{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:07:35Z","timestamp":1763467655612,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,28]],"date-time":"2004-10-28T00:00:00Z","timestamp":1098921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,28]]},"DOI":"10.1145\/1029533.1029539","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"19-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["An isolated, multi-platform network sandbox for teaching IT security system engineers"],"prefix":"10.1145","author":[{"given":"Gordon W.","family":"Romney","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Brady R.","family":"Stevenson","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2004,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.982909"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/611892.611982"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971439"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947178"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971440"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/378613.378722"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364533"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947179"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947147"},{"key":"e_1_3_2_1_11_1","volume-title":"May","author":"Shirey R.","year":"2000","unstructured":"R. Shirey , \"Internet Security Glossary. Internet Request for Comment RFC 2828,\" IETF , May 2000 .]] R. Shirey, \"Internet Security Glossary. Internet Request for Comment RFC 2828,\" IETF, May 2000.]]"},{"volume-title":"March 13","year":"2004","key":"e_1_3_2_1_12_1","unstructured":"Web reference : \" Security Engineer,\" nitservices.com , March 13 , 2004 .]] Web reference: \"Security Engineer,\" nitservices.com, March 13, 2004.]]"},{"volume-title":"IEEE ITHET 2004 Conference, Published in IEEE Xplore.]]","author":"Romney G.","key":"e_1_3_2_1_13_1","unstructured":"G. Romney , et. al., \" A Teaching Prototype for Educating IT Security Engineers in Emerging Environments,\" IEEE ITHET 2004 Conference, Published in IEEE Xplore.]] G. Romney, et. al., \"A Teaching Prototype for Educating IT Security Engineers in Emerging Environments,\" IEEE ITHET 2004 Conference, Published in IEEE Xplore.]]"},{"key":"e_1_3_2_1_14_1","first-page":"3393","volume-title":"Aerospace Conference 2003, Proceedings, IEEE","volume":"7","author":"Childs D.","unstructured":"D. Childs , \"Information Technology Security System Engineering Methodology,\" Aerospace Conference 2003, Proceedings, IEEE , vol. 7 , March 8-15, pp. 3393 -- 3401 ..]] D. Childs, \"Information Technology Security System Engineering Methodology,\" Aerospace Conference 2003, Proceedings, IEEE, vol. 7, March 8-15, pp. 3393--3401..]]"},{"key":"e_1_3_2_1_15_1","unstructured":"P. Mateti \"Internet Security Lectures \" http:\/\/www.cs.wright.edu\/cse\/~pmateti\/InternetSecurity.]]  P. Mateti \"Internet Security Lectures \" http:\/\/www.cs.wright.edu\/cse\/~pmateti\/InternetSecurity.]]"},{"key":"e_1_3_2_1_16_1","unstructured":"National Security Agency CAEIAE http:\/\/www.nsa.gov\/ia\/academia\/index.cfm]]  National Security Agency CAEIAE http:\/\/www.nsa.gov\/ia\/academia\/index.cfm]]"},{"key":"e_1_3_2_1_17_1","volume-title":"May","author":"Ragsdale D.","year":"2000","unstructured":"D. Ragsdale , S. Lathrop and R. Dodge Jr . , \" A Virtu,\" IETF , May 2000 .]] D. Ragsdale, S. Lathrop and R. Dodge Jr., \"A Virtu,\" IETF, May 2000.]]"}],"event":{"name":"SIGITE04: ACM Special Interest Group for Information Technology Education Conference 2004","sponsor":["ACM Association for Computing Machinery","SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Salt Lake City UT USA","acronym":"SIGITE04"},"container-title":["Proceedings of the 5th conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029533.1029539","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029533.1029539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:30:59Z","timestamp":1750264259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029533.1029539"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,28]]},"references-count":16,"alternative-id":["10.1145\/1029533.1029539","10.1145\/1029533"],"URL":"https:\/\/doi.org\/10.1145\/1029533.1029539","relation":{},"subject":[],"published":{"date-parts":[[2004,10,28]]},"assertion":[{"value":"2004-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}