6_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"18 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}