{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:10:04Z","timestamp":1743091804930,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":65,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662593509"},{"type":"electronic","value":"9783662593516"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-662-59351-6_13","type":"book-chapter","created":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T03:38:02Z","timestamp":1556336282000},"page":"173-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Virtual Classroom for Cybersecurity Education"],"prefix":"10.1007","author":[{"given":"Jens","family":"Haag","sequence":"first","affiliation":[]},{"given":"Harald","family":"Vranken","sequence":"additional","affiliation":[]},{"given":"Marko","family":"van Eekelen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,27]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Hu, J., Meinel, C., Schmitt, M.: Tele-lab IT security: An architecture for interactive lessons for security education. In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, pp. 412\u2013416. ACM, New York (2004)","DOI":"10.1145\/971300.971440"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/3-540-45108-0_60","volume-title":"Intelligent Tutoring Systems","author":"PL Albacete","year":"2000","unstructured":"Albacete, P.L., VanLehn, K.: The conceptual helper: an intelligent tutoring system for teaching fundamental physics concepts. In: Gauthier, G., Frasson, C., VanLehn, K. (eds.) ITS 2000. LNCS, vol. 1839, pp. 564\u2013573. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45108-0_60"},{"key":"13_CR3","unstructured":"Mahdi, A.O., Alhabbash, M.I., Naser, S.S.A.: An Intelligent Tutoring System for Teaching Advanced Topics in Information Security (2016)"},{"issue":"3","key":"13_CR4","first-page":"147","volume":"15","author":"K Vanlehn","year":"2005","unstructured":"Vanlehn, K., et al.: The andes physics tutoring system: lessons learned. Int. J. Artif. Intell. Educ. 15(3), 147\u2013204 (2005)","journal-title":"Int. J. Artif. Intell. Educ."},{"key":"13_CR5","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-0-387-35694-5_5","volume-title":"Security Education and Critical Infrastructures","author":"J Hu","year":"2003","unstructured":"Hu, J., Schmitt, M., Willems, C., Meinel, C.: A tutoring system for IT security. In: Irvine, C., Armstrong, H. (eds.) Security Education and Critical Infrastructures. ITIFIP, vol. 125, pp. 51\u201360. Springer, Boston, MA (2003). https:\/\/doi.org\/10.1007\/978-0-387-35694-5_5"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/B978-044481862-1.50103-5","volume":"5","author":"AT Corbett","year":"1997","unstructured":"Corbett, A.T., Koedinger, K.R., Anderson, J.R.: Intelligent tutoring systems. Handb. Hum. Comput. Interact. 5, 849\u2013874 (1997)","journal-title":"Handb. Hum. Comput. Interact."},{"key":"13_CR7","volume-title":"Intelligent Tutoring Systems: Lessons Learned","author":"J Psotka","year":"1988","unstructured":"Psotka, J., Massey, L.D., Mutter, S.A.: Intelligent Tutoring Systems: Lessons Learned. Psychology Press, Hillsdale (1988)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-540-24844-6_12","volume-title":"Artificial Intelligence and Soft Computing - ICAISC 2004","author":"E Melis","year":"2004","unstructured":"Melis, E., Siekmann, J.: ActiveMath: an intelligent tutoring system for mathematics. In: Rutkowski, L., Siekmann, J.H., Tadeusiewicz, R., Zadeh, L.A. (eds.) ICAISC 2004. LNCS (LNAI), vol. 3070, pp. 91\u2013101. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24844-6_12"},{"issue":"2","key":"13_CR9","first-page":"152","volume":"35","author":"W Canfield","year":"2001","unstructured":"Canfield, W.: ALEKS: a web-based intelligent tutoring system. Math. Comput. Educ. 35(2), 152 (2001)","journal-title":"Math. Comput. Educ."},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2003616.2003632","volume":"2","author":"F-J Yang","year":"2011","unstructured":"Yang, F.-J.: A virtual tutor for relational schema normalization. ACM Inroads 2(3), 38\u201342 (2011)","journal-title":"ACM Inroads"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Kenny, C., Pahl, C.: Automated tutoring for a database skills training environment, vol. 37. ACM (2005)","DOI":"10.1145\/1047124.1047377"},{"issue":"3, 4","key":"13_CR12","first-page":"375","volume":"14","author":"P Suraweera","year":"2004","unstructured":"Suraweera, P., Mitrovic, A.: An intelligent tutoring system for entity relationship modelling. Int. J. Artif. Intell. Educ. 14(3, 4), 375\u2013417 (2004)","journal-title":"Int. J. Artif. Intell. Educ."},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Queir\u00f3s, R.A.P., Leal, J.P.: PETCHA: a programming exercises teaching assistant. In: Proceedings of the 17th ACM Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE 2012, pp. 192\u2013197. ACM, New York (2012)","DOI":"10.1145\/2325296.2325344"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Sykes, E.R., Franek, F.: A prototype for an intelligent tutoring system for students learning to program in Java (TM). In: Proceedings of the IASTED International Conference on Computers and Advanced Technology in Education, pp. 78\u201383 (2003)","DOI":"10.2316\/Journal.208.2004.1.202-1454"},{"issue":"1","key":"13_CR15","doi-asserted-by":"publisher","first-page":"237","DOI":"10.2298\/CSIS111231001V","volume":"10","author":"B Vesin","year":"2013","unstructured":"Vesin, B., Ivanovi\u0107, M., Kla\u0161nja-Mili\u0107evi\u0107, A., Budimac, Z.: Ontology-based architecture with recommendation strategy in java tutoring system. Comput. Sci. Inf. Syst. 10(1), 237\u2013261 (2013)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Jeuring, J., van Binsbergen, L.T., Gerdes, A., Heeren, B.: Model solutions and properties for diagnosing student programs in ask-elle. In: Proceedings of the Computer Science Education Research Conference, CSERC 2014, pp. 31\u201340. ACM, New York (2014)","DOI":"10.1145\/2691352.2691355"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Pizzonia, M., Rimondini, M.: Netkit: easy emulation of complex networks on inexpensive hardware. In: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities, TridentCom 2008, pp. 7:1\u20137:10, ICST, Brussels, Belgium. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2008)","DOI":"10.4108\/tridentcom.2008.3155"},{"key":"13_CR18","unstructured":"Vranken, H., Koppelman, H.: A virtual computer security lab for distance education. In: Proceedings of the 5th IASTED European Conference on Internet and Multimedia Systems and Applications, EuroIMSA 2009, pp. 21\u201327. Acta Press (2009)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Colmerauer, A., Roussel, P.: The birth of prolog. In: The Second ACM SIGPLAN Conference on History of Programming Languages, HOPL-II, pp. 37\u201352. ACM, New York (1993)","DOI":"10.1145\/155360.155362"},{"key":"13_CR20","unstructured":"Rescorla, E., Modadugu, N.: Datagram transport layer security (2006). http:\/\/www.ietf.org\/rfc\/rfc4347.txt . Accessed 22 July 2014"},{"key":"13_CR21","unstructured":"Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012). http:\/\/www.ietf.org\/rfc\/rfc6347.txt . Accessed 22 July 2014"},{"key":"13_CR22","unstructured":"Dierks, T., Allen, C.: The TLS protocol version 1.0 (1999). http:\/\/www.ietf.org\/rfc\/rfc2246.txt . Accessed 22 July 2014"},{"key":"13_CR23","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.1 (2006). http:\/\/www.ietf.org\/rfc\/rfc4346.txt . Accessed 22 July 2014"},{"key":"13_CR24","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2 (2008). http:\/\/www.ietf.org\/rfc\/rfc5246.txt . Accessed 22 July 2014"},{"key":"13_CR25","unstructured":"Wielemaker, J.: Logic programming for knowledge-intensive interactive applications. PhD thesis, University of Amsterdam (2009)"},{"key":"13_CR26","unstructured":"Vranken, H., Haag, J., Horsmann, T., Karsch, S.: A distributed virtual computer security lab. In: Proceedings of the 3rd International Conference on Computer Supported Education, CSEDU 2011, pp. 110\u2013119. SciTePress (2011)"},{"key":"13_CR27","unstructured":"Haag, J., Horsmann, T., Karsch, S., Vranken, H.: A distributed virtual computer security lab with central authority. In: Proceedings of the Computer Science Education Research Conference, CSERC 2011, pp. 89\u201395. Open Universiteit, Heerlen (2011)"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Haag, J., Karsch, S., Vranken, H., Van Eekelen, M.: A virtual computer security lab as learning environment for networking and security courses. In: Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology, CSEIT 2012, pp. 61\u201368. Global Science & Technology Forum (2012)","DOI":"10.5176\/2251-2195_CSEIT12.29"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: Evaluation of students\u2019 learning behaviour and success in a practical computer networking course. In: Proceedings of the 2nd International Conference on E-Learning and E-Technologies in Education, ICEEE 2013, pages 201\u2013206. IEEE (2013)","DOI":"10.1109\/ICeLeTE.2013.6644374"},{"volume-title":"The Description Logic Handbook: Theory, Implementation, and Applications","year":"2003","key":"13_CR30","unstructured":"Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, New York (2003)"},{"key":"13_CR31","volume-title":"Computer Networks","author":"AS Tanenbaum","year":"1985","unstructured":"Tanenbaum, A.S.: Computer Networks. Prentice Hall PTR, Upper Saddle River (1985)"},{"key":"13_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/3-540-45848-4_59","volume-title":"Graph Drawing","author":"U Brandes","year":"2002","unstructured":"Brandes, U., Eiglsperger, M., Herman, I., Himsolt, M., Marshall, M.S.: GraphML progress report structural layer proposal. In: Mutzel, P., J\u00fcnger, M., Leipert, S. (eds.) GD 2001. LNCS, vol. 2265, pp. 501\u2013512. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45848-4_59"},{"key":"13_CR33","volume-title":"User Mode Linux","author":"J Dike","year":"2006","unstructured":"Dike, J.: User Mode Linux. Prentice Hall, Englewood Cliffs (2006)"},{"key":"13_CR34","unstructured":"Dike, J.: A user-mode port of the linux kernel. In: Proceedings of the 4th Annual Linux Showcase & Conference, ALS 2000, vol. 4, p. 7. USENIX Association, Berkeley (2000)"},{"issue":"2","key":"13_CR35","first-page":"83","volume":"4","author":"J Haag","year":"2014","unstructured":"Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: Evaluation of students\u2019 learning behaviour and success as a prerequisite for modernizing practical on-campus networking courses in higher education. Y\u00fcksek\u00f6\u011fretim Dergisi\/J. High. Educ. 4(2), 83\u201390 (2014a)","journal-title":"Y\u00fcksek\u00f6\u011fretim Dergisi\/J. High. Educ."},{"key":"13_CR36","unstructured":"Bishop, M., Heberlein, L.: An isolated network for research. In: Proceedings of the Nineteenth National Information Systems Security Conference, pp. 349\u2013360 (1996)"},{"issue":"3","key":"13_CR37","first-page":"281","volume":"16","author":"KK Agarwal","year":"2001","unstructured":"Agarwal, K.K., Critcher, A., Foley, D., Sanati, R., Sigle, J.: Setting up a classroom lab. J. Comput. Sci. Coll. 16(3), 281\u2013286 (2001)","journal-title":"J. Comput. Sci. Coll."},{"key":"13_CR38","unstructured":"Taylor, K.D., Honchell, J.W., DeWitt, W.E.: Distance learning in courses with a laboratory. In: Proceedings of the 26th Annual Frontiers in Education, FIE 1996, vol. 01, pp. 44\u201346. IEEE Computer Society, Washington (1996)"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Lo, D.C.-T., Qian, K., Chen, W., Shahriar, H., Clincy, V.: Authentic learning in network and security with portable labs. In: 2014 IEEE Frontiers in Education Conference (FIE), vol. 00, pp. 1\u20135 (2014)","DOI":"10.1109\/FIE.2014.7043995"},{"issue":"5","key":"13_CR40","first-page":"191","volume":"28","author":"AG Bardas","year":"2013","unstructured":"Bardas, A.G., Ou, X.: Setting up and using a cyber security lab for education purposes. J. Comput. Sci. Coll. 28(5), 191\u2013197 (2013)","journal-title":"J. Comput. Sci. Coll."},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Jakab, F., Janitor, J., Nagy, M.: Virtual lab in a distributed international environment - SVC EDINET. In: Fifth International Conference on Networking and Services, ICNS 2009, pp. 576\u2013580 (2009)","DOI":"10.1109\/ICNS.2009.66"},{"issue":"1","key":"13_CR42","first-page":"332","volume":"20","author":"TA Yang","year":"2004","unstructured":"Yang, T.A., et al.: Design of a distributed computer security lab. J. Comput. Sci. Coll. 20(1), 332\u2013346 (2004)","journal-title":"J. Comput. Sci. Coll."},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Yoo, S., Hovis, S.: Remote access internetworking laboratory. In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, pp. 311\u2013314. ACM, New York (2004)","DOI":"10.1145\/971300.971409"},{"key":"13_CR44","unstructured":"Drigas, A.S., Vrettaros, J., Koukianakis, L.G., Glentzes, J.G.: A virtual lab and e-learning system for renewable energy sources. In: Proceedings of the 1st WSEAS\/IASME Conference on Educational Technologies, EDUTE 2005, pp. 149\u2013153 (2005)"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Border, C.: The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes. In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, pp. 576\u2013580. ACM, New York (2007)","DOI":"10.1145\/1227310.1227501"},{"key":"13_CR46","unstructured":"Hu, J., Cordel, D., Meinel, C.: Virtual machine management for tele-lab \u201cIT-security\u201d server. In: Proceedings of the 10th IEEE Symposium on Computers and Communications, ISCC 2005, pp. 448\u2013453. IEEE Computer Society (2005)"},{"key":"13_CR47","unstructured":"Keller, J., Naues, R.: Design of a virtual computer security lab. In: Proceedings of the IASTED International Conference on Communication, Network, and Information Security, CNIS 2006, pp. 211\u2013215. Acta Press (2006)"},{"key":"13_CR48","unstructured":"Krishna, K., Sun, W., Rana, P., Li, T., Sekar, R.: V-NetLab: a cost-effective platform to support course projects in computer security. In: Proceedings of 9th Colloquium for Information Systems Security Education. The Printing House Inc. (2005)"},{"key":"13_CR49","doi-asserted-by":"crossref","unstructured":"Lahoud PhD (ABD), H.A., Tang PhD, X.: Information security labs in IDS\/IPS for distance education. In: Proceedings of the 7th Conference on Information Technology Education, SIGITE 2006, pp. 47\u201352. ACM, New York (2006)","DOI":"10.1145\/1168812.1168826"},{"key":"13_CR50","unstructured":"Brian Hay, K.L.N.: Evolution of the ASSERT computer security lab. In: Proceedings of the 10th Colloquium for Information Systems Security Education (2006)"},{"key":"13_CR51","doi-asserted-by":"crossref","unstructured":"Bullers Jr., W.I., Burd, S., Seazzu, A.F.: Virtual machines - an idea whose time has returned: application to network, security, and database courses. In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2006, pp. 102\u2013106. ACM, New York (2006)","DOI":"10.1145\/1121341.1121375"},{"key":"13_CR52","unstructured":"Damiani, E.: The open source virtual lab: a case study. In: Proceedings of the Workshop on Free and Open Source Learning Environments and Tools, FOSLET 2006 (2006)"},{"key":"13_CR53","doi-asserted-by":"crossref","unstructured":"O\u2019Leary, M.: A laboratory based capstone course in computer security for undergraduates. In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2006, pp. 2\u20136. ACM, New York (2006)","DOI":"10.1145\/1121341.1121346"},{"issue":"1","key":"13_CR54","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/1507561.1507562","volume":"6","author":"P Li","year":"2009","unstructured":"Li, P.: Exploring virtual environments in a decentralized lab. SIGITERes. IT 6(1), 4\u201310 (2009a)","journal-title":"SIGITERes. IT"},{"key":"13_CR55","doi-asserted-by":"crossref","unstructured":"Ellabidy, M., Russo, J.P.: Using the cloud to replace traditional physical networking laboratories. In: Proceedings of the 45th ACM Technical Symposium on Computer Science Education, SIGCSE 2014, p. 729. ACM, New York (2014)","DOI":"10.1145\/2538862.2544243"},{"key":"13_CR56","doi-asserted-by":"crossref","unstructured":"Mhd Wael Bazzaza, K.S.: Using the cloud to teach computer networks. In: Proceedings of the 2015 IEEE\/ACM 8th International Conference on Utility and Cloud Computing (UCC), UCC 2015, pp. 310\u2013314 (2015)","DOI":"10.1109\/UCC.2015.49"},{"key":"13_CR57","doi-asserted-by":"crossref","unstructured":"Salah, K.: Harnessing the cloud for teaching cybersecurity. In: Proceedings of the 45th ACM Technical Symposium on Computer Science Education, SIGCSE 2014, pp. 529\u2013534. ACM, New York (2014)","DOI":"10.1145\/2538862.2538880"},{"issue":"1","key":"13_CR58","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/774763.774772","volume":"33","author":"L Peterson","year":"2003","unstructured":"Peterson, L., Anderson, T., Culler, D., Roscoe, T.: A blueprint for introducing disruptive technology into the internet. SIGCOMM Comput. Commun. Rev. 33(1), 59\u201364 (2003)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"13_CR59","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.bjp.2013.12.037","volume":"61","author":"M Berman","year":"2014","unstructured":"Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R., Seskar, I.: GENI: a federated testbed for innovative network experiments. Comput. Netw. 61, 5\u201323 (2014)","journal-title":"Comput. Netw."},{"issue":"1","key":"13_CR60","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1145\/1507561.1507562","volume":"6","author":"P Li","year":"2009","unstructured":"Li, P.: Exploring virtual environments in a decentralized lab. SIGITERes. IT 6(1), 4\u201310 (2009b)","journal-title":"SIGITERes. IT"},{"issue":"2","key":"13_CR61","first-page":"263","volume":"26","author":"P Li","year":"2010","unstructured":"Li, P.: Centralized and decentralized lab approaches based on different virtualization models. J. Comput. Sci. Coll. 26(2), 263\u2013269 (2010)","journal-title":"J. Comput. Sci. Coll."},{"issue":"4","key":"13_CR62","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1473195.1473225","volume":"40","author":"P Seeling","year":"2008","unstructured":"Seeling, P.: Labs@home. SIGCSE Bull. 40(4), 75\u201377 (2008)","journal-title":"SIGCSE Bull."},{"key":"13_CR63","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-540-85110-3_36","volume-title":"Intelligent Computer Mathematics","author":"B Heeren","year":"2008","unstructured":"Heeren, B., Jeuring, J., van Leeuwen, A., Gerdes, A.: Specifying strategies for exercises. In: Autexier, S., Campbell, J., Rubio, J., Sorge, V., Suzuki, M., Wiedijk, F. (eds.) CICM 2008. LNCS (LNAI), vol. 5144, pp. 430\u2013445. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85110-3_36"},{"key":"13_CR64","doi-asserted-by":"crossref","unstructured":"Gerdes, A., Heeren, B., Jeuring, J.: Properties of exercise strategies. In: Proceedings International Workshop on Strategies in Rewriting, Proving, and Programming, IWS 2010, Edinburgh, UK, 9th July 2010, pp. 21\u201334 (2010)","DOI":"10.4204\/EPTCS.44.2"},{"key":"13_CR65","unstructured":"Haag, J.: DVCL: A Distributed Virtual Computer Lab for security and network education. Ph.D. thesis, Open Universiteit (2018)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Edutainment XV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-59351-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T23:58:37Z","timestamp":1663372717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-59351-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783662593509","9783662593516"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-59351-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"27 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}