{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:50:25Z","timestamp":1742925025330,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030166205"},{"type":"electronic","value":"9783030166212"}],"license":[{"start":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T00:00:00Z","timestamp":1553817600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-16621-2_57","type":"book-chapter","created":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T12:04:49Z","timestamp":1553774689000},"page":"610-624","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Implementation of Active Learning in the Master\u2019s Program on Cybersecurity"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4055-1494","authenticated-orcid":false,"given":"Volodymyr","family":"Buriachok","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9349-7946","authenticated-orcid":false,"given":"Volodymyr","family":"Sokolov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,29]]},"reference":[{"key":"57_CR1","unstructured":"Lozhkin, B.: The strategy for sustainable development \u201cUkraine 2020\u201d (2015). \n                    http:\/\/zakon1.rada.gov.ua\/laws\/show\/5\/2015\n                    \n                  . Accessed 6 Nov 2018. [Publication in Ukrainian]"},{"issue":"4","key":"57_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.5815\/ijitcs.2017.04.06","volume":"9","author":"B Rawat","year":"2017","unstructured":"Rawat, B., Dwivedi, S.K.: An architecture for recommendation of courses in e-learning system. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 9(4), 39\u201347 (2017). \n                    https:\/\/doi.org\/10.5815\/ijitcs.2017.04.06","journal-title":"Int. J. Inf. Technol. Comput. Sci. (IJITCS)"},{"issue":"4","key":"57_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijitcs.2018.04.01","volume":"10","author":"OW Adejo","year":"2018","unstructured":"Adejo, O.W., Ewuzie, I., Usoro, A., Connolly, T.: E-learning to m-learning: framework for data protection and security in cloud infrastructure. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 10(4), 1\u20139 (2018). \n                    https:\/\/doi.org\/10.5815\/ijitcs.2018.04.01","journal-title":"Int. J. Inf. Technol. Comput. Sci. (IJITCS)"},{"issue":"10","key":"57_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.5815\/ijcnis.2017.10.03","volume":"9","author":"S Sharma","year":"2017","unstructured":"Sharma, S., Mahajan, S.: Design and implementation of a security scheme for detecting system vulnerabilities. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(10), 24\u201332 (2017). \n                    https:\/\/doi.org\/10.5815\/ijcnis.2017.10.03","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"issue":"3","key":"57_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5815\/ijcnis.2015.03.02","volume":"7","author":"A Lazzez","year":"2015","unstructured":"Lazzez, A., Slimani, T.: Forensics investigation of web application security attacks. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 7(3), 10\u201317 (2015). \n                    https:\/\/doi.org\/10.5815\/ijcnis.2015.03.02","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"issue":"9","key":"57_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijitcs.2018.09.01","volume":"10","author":"KE Ehimwenma","year":"2018","unstructured":"Ehimwenma, K.E., Crowther, P., Beer, M.: Formalizing logic based rules for skills classification and recommendation of learning materials. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 10(9), 1\u201312 (2018). \n                    https:\/\/doi.org\/10.5815\/ijitcs.2018.09.01","journal-title":"Int. J. Inf. Technol. Comput. Sci. (IJITCS)"},{"issue":"10","key":"57_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5815\/ijmecs.2018.10.04","volume":"10","author":"F Almeida","year":"2018","unstructured":"Almeida, F.: Framework for software code reviews and inspections in a classroom environment. Int. J. Modern Educ. Comput. Sci. (IJMECS) 10(10), 31\u201339 (2018). \n                    https:\/\/doi.org\/10.5815\/ijmecs.2018.10.04","journal-title":"Int. J. Modern Educ. Comput. Sci. (IJMECS)"},{"issue":"6","key":"57_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5815\/ijeme.2018.06.02","volume":"8","author":"R Kaviyarasi","year":"2018","unstructured":"Kaviyarasi, R., Balasubramanian, T.: Exploring the high potential factors that affects students\u2019 academic performance. Int. J. Educ. Manag. Eng. (IJEME) 8(6), 15\u201323 (2018). \n                    https:\/\/doi.org\/10.5815\/ijeme.2018.06.02","journal-title":"Int. J. Educ. Manag. Eng. (IJEME)"},{"issue":"8","key":"57_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5815\/ijmecs.2017.08.04","volume":"9","author":"M Kumar","year":"2017","unstructured":"Kumar, M., Singh, A.J.: Evaluation of data mining techniques for predicting student\u2019s performance. Int. J. Modern Educ. Comput. Sci. (IJMECS) 9(8), 25\u201331 (2017). \n                    https:\/\/doi.org\/10.5815\/ijmecs.2017.08.04","journal-title":"Int. J. Modern Educ. Comput. Sci. (IJMECS)"},{"issue":"12","key":"57_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijmecs.2018.12.01","volume":"10","author":"A Khan","year":"2018","unstructured":"Khan, A., Madden, J.: Active learning: a new assessment model that boost confidence and learning while reducing test anxiety. Int. J. Modern Educ. Comput. Sci. (IJMECS) 10(12), 1\u20139 (2018). \n                    https:\/\/doi.org\/10.5815\/ijmecs.2018.12.01","journal-title":"Int. J. Modern Educ. Comput. Sci. (IJMECS)"},{"key":"57_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/S1369-7021(03)01225-2","volume":"12","author":"YJ Dori","year":"2003","unstructured":"Dori, Y.J., Belcher, J., Bessette, M., Danziger, M., McKinney, A., Hult, E.: Technology for active learning. Mater. Today 12, 44\u201349 (2003). \n                    https:\/\/doi.org\/10.1016\/S1369-7021(03)01225-2","journal-title":"Mater. Today"},{"key":"57_CR12","doi-asserted-by":"publisher","unstructured":"National Research Council: National Science Education Standards, pp 69\u201391. The National Academies Press, Washington (1996). \n                    https:\/\/doi.org\/10.17226\/4962","DOI":"10.17226\/4962"},{"key":"57_CR13","doi-asserted-by":"publisher","unstructured":"Crawley, E.F., Malmqvist, J., \u00d6stlund, S., Brodeur, D.R., Edstr\u00f6m, K.: The CDIO approach. In: Rethinking Engineering Education, pp. 11\u201345. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-05561-9_2","DOI":"10.1007\/978-3-319-05561-9_2"},{"key":"57_CR14","unstructured":"Carlsson, A.: Educating the next generation experts in cyber security: The new EU-recognized master\u2019s program (2016). \n                    http:\/\/engensec.eu\/about-the-project\/\n                    \n                  . Accessed 6 Nov 2018"},{"key":"57_CR15","unstructured":"Ministry of Education and Science of Ukraine, Scientific specialized publications (2018). \n                    https:\/\/mon.gov.ua\/ua\/nauka\/nauka\/atestaciya-kadriv-vishoyi-kvalifikaciyi\/naukovi-fahovi-vidannya\n                    \n                  . Accessed 6 Nov 2018. [Publication in Ukrainian]"},{"key":"57_CR16","unstructured":"Buryachok, V.L., Bessalov, A.V., Tolyupa, S.V., Abramov, V.O.: Security of Information and Communication Systems. Educational and Professional Program of the Second (Master) Level of Higher Education, pp. 2\u201312. KUBG Publication, Kyiv (2018). [Publication in Ukrainian]"},{"key":"57_CR17","unstructured":"Semko, V.V., Bessalov, A.V., Melnyk, I.Y., Yermoshyn, V.V.: Security of Information and Communication Systems. Educational and Professional Program of the First (Bachelor) Level of Higher Education, pp. 2\u201314. KUBG Publication, Kyiv (2018). [Publication in Ukrainian]"},{"key":"57_CR18","unstructured":"Yudin, O.K., Oksiyuk, O.H., Babenko, T.V., Buryachok, V.L., Voronov, V.R., Kachynskyy, A.B., Kurnyetsov, O.O., Maksymovych, V.M., Chechelnatskyy, V.Y.: Standard of Higher Education in Specialty 125 \u201cCybersecurity\u201d for the First (Bachelor) Level of Higher Education, pp. 2\u201318. Ministry of Education and Science Publication, Kyiv (2018). [Publication in Ukrainian]"},{"key":"57_CR19","doi-asserted-by":"publisher","unstructured":"Sokolov, V., TajDini, M., Buryachok, V.: Wireless and Mobile Security: Laboratory Workshop, pp. 6\u2013124. SUT Publication, Kyiv (2017). \n                    https:\/\/doi.org\/10.5281\/zenodo.2528820","DOI":"10.5281\/zenodo.2528820"},{"key":"57_CR20","doi-asserted-by":"publisher","unstructured":"Sokolov, V.Y., TajDini, M., Raiter, O.P.: Wireless and Mobile Security: Laboratory Workshop, pp. 6\u2013122. SUT Publication, Kyiv (2018). \n                    https:\/\/doi.org\/10.5281\/zenodo.2528822\n                    \n                  . [Publication in Ukrainian]","DOI":"10.5281\/zenodo.2528822"},{"key":"57_CR21","doi-asserted-by":"publisher","first-page":"31","DOI":"10.28925\/2663-4023.2018.2.3146","volume":"2","author":"VY Sokolov","year":"2018","unstructured":"Sokolov, V.Y.: Comparison of possible approaches for the development of low-budget spectrum analyzers for sensory networks in the range of 2.4\u20132.5 GHz. Cybersecur.: Educ. Sci. Technol. 2, 31\u201346 (2018). \n                    https:\/\/doi.org\/10.28925\/2663-4023.2018.2.3146\n                    \n                  . [Publication in Ukrainian]","journal-title":"Cybersecur.: Educ. Sci. Technol."},{"key":"57_CR22","doi-asserted-by":"publisher","first-page":"14","DOI":"10.31435\/rsglobal_wos\/12062018\/5734","volume":"24","author":"VL Buryachok","year":"2018","unstructured":"Buryachok, V.L., Sokolov, V.Y.: Using 2.4\u00a0GHz wireless botnets to implement denial-of-service attacks. Web Sch. 24, 14\u201321 (2018). \n                    https:\/\/doi.org\/10.31435\/rsglobal_wos\/12062018\/5734","journal-title":"Web Sch."},{"key":"57_CR23","first-page":"41","volume-title":"2nd International Scientific-Technical Conference on Actual Problems of Science and Technology (APST)","author":"V Buryachok","year":"2015","unstructured":"Buryachok, V., Sokolov, V.: Miniaturization of wireless monitoring systems 2.4\u20132.5\u00a0GHz band. In: Shevchenko, V.L., Nakonechnyy, V.S. (eds.) 2nd International Scientific-Technical Conference on Actual Problems of Science and Technology (APST), pp. 41\u201343. SUT, Kyiv (2015)"},{"key":"57_CR24","doi-asserted-by":"publisher","first-page":"6","DOI":"10.28925\/2663-4023.2018.1.616","volume":"1","author":"DM Kurbanmuradov","year":"2018","unstructured":"Kurbanmuradov, D.M., Sokolov, V.Y.: Methodology of counteraction to social engineering at objects of information activity. Cybersecur.: Educ. Sci. Technol. 1, 6\u201325 (2018). \n                    https:\/\/doi.org\/10.28925\/2663-4023.2018.1.616\n                    \n                  . [Publication in Ukrainian]","journal-title":"Cybersecur.: Educ. Sci. Technol."},{"key":"57_CR25","doi-asserted-by":"publisher","unstructured":"TajDini, M., Sokolov, V.Y.: Internet of things security problems. Mod. Inf. Prot. 1, 120\u2013127 (2017). \n                    https:\/\/doi.org\/10.5281\/zenodo.2528814","DOI":"10.5281\/zenodo.2528814"},{"key":"57_CR26","doi-asserted-by":"publisher","first-page":"82","DOI":"10.5281\/zenodo.2528810","volume":"1","author":"M TajDini","year":"2018","unstructured":"TajDini, M., Sokolov, V.Y.: Penetration tests for Bluetooth low energy and Zigbee using the software-defined radio. Mod. Inf. Prot. 1, 82\u201389 (2018). \n                    https:\/\/doi.org\/10.5281\/zenodo.2528810","journal-title":"Mod. Inf. Prot."},{"key":"57_CR27","doi-asserted-by":"publisher","unstructured":"Bogachuk, I., Sokolov, V., Buriachok, V.: Monitoring subsystem for wireless systems based on miniature spectrum analyzers. In: Ageyev, D.V., Lemeshko, O.V. (eds.) 5th International Scientific and Practical Conference Problems of Infocommunications, Science and Technology (PICST), pp. 581\u2013585. IEEE, Kharkiv (2018). \n                    https:\/\/doi.org\/10.1109\/infocommst.2018.8632151","DOI":"10.1109\/infocommst.2018.8632151"},{"key":"57_CR28","doi-asserted-by":"publisher","unstructured":"Gustavsson, R., Truksans, L., Carlsson, A., Balodis, M.: Remote security labs in the cloud. In: R\u00fc\u00fctmann, T., Auer, M.E. (eds.) Engineering Education towards Excellence and Innovation (EDUCON), pp. 1\u20138. IEEE, Tallin (2015). \n                    https:\/\/doi.org\/10.1109\/educon.2015.7095971","DOI":"10.1109\/educon.2015.7095971"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computer Science for Engineering and Education II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16621-2_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:03:23Z","timestamp":1558152203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16621-2_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,29]]},"ISBN":["9783030166205","9783030166212"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16621-2_57","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,29]]},"assertion":[{"value":"29 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSEEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Science, Engineering and Education Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kiev","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccseea2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.uacnconf.org\/iccseea2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}