{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:32:50Z","timestamp":1773840770439,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10876911","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer"],"prefix":"10.1109","author":[{"given":"Osama S","family":"AlJamal","sequence":"first","affiliation":[{"name":"Al Hussein Technical University,Department of Computer Science,Amman,Jordan"}]},{"given":"Mahmoud","family":"AlJamal","sequence":"additional","affiliation":[{"name":"Irbid National University,Faculty of Science and Information Technology,Department of Cybersecurity,Irbid,Jordan,21110"}]},{"given":"Ayoub","family":"Alsarhan","sequence":"additional","affiliation":[{"name":"The Hashemite University,Department of Information Technology,Zarqa,Jordan"}]},{"given":"Mohammad","family":"Aljaidi","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Saif","family":"Okour","sequence":"additional","affiliation":[{"name":"Irbid National University,Department of Software Engineering,Irbid,Jordan"}]},{"given":"Issa","family":"Al-Aiash","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Ahmad","family":"Al-Qerem","sequence":"additional","affiliation":[{"name":"Al Hussein Technical University,Department of Computer Science,Amman,Jordan"}]},{"given":"Essam Al","family":"Daoud","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Ali","family":"Elrashidi","sequence":"additional","affiliation":[{"name":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/math7070587"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110568"},{"issue":"1","key":"ref3","first-page":"1","article-title":"Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments","volume":"190","author":"Imran Mallick","year":"2024","journal-title":"World Scientific News"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/computers13100251"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361308"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhydene.2024.09.029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2020.06.03"},{"key":"ref8","author":"Thakur","year":"2015","journal-title":"Open source firewall implementation: replacing traditional firewall with open source"},{"key":"ref9","author":"Saeed","year":"2023","journal-title":"Security and network approach in smart environments\u2013role of sd-wan technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s23156716"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12194049"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIS.2013.053216"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11213521"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/UKIWCWS.2009.5749427"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EICEEAI56378.2022.10050485"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/fi14080223"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT58056.2023.10226130"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2024.101019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCNA63144.2024.10703911"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EICEEAI56378.2022.10050494"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/computers13010025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/iot5030022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3625343.3625348"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s24051515"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33743-7_49"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19781-w"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC60084.2023.10349993"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT56998.2023.10307357"},{"issue":"24","key":"ref29","first-page":"160","article-title":"Packet tracer simulation as effective pedagogy in computer networking course","volume":"14","author":"Rashid","year":"2019","journal-title":"International Journal of Emerging Technologies in Learning (iJET)"},{"issue":"10","key":"ref30","first-page":"63","article-title":"Design and simulation of local area network using cisco packet tracer","volume":"6","author":"Tarkaa","year":"2017","journal-title":"The International Journal of Engineering and Science"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT57646.2023.10134506"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/technologies12100181"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","location":"Zarqa, Jordan","start":{"date-parts":[[2024,12,10]]},"end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10876911.pdf?arnumber=10876911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T05:44:23Z","timestamp":1744868663000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10876911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10876911","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}