{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:17Z","timestamp":1772163917769,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,2,23]],"date-time":"2005-02-23T00:00:00Z","timestamp":1109116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,2,23]]},"DOI":"10.1145\/1047344.1047386","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T04:31:47Z","timestamp":1123043507000},"page":"86-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A real-time information warfare exercise on a virtual network"],"prefix":"10.1145","author":[{"given":"James","family":"Walden","sequence":"first","affiliation":[{"name":"University of Toledo, Elyria, OH"}]}],"member":"320","published-online":{"date-parts":[[2005,2,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.defcon.org\/html\/defcon-4\/","author":"IV","year":"1996","unstructured":"Defcon IV announcement. http:\/\/www.defcon.org\/html\/defcon-4\/ , 1996 . Defcon IV announcement. http:\/\/www.defcon.org\/html\/defcon-4\/, 1996."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_3_1","unstructured":"Bochs. http:\/\/bochs.sourceforge.net\/.  Bochs. http:\/\/bochs.sourceforge.net\/."},{"key":"e_1_3_2_1_4_1","first-page":"120","volume-title":"Proceedings of the DARPA DISCEX III Conference","author":"Cowan C.","year":"2003","unstructured":"C. Cowan , S. Arnold , S. Beattie , C. Wright , and J. Viega . Defcon capture the flag: Defending vulnerable code from intense attack . In Proceedings of the DARPA DISCEX III Conference , pages 120 -- 129 . IEEE CS Press , 2003 . C. Cowan, S. Arnold, S. Beattie, C. Wright, and J. Viega. Defcon capture the flag: Defending vulnerable code from intense attack. In Proceedings of the DARPA DISCEX III Conference, pages 120--129. IEEE CS Press, 2003."},{"key":"e_1_3_2_1_5_1","unstructured":"D.Cannings. Networking UML using bridging. http:\/\/edeca.net\/articles\/bridging\/index.html 2004.  D.Cannings. Networking UML using bridging. http:\/\/edeca.net\/articles\/bridging\/index.html 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 4th Annual Linux Showcase and Conference (Usenix 2000)","author":"Dike J.","year":"2000","unstructured":"J. Dike . A user-mode port of the Linux kernel . In Proceedings of the 4th Annual Linux Showcase and Conference (Usenix 2000) , 2000 . J. Dike. A user-mode port of the Linux kernel. In Proceedings of the 4th Annual Linux Showcase and Conference (Usenix 2000), 2000."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.ghettohackers.net\/rootfu\/","year":"2004","unstructured":"Ghetto-Hackers. Root-fu. http:\/\/www.ghettohackers.net\/rootfu\/ , 2004 . Ghetto-Hackers. Root-fu. http:\/\/www.ghettohackers.net\/rootfu\/, 2004."},{"key":"e_1_3_2_1_8_1","unstructured":"S. Hemminger. Bridge-utils. http:\/\/bridge.sourceforge.net\/.  S. Hemminger. Bridge-utils. http:\/\/bridge.sourceforge.net\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364533"},{"key":"e_1_3_2_1_10_1","unstructured":"J.Walden. Capture the flag. http:\/\/www.eecs.utoledo.edu\/ jwalden\/ctf.html 2004.  J.Walden. Capture the flag. http:\/\/www.eecs.utoledo.edu\/ jwalden\/ctf.html 2004."},{"key":"e_1_3_2_1_11_1","unstructured":"M. Krasnyansky and M. Yevmenkin. Universal TUN\/TAP driver. http:\/\/vtun.sourceforge.net\/tun\/ 2001.  M. Krasnyansky and M. Yevmenkin. Universal TUN\/TAP driver. http:\/\/vtun.sourceforge.net\/tun\/ 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/611892.611982"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563349"},{"key":"e_1_3_2_1_14_1","first-page":"223","volume-title":"Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges","author":"Schafer J.","year":"2001","unstructured":"J. Schafer , D. J. Ragsdale , J. R. Surdu , and C. A. Carver . The iwar range: a laboratory for undergraduate information assurance education . In Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges , pages 223 -- 232 . The Consortium for Computing in Small Colleges , 2001 . J. Schafer, D. J. Ragsdale, J. R. Surdu, and C. A. Carver. The iwar range: a laboratory for undergraduate information assurance education. In Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges, pages 223--232. The Consortium for Computing in Small Colleges, 2001."},{"issue":"2","key":"e_1_3_2_1_15_1","first-page":"8","article-title":"Teaching Hands-On Network Security","volume":"3","author":"Vigna G.","year":"2003","unstructured":"G. Vigna . Teaching Hands-On Network Security : Testbeds and Live Exercises. Journal of Information Warfare , 3 ( 2 ): 8 -- 25 , 2003 . G. Vigna. Teaching Hands-On Network Security: Testbeds and Live Exercises. Journal of Information Warfare, 3(2):8--25, 2003.","journal-title":"Journal of Information Warfare"},{"key":"e_1_3_2_1_16_1","first-page":"3","volume-title":"Proceedings of the 3rd Annual World Conference on Information Security Education (WISE 3)","author":"Vigna G.","year":"2003","unstructured":"G. Vigna . Teaching Network Security Through Live Exercises. In C. Irvine and H. Armstrong, editors , Proceedings of the 3rd Annual World Conference on Information Security Education (WISE 3) , pages 3 -- 18 , Monterey, CA , June 2003 . Kluwer Academic Publishers. G. Vigna. Teaching Network Security Through Live Exercises. In C. Irvine and H. Armstrong, editors, Proceedings of the 3rd Annual World Conference on Information Security Education (WISE 3), pages 3--18, Monterey, CA, June 2003. Kluwer Academic Publishers."},{"key":"e_1_3_2_1_17_1","unstructured":"VMware. http:\/\/www.vmware.com\/.  VMware. http:\/\/www.vmware.com\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971438"},{"issue":"1","key":"e_1_3_2_1_19_1","first-page":"94","article-title":"Implementing a minimal lab for an undergraduate network security course","volume":"19","author":"Wulf T.","year":"2003","unstructured":"T. Wulf . Implementing a minimal lab for an undergraduate network security course . J. Comput. Small Coll. , 19 ( 1 ): 94 -- 98 , 2003 . T. Wulf. Implementing a minimal lab for an undergraduate network security course. J. Comput. Small Coll., 19(1):94--98, 2003.","journal-title":"J. Comput. Small Coll."}],"event":{"name":"SIGCSE05: Technical Symposium on Computer Science Education","location":"St. Louis Missouri USA","acronym":"SIGCSE05","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 36th SIGCSE technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1047344.1047386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1047344.1047386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:07:47Z","timestamp":1750248467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1047344.1047386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,2,23]]},"references-count":19,"alternative-id":["10.1145\/1047344.1047386","10.1145\/1047344"],"URL":"https:\/\/doi.org\/10.1145\/1047344.1047386","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1047124.1047386","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,2,23]]},"assertion":[{"value":"2005-02-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}