{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T07:11:39Z","timestamp":1766301099086,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/educon.2018.8363263","type":"proceedings-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T18:44:42Z","timestamp":1527187482000},"page":"437-444","source":"Crossref","is-referenced-by-count":11,"title":["Teaching keylogging and network eavesdropping attacks: Student threat and school liability concerns"],"prefix":"10.1109","author":[{"given":"Zouheir","family":"Trabelsi","sequence":"first","affiliation":[]},{"given":"Heba","family":"Saleous","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.46"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076246"},{"journal-title":"An Offensive Approach to Teaching Information Security Aachen Summer School Applied IT Security","year":"2005","author":"dornseif","key":"ref12"},{"key":"ref13","first-page":"46","article-title":"Is Attack Better Than Defense? Teaching Information Security the Right Way","author":"mink","year":"2006","journal-title":"Proceedings of the 3rd annual conference on Information security curriculum development"},{"key":"ref14","first-page":"8","article-title":"Teaching hands-on network security: Testbeds and live exercises","volume":"2","author":"vigna","year":"2003","journal-title":"Journal of Information Warfare"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734303"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1897816.1897832"},{"key":"ref17","first-page":"81","article-title":"Screening IA Students for Criminal background","author":"livermore","year":"2011","journal-title":"Proc 15th Colloq Inf Syst Security Educ"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121506"},{"key":"ref19","first-page":"111","article-title":"What are Faculty Attitudes toward Teaching Ethical Hacking and Penetration Testing?","author":"livermore","year":"2007","journal-title":"Proceedings of the 11th Colloquium for Information Systems Security Education"},{"year":"0","key":"ref4"},{"journal-title":"Ace Password Sniffer tool","year":"0","key":"ref3"},{"journal-title":"NMap","year":"0","key":"ref6"},{"journal-title":"PromiScan","year":"0","key":"ref5"},{"key":"ref8","first-page":"61","article-title":"When Good Ninjas Turn bad: Preventing Your Students from becoming the Threat","author":"cook","year":"2012","journal-title":"Procceedings of the 16th Colloquim for Informaion System Security Education"},{"journal-title":"NetScanTools Pro","year":"0","key":"ref7"},{"key":"ref2","first-page":"202","article-title":"A Novel Man-in-the-Middle Intrusion Detection Scheme for Switched LANs","author":"trabelsi","year":"2008","journal-title":"Intl Journal of Computer Applications"},{"key":"ref1","first-page":"28","article-title":"Combining Theory with Practice in Information Security Education","author":"chen","year":"2007","journal-title":"Proceedings of the 11th Colloquium for Information Systems Security Education"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2390317.2390321"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047405"},{"journal-title":"Letter dated 9 January 2015 from the Permanent Representatives of China Kazakhstan Kyrgyzstan the Russian Federation Tajikistan and Uzbekistan to the United Nations addressed to the Secretary - General","year":"2018","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.115"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1059524.1059534"},{"journal-title":"Special Report on Forensic Examination of Digital Evidence A Guide for Law Enforcement","year":"2004","key":"ref23"}],"event":{"name":"2018 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2018,4,17]]},"location":"Tenerife","end":{"date-parts":[[2018,4,20]]}},"container-title":["2018 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8360187\/8363090\/08363263.pdf?arnumber=8363263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T19:03:33Z","timestamp":1528743813000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8363263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/educon.2018.8363263","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}