{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T11:48:32Z","timestamp":1751629712620,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231056","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"44-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Is attack better than defense?"],"prefix":"10.1145","author":[{"given":"Martin","family":"Mink","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Felix C.","family":"Freiling","sequence":"additional","affiliation":[{"name":"University of Mannheim, Germany"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Black Hat briefings training and consulting. http:\/\/www.blackhat.com.  Black Hat briefings training and consulting. http:\/\/www.blackhat.com."},{"key":"e_1_3_2_1_2_1","unstructured":"Defcon hacking event Las Vegas. http:\/\/www.defcon.org.  Defcon hacking event Las Vegas. http:\/\/www.defcon.org."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.46"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076246"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"J. Bortz and N. D\u00f6ring. Forschungsmethoden und Evaluation f\u00fcr Human- und Sozialwissenschaftler. Springer 3rd edition 2003.  J. Bortz and N. D\u00f6ring. Forschungsmethoden und Evaluation f\u00fcr Human- und Sozialwissenschaftler . Springer 3rd edition 2003.","DOI":"10.1007\/978-3-662-07299-8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047671.1047694"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132497"},{"key":"e_1_3_2_1_8_1","unstructured":"Digital Evolution. Homepage \"Digital Evolution\". http:\/\/www.dievo.org\/. Accessed March 2006.  Digital Evolution. Homepage \"Digital Evolution\". http:\/\/www.dievo.org\/. Accessed March 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2003.1245662"},{"key":"e_1_3_2_1_10_1","unstructured":"D. Farmer and W. Venema. Improving the security of your site by breaking into it. Usenet Posting to comp.security.unix 3. Dec. 1993.  D. Farmer and W. Venema. Improving the security of your site by breaking into it. Usenet Posting to comp.security.unix 3. Dec. 1993."},{"key":"e_1_3_2_1_11_1","first-page":"213","volume-title":"Proceedings of the Fourth World Conference on Information Security Education","author":"Dornseif M.","year":"2005"},{"key":"e_1_3_2_1_13_1","unstructured":"Ghetto Hackers. Homepage \"Root-Fu\". http:\/\/www.ghettohackers.net\/rootfu\/. Accessed April 2006.  Ghetto Hackers. Homepage \"Root-Fu\". http:\/\/www.ghettohackers.net\/rootfu\/. Accessed April 2006."},{"key":"e_1_3_2_1_14_1","unstructured":"Hack this page. Homepage \"Hack this page\". http:\/\/www.hackthispage.tk\/. Accessed May 2006.  Hack this page. Homepage \"Hack this page\". http:\/\/www.hackthispage.tk\/. Accessed May 2006."},{"key":"e_1_3_2_1_15_1","unstructured":"P. G. Neumann. The risks-forum digest. http:\/\/catless.ncl.ac.uk\/risks.  P. G. Neumann. The risks-forum digest. http:\/\/catless.ncl.ac.uk\/risks."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015896"},{"volume-title":"Beltz","year":"2005","author":"Rost D.","key":"e_1_3_2_1_17_1"},{"volume-title":"Proceedings of the 2003 IEEE International Conference on Systems, Man &amp; Cybernetics","year":"1998","author":"Schepens W.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"M. Schumacher M.-L. Moschgath and U. Roedig. Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universit\u00e4ten. Informatik Spektrum 6(23) June 2000.  M. Schumacher M.-L. Moschgath and U. Roedig. Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universit\u00e4ten. Informatik Spektrum 6(23) June 2000.","DOI":"10.1007\/s002870000099"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/986213.986240"},{"key":"e_1_3_2_1_21_1","unstructured":"UCSB. Homepage \"UCSB Capture The Flag\". http:\/\/www.cs.ucsb.edu\/~vigna\/CTF\/. Accessed May 2006.  UCSB. Homepage \"UCSB Capture The Flag\". http:\/\/www.cs.ucsb.edu\/~vigna\/CTF\/. Accessed May 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"G.\n       \n      Vigna\n    .\n      \n  \n   \n  Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong editors World Conference on Information Security Education volume \n  253\n   of \n  IFIP Conference Proceedings pages \n  3\n  --\n  18\n  . \n  Kluwer 2003\n  .   G. Vigna. Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong editors World Conference on Information Security Education volume 253 of IFIP Conference Proceedings pages 3--18. Kluwer 2003.","DOI":"10.1007\/978-0-387-35694-5_2"},{"key":"e_1_3_2_1_23_1","first-page":"519","volume-title":"Proceedings of the 19th International Information Systems Security Conference","author":"White G.","year":"1998"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231056","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231056"}},"subtitle":["teaching information security the right way"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":22,"alternative-id":["10.1145\/1231047.1231056","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231056","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}