{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:55:47Z","timestamp":1730300147092,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/tale.2018.8615431","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:40:19Z","timestamp":1547772019000},"page":"54-61","source":"Crossref","is-referenced-by-count":4,"title":["A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Falah","sequence":"first","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Feifei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Mitigating the cybersecurity skills shortage","year":"2015","key":"ref10"},{"key":"ref11","first-page":"81","article-title":"An updated taxonomy for characterizing hackers according to their threat properties","author":"hald","year":"2012","journal-title":"2012 14th International Conference on Advanced Communication Technology (ICACT) ICACT"},{"journal-title":"Teaching for Quality Learning at University What the Student Does","year":"2011","author":"biggs","key":"ref12"},{"key":"ref13","first-page":"26","article-title":"Cybersecurity education at formal university level: An australian perspective","volume":"5","author":"caelli","year":"2018","journal-title":"Journal for the Colloquium for Information Systems Security Education"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2014.6891032"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.03.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.157"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290204"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7850035"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1089\/109493103321640365"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNS.2015.7292373"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813688"},{"key":"ref6","first-page":"757","article-title":"Unveil: A large-scale, automated approach to detecting ransomware","author":"kharraz","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219079"},{"key":"ref8","article-title":"Stealing machine learning models via prediction apis","author":"tramr","year":"2016","journal-title":"Usenix Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813690"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2016.7860040"},{"journal-title":"What is Big Data?","year":"2017","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/10580530701585823"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2018.8363430"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"key":"ref24","first-page":"1","article-title":"Empowering teachers to apply gamifi-cation","author":"arajo","year":"2017","journal-title":"2017 International Symposium on Computers in Education (SIIE)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2018.8363482"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014820"},{"journal-title":"Cyber security challenge australia","year":"2017","author":"government","key":"ref25"}],"event":{"name":"2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)","start":{"date-parts":[[2018,12,4]]},"location":"Wollongong, NSW","end":{"date-parts":[[2018,12,7]]}},"container-title":["2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8600698\/8615123\/08615431.pdf?arnumber=8615431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:09:49Z","timestamp":1643231389000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8615431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/tale.2018.8615431","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}