{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:45:11Z","timestamp":1749015911841},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/educon.2013.6530097","type":"proceedings-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T14:54:46Z","timestamp":1372172086000},"page":"130-137","source":"Crossref","is-referenced-by-count":6,"title":["Teaching ethical hacking in information security curriculum: A case study"],"prefix":"10.1109","author":[{"given":"Z.","family":"Trabelsi","sequence":"first","affiliation":[]},{"given":"W.","family":"Ibrahim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"CommView Packet Analyzer","year":"0","key":"19"},{"year":"0","key":"22"},{"journal-title":"Hardening the TCP\/IP Stack to SYN Attacks","year":"0","author":"burdach","key":"17"},{"journal-title":"Wired TCP SYN Flooding and Snort IDS","year":"0","author":"ruston","key":"23"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/563517.563480"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203223"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364533"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.115"},{"key":"12","first-page":"19","article-title":"The state of infosec education in academia: Present and future directions","author":"bishop","year":"1997","journal-title":"Proc of the National Colloquium on Information System Security Education"},{"journal-title":"Advanced Port Scanner","year":"0","key":"21"},{"year":"0","key":"3"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1059524.1059534"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/948383.948400"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1414558.1414575"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076246"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.46"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231056"},{"journal-title":"Cisco Systems Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35694-5_2"},{"key":"8","article-title":"An offensive approach to teaching information security: Aachen Summer School Applied IT Security","author":"dornseif","year":"2005","journal-title":"Technical Report AIB-2005-02"}],"event":{"name":"2013 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2013,3,13]]},"location":"Berlin","end":{"date-parts":[[2013,3,15]]}},"container-title":["2013 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6522574\/6530074\/06530097.pdf?arnumber=6530097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:43:02Z","timestamp":1490215382000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6530097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/educon.2013.6530097","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}