{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:09:55Z","timestamp":1729620595432,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/tridentcom.2007.4444679","type":"proceedings-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T21:23:33Z","timestamp":1202505813000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Configuring a Lab to Support Community-Based Security Audit Projects"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Holland","sequence":"first","affiliation":[]},{"given":"Susan J.","family":"Lincke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IT Control Objectives for Sarbanes-oxley","year":"2006","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1227310.1227472"},{"journal-title":"Knark Linux Kernel Subversion","year":"2006","author":"clemens","key":"13"},{"journal-title":"Top 75 Security Tools","year":"2006","key":"14"},{"journal-title":"Anti-Hacker Toolkit","year":"2004","author":"shema","key":"11"},{"journal-title":"Auditing Networks Perimeters and Systems Hands-On Workbook Audit 507-Auditing Networks Perimeters & Systems Course","year":"2005","key":"12"},{"journal-title":"2006 CSI\/FBI Computer Crime and Security Survey Computer Security Institute","year":"2006","author":"gordon","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047405"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047404"},{"journal-title":"VMware Technology Network","year":"2006","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971438"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.2006.115","article-title":"Design and implmenetation of a multi-use attack-defend computer security lab","volume":"9","author":"caltagirone","year":"2006","journal-title":"Proc Hawaii Int Conf on System Sciences"},{"key":"5","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1109\/ITHET.2004.1358254","article-title":"A teaching prototype for educating IT security engineers in emerging environments","author":"rombney","year":"2004","journal-title":"Proc 6th Int Conf Information Technology Based Higher Education and Training"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364533"},{"key":"9","article-title":"Tor: The secondgeneration onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of 12th USENIX Security Symposium"},{"journal-title":"Squid Web Proxy Cache","year":"2006","key":"8"}],"event":{"name":"2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities","start":{"date-parts":[[2007,5,21]]},"location":"Lake Buena Vista, FL, USA","end":{"date-parts":[[2007,5,23]]}},"container-title":["2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4444645\/4444646\/04444679.pdf?arnumber=4444679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T23:49:47Z","timestamp":1557272987000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4444679\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/tridentcom.2007.4444679","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}