{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:03:29Z","timestamp":1766466209172},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iptcomm.2017.8169747","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T22:40:36Z","timestamp":1513032036000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["The Docker Security Playground: A hands-on approach to the study of network security"],"prefix":"10.1109","author":[{"given":"G.","family":"Perrone","sequence":"first","affiliation":[]},{"given":"S. P.","family":"Romano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Offensive Security","year":"0","key":"ref10"},{"journal-title":"Vulnhub site","year":"0","key":"ref11"},{"journal-title":"Damn Vulnerable Linux","year":"0","key":"ref12"},{"journal-title":"Offensive Security?s Exploit Database Archive","year":"0","key":"ref13"},{"journal-title":"OWASP Team OWASP","year":"0","key":"ref14"},{"journal-title":"Security Tools","year":"0","key":"ref4"},{"journal-title":"Security Tools","year":"0","key":"ref3"},{"journal-title":"Joomla Security Scanner","year":"0","key":"ref6"},{"journal-title":"Wpscan","year":"0","key":"ref5"},{"journal-title":"Burp Suite","year":"0","key":"ref8"},{"journal-title":"Metasploit","year":"0","key":"ref7"},{"journal-title":"Docker compose","year":"0","key":"ref2"},{"journal-title":"Docker web site","year":"0","key":"ref1"},{"journal-title":"Zed Attack Proxy","year":"0","key":"ref9"}],"event":{"name":"2017 Principles, Systems and Applications of IP Telecommunications (IPTComm)","start":{"date-parts":[[2017,9,25]]},"location":"Chicago, IL","end":{"date-parts":[[2017,9,28]]}},"container-title":["2017 Principles, Systems and Applications of IP Telecommunications (IPTComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8123822\/8169746\/08169747.pdf?arnumber=8169747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:51:48Z","timestamp":1516056708000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8169747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iptcomm.2017.8169747","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}