{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:59:05Z","timestamp":1768993145116,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/educon.2012.6201149","type":"proceedings-article","created":{"date-parts":[[2012,5,25]],"date-time":"2012-05-25T14:58:15Z","timestamp":1337957895000},"page":"1-10","source":"Crossref","is-referenced-by-count":28,"title":["Online assessment for hands-on cyber security training in a virtual lab"],"prefix":"10.1109","author":[{"given":"Christian","family":"Willems","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"martin","year":"2011","journal-title":"NoVNC Project Website"},{"key":"22","year":"2011","journal-title":"Metasploit Penetration Testing Software"},{"key":"17","year":"2011","journal-title":"Libvirt-The Virtualization API Homepage"},{"key":"23","year":"2011","journal-title":"BackTrack Linux-Penetration Testing Distribution"},{"key":"18","author":"davoli","year":"2011","journal-title":"Virtual Distributed Ethernet Homepage"},{"key":"24","year":"1999","journal-title":"Common Vulnerabilities and Exposures Website"},{"key":"15","author":"bellard","year":"2011","journal-title":"QEMU-Open Source Processor Emulater Homepage"},{"key":"16","year":"2011","journal-title":"Kernel-based Virtual Machine (KVM) Homepage"},{"key":"13","article-title":"Practical network security teaching in an online virtual laboratory","author":"willems","year":"2011","journal-title":"Proc 2011 Intl Conference on Security & Management (SAM 2011)"},{"key":"14","year":"2007","journal-title":"Networking and Systems Security Laboratory Website"},{"key":"11","first-page":"31","article-title":"Tele-Lab IT Security: An architecture for an online virtual IT security lab","volume":"4","author":"willems","year":"2008","journal-title":"Int'l J Online Eng (iJOE)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402506"},{"key":"21","author":"lyon","year":"2011","journal-title":"Nmap Security Scanner Website"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2007.80"},{"key":"20","year":"2003","journal-title":"The Hacker Choice"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121375"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1227310.1227501"},{"key":"10","article-title":"Implementing the emulab-planetlab portal: Experience and lessons learned","author":"webb","year":"2004","journal-title":"Workshop on Real Large Distributed Systems"},{"key":"7","article-title":"A collaborative virtual computer security lab","author":"keller","year":"2006","journal-title":"Proc 2nd IEEE International Conference on E-Sciece and Grid Computing (E-Science '06)"},{"key":"6","author":"hu","year":"2006","journal-title":"A Virtual Machine Architecture for Creating IT-Security Laboratories"},{"key":"5","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.cose.2004.02.005","article-title":"Tele-Lab IT-Security on CD: Portable, reliable and safe IT security training","volume":"23","author":"hu","year":"2004","journal-title":"Computers & Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35694-5_5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2010.5529213"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1168812.1168826"}],"event":{"name":"2012 IEEE Global Engineering Education Conference (EDUCON)","location":"Marrakech, Morocco","start":{"date-parts":[[2012,4,17]]},"end":{"date-parts":[[2012,4,20]]}},"container-title":["Proceedings of the 2012 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6196361\/6201007\/06201149.pdf?arnumber=6201149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:17:35Z","timestamp":1497971855000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6201149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/educon.2012.6201149","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}