{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T06:32:57Z","timestamp":1763015577276,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Educ. Resour. Comput."],"published-print":{"date-parts":[[2006,12]]},"abstract":"<jats:p>We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an attack by the instructor. Students then learn how to use open-source defense tools appropriate for the role they are playing and the attack at hand. Threats covered include eavesdropping, dictionary, man-in-the-middle, port scanning, and fingerprinting attacks. Defense skills gained by students include how to forward ports with OpenSSH, how to prevent weak passwords with CrackLib, how to salt passwords, how to set up a simple certifying authority, issue and verify certificates, and guarantee communication confidentiality and integrity using OpenSSL, and how to set up firewalls and IPsec-based virtual private networks. At two separate offerings, tests taken before and after each experiment showed that each has a statistically significant and large effect on students' learning. Moreover, surveys show that students finish the sequence of experiments with high interest in further studies and work in the area of security. These results suggest that the experiments are well-suited for introductory security or networking courses.<\/jats:p>","DOI":"10.1145\/1248453.1248458","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Laboratory experiments for network security instruction"],"prefix":"10.1145","volume":"6","author":[{"given":"Jos\u00e9 Carlos","family":"Brustoloni","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2006,12]]},"reference":[{"volume-title":"Proceedings of SIGCSE. ACM","author":"Aycock J.","key":"e_1_2_1_1_1","unstructured":"Aycock , J. and Barker , K . 2005. Viruses 101 . In Proceedings of SIGCSE. ACM , New York. 152--156. 10.1145\/1047344.1047404 Aycock, J. and Barker, K. 2005. Viruses 101. In Proceedings of SIGCSE. ACM, New York. 152--156. 10.1145\/1047344.1047404"},{"key":"e_1_2_1_2_1","volume-title":"Secure Shell: The Definitive Guide. O'Reilly","author":"Barrett D.","year":"2001","unstructured":"Barrett , D. and Silverman , R . 2001 . SSH , the Secure Shell: The Definitive Guide. O'Reilly , Sebastopol, CA . Barrett, D. and Silverman, R. 2001. SSH, the Secure Shell: The Definitive Guide. O'Reilly, Sebastopol, CA."},{"volume-title":"Proceedings of SIGCSE. ACM","author":"Bhagyavati","key":"e_1_2_1_3_1","unstructured":"Bhagyavati , Aguei-Mensah, S., Shumba , R. , and Kearse , I . 2005. Teaching hands-on computer and information systems security despite limited resources . In Proceedings of SIGCSE. ACM , New York. 325--326. 10.1145\/1047344.1047457 Bhagyavati, Aguei-Mensah, S., Shumba, R., and Kearse, I. 2005. Teaching hands-on computer and information systems security despite limited resources. In Proceedings of SIGCSE. ACM, New York. 325--326. 10.1145\/1047344.1047457"},{"key":"e_1_2_1_4_1","unstructured":"Cheswick W. Bellovin S. and Rubin A. 2003. Firewalls and Internet Security: Repelling the Wily Hacker 2nd ed. Addison-Wesley Reading MA.   Cheswick W. Bellovin S. and Rubin A. 2003. Firewalls and Internet Security: Repelling the Wily Hacker 2nd ed. Addison-Wesley Reading MA."},{"volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","key":"e_1_2_1_5_1","unstructured":"Cohen , J. 1988. Statistical Power Analysis for the Behavioral Sciences . Lawrence Erlbaum , Mahwah, NJ . Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences. Lawrence Erlbaum, Mahwah, NJ."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Dierks T. and Allen C. 1999. The TLS Protocol Version 1.0. IETF RFC 2246. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2246.txt.   Dierks T. and Allen C. 1999. The TLS Protocol Version 1.0. IETF RFC 2246. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2246.txt.","DOI":"10.17487\/rfc2246"},{"key":"e_1_2_1_7_1","volume-title":"last accessed","author":"Ethereal","year":"2005","unstructured":"Ethereal . 2003. Homepage. {Online} http:\/\/www.ethereal.com\/ , last accessed Mar. 2005 . Ethereal. 2003. Homepage. {Online} http:\/\/www.ethereal.com\/, last accessed Mar. 2005."},{"key":"e_1_2_1_8_1","volume-title":"last accessed","author":"Free BSD","year":"2005","unstructured":"Free BSD . 2003. Homepage . {Online} http:\/\/www.freebsd.org\/ , last accessed Mar. 2005 . FreeBSD. 2003. Homepage. {Online} http:\/\/www.freebsd.org\/, last accessed Mar. 2005."},{"key":"e_1_2_1_9_1","unstructured":"Freier A. Karlton P. and Kocher P. 1996. The SSL protocol version 3.0. {Online} http:\/\/wp.netscape.com\/eng\/ssl3\/draft302.txt last accessed Mar. 2005.  Freier A. Karlton P. and Kocher P. 1996. The SSL protocol version 3.0. {Online} http:\/\/wp.netscape.com\/eng\/ssl3\/draft302.txt last accessed Mar. 2005."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203223"},{"key":"e_1_2_1_11_1","volume-title":"Authentic Assessment: A Handbook for Educators","author":"Hart D.","year":"1992","unstructured":"Hart , D. 1992 . Authentic Assessment: A Handbook for Educators . Addison-Wesley , Reading, MA . Hart, D. 1992. Authentic Assessment: A Handbook for Educators. Addison-Wesley, Reading, MA."},{"volume-title":"Proceedings of SIGCSE. ACM","author":"Hill J.","key":"e_1_2_1_12_1","unstructured":"Hill , J. , Carver , C. , Humphries , J. , and Pooch , U . 2001. Using an isolated network laboratory to teach advanced networks and security . In Proceedings of SIGCSE. ACM , New York. 36-- 40. 10.1145\/364447.364533 Hill, J., Carver, C., Humphries, J., and Pooch, U. 2001. Using an isolated network laboratory to teach advanced networks and security. In Proceedings of SIGCSE. ACM, New York. 36-- 40. 10.1145\/364447.364533"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/982753.982755"},{"key":"e_1_2_1_14_1","volume-title":"nmap. {Online} http:\/\/www.insecure.org\/nmap\/, last accessed","author":"Insecure","year":"2005","unstructured":"Insecure .org. 2003. nmap. {Online} http:\/\/www.insecure.org\/nmap\/, last accessed Mar. 2005 . Insecure.org. 2003. nmap. {Online} http:\/\/www.insecure.org\/nmap\/, last accessed Mar. 2005."},{"key":"e_1_2_1_15_1","unstructured":"Kent S. and Atkinson R. 1998. Security Architecture for the Internet Protocol. IETF RFC 2401. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/pdfrfc\/rfc2401.txt.pdf.   Kent S. and Atkinson R. 1998. Security Architecture for the Internet Protocol. IETF RFC 2401. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/pdfrfc\/rfc2401.txt.pdf."},{"key":"e_1_2_1_16_1","volume-title":"Computer Networks: A Top-Down Approach Featuring the Internet","author":"Kurose J.","year":"2004","unstructured":"Kurose , J. and Ross , K . 2004 . Computer Networks: A Top-Down Approach Featuring the Internet , 3 rd ed. Addison-Wesley , Reading, MA . Kurose, J. and Ross, K. 2004. Computer Networks: A Top-Down Approach Featuring the Internet, 3rd ed. Addison-Wesley, Reading, MA.","edition":"3"},{"volume-title":"Proceedings of SIGCSE. ACM","author":"Logan P.","key":"e_1_2_1_17_1","unstructured":"Logan , P. and Clarkson , A . 2005. Teaching students to hack: Curriculum issues in information security . In Proceedings of SIGCSE. ACM , New York. 157--161. 10.1145\/1047344.1047405 Logan, P. and Clarkson, A. 2005. Teaching students to hack: Curriculum issues in information security. In Proceedings of SIGCSE. ACM, New York. 157--161. 10.1145\/1047344.1047405"},{"key":"e_1_2_1_18_1","unstructured":"Lonvick C. 2004. SSH Protocol Architecture. IETF Internet Draft. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/internet-drafts\/draft-ietf-secsh-architecture-17.txt.  Lonvick C. 2004. SSH Protocol Architecture. IETF Internet Draft. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/internet-drafts\/draft-ietf-secsh-architecture-17.txt."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of SIGCSE. ACM","author":"Mateti P.","year":"2003","unstructured":"Mateti , P. 2003 . A laboratory-based course on Internet security . In Proceedings of SIGCSE. ACM , New York. 252--256. 10.1145\/61 1892.611982 Mateti, P. 2003. A laboratory-based course on Internet security. In Proceedings of SIGCSE. ACM, New York. 252--256. 10.1145\/611892.611982"},{"volume-title":"Proceedings of SIGCSE. ACM","author":"Micco M.","key":"e_1_2_1_20_1","unstructured":"Micco , M. and Rossman , H . 2002. Building a cyberwar lab: Lessons learned teaching cybersecurity principles to undergraduates . In Proceedings of SIGCSE. ACM , New York. 23--27. 10.1145\/563340.563349 Micco, M. and Rossman, H. 2002. Building a cyberwar lab: Lessons learned teaching cybersecurity principles to undergraduates. In Proceedings of SIGCSE. ACM, New York. 23--27. 10.1145\/563340.563349"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/00131649921969901"},{"key":"e_1_2_1_22_1","volume-title":"Crack version 4.1: A sensible password checker for unix. {Online} http:\/\/www.crypticide.com\/users\/alecm\/security\/crack-v4.1-whitepaper.ps.gz, last accessed","author":"Muffet A.","year":"2005","unstructured":"Muffet , A. 2003a. Crack version 4.1: A sensible password checker for unix. {Online} http:\/\/www.crypticide.com\/users\/alecm\/security\/crack-v4.1-whitepaper.ps.gz, last accessed Mar. 2005 . Muffet, A. 2003a. Crack version 4.1: A sensible password checker for unix. {Online} http:\/\/www.crypticide.com\/users\/alecm\/security\/crack-v4.1-whitepaper.ps.gz, last accessed Mar. 2005."},{"key":"e_1_2_1_23_1","volume-title":"Cracklib v2.7. {Online} http:\/\/www.crypticide.com\/users\/alecm\/security\/cracklib,2.7.tar.gz, last accessed","author":"Muffet A.","year":"2005","unstructured":"Muffet , A. 2003b. Cracklib v2.7. {Online} http:\/\/www.crypticide.com\/users\/alecm\/security\/cracklib,2.7.tar.gz, last accessed Mar. 2005 . Muffet, A. 2003b. Cracklib v2.7. {Online} http:\/\/www.crypticide.com\/users\/alecm\/security\/cracklib,2.7.tar.gz, last accessed Mar. 2005."},{"volume-title":"Proceedings of SIGCSE. ACM","author":"Mullins P.","key":"e_1_2_1_24_1","unstructured":"Mullins , P. , Wolfe , J. , Fry , M. , Wynters , E. , Calhoun , W. , Montante , R. , and Oblitey , W . 2002. Panel on integrating security concepts into existing computer courses . In Proceedings of SIGCSE. ACM , New York. 365--366. 10.1145\/563340.563480 Mullins, P., Wolfe, J., Fry, M., Wynters, E., Calhoun, W., Montante, R., and Oblitey, W. 2002. Panel on integrating security concepts into existing computer courses. In Proceedings of SIGCSE. ACM, New York. 365--366. 10.1145\/563340.563480"},{"key":"e_1_2_1_25_1","first-page":"180","article-title":"Specifications for Secure Hash Standard","author":"National Institute of Standards and Technology.","year":"1995","unstructured":"National Institute of Standards and Technology. 1995 . Specifications for Secure Hash Standard . Federal Information Processing Standards Publication 180 - 181 . {Online} http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm. National Institute of Standards and Technology. 1995. Specifications for Secure Hash Standard. Federal Information Processing Standards Publication 180-1. {Online} http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm.","journal-title":"Federal Information Processing Standards Publication"},{"key":"e_1_2_1_26_1","unstructured":"National Institute of Standards and Technology. 2001. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. {Online} http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf.  National Institute of Standards and Technology. 2001. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. {Online} http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf."},{"key":"e_1_2_1_27_1","volume-title":"last accessed","author":"Open SSL","year":"2005","unstructured":"Open SSL . 2003. Homepage . {Online} http:\/\/www.openssl.org\/ , last accessed Mar. 2005 . OpenSSL. 2003. Homepage. {Online} http:\/\/www.openssl.org\/, last accessed Mar. 2005."},{"key":"e_1_2_1_28_1","volume-title":"John the Ripper password cracker. {Online} http:\/\/www.openwall.com\/john\/, last accessed","author":"Openwall","year":"2005","unstructured":"Openwall . 2003. John the Ripper password cracker. {Online} http:\/\/www.openwall.com\/john\/, last accessed Mar. 2005 . Openwall. 2003. John the Ripper password cracker. {Online} http:\/\/www.openwall.com\/john\/, last accessed Mar. 2005."},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Ragsdale D. Welch D. and Dodge R. 2003. Information assurance the West Point way. Security & Privacy 64--67. 10.1109\/MSECP.2003.1236238   Ragsdale D. Welch D. and Dodge R. 2003. Information assurance the West Point way. Security & Privacy 64--67. 10.1109\/MSECP.2003.1236238","DOI":"10.1109\/MSECP.2003.1236238"},{"key":"e_1_2_1_30_1","volume-title":"RFC","author":"Rekhter Y.","year":"1918","unstructured":"Rekhter , Y. , Moskowitz , B. , Karrenberg , D. , de Groot , G. J. , and Lear , E . 1996. Address Allocation for Private Internets. IETF , RFC 1918 . {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/pdfrfc\/rfc1918.txt.pdf. Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J., and Lear, E. 1996. Address Allocation for Private Internets. IETF, RFC 1918. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/pdfrfc\/rfc1918.txt.pdf."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_32_1","first-page":"4","article-title":"Design of network security projects using honeypots","volume":"20","author":"Sadasivam K.","year":"2005","unstructured":"Sadasivam , K. , Samudrala , B. , and Yang , T. A. 2005 . Design of network security projects using honeypots . Journal of Computing Sciences in Colleges 20 , 4 (Apr.), 282--293. Sadasivam, K., Samudrala, B., and Yang, T. A. 2005. Design of network security projects using honeypots. Journal of Computing Sciences in Colleges 20, 4 (Apr.), 282--293.","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_2_1_33_1","unstructured":"Skoudis E. 2002. Counter Hack. Prentice-Hall Upper Saddle River NJ.  Skoudis E. 2002. Counter Hack. Prentice-Hall Upper Saddle River NJ."},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Smith S. 2003. Humans in the loop: Human-computer interaction and security. Security & Privacy 75--79. {Online} http:\/\/www.cs.dartmouth.edu\/sws\/papers\/humans.pdf. 10.1109\/MSECP.2003.1203228   Smith S. 2003. Humans in the loop: Human-computer interaction and security. Security & Privacy 75--79. {Online} http:\/\/www.cs.dartmouth.edu\/sws\/papers\/humans.pdf. 10.1109\/MSECP.2003.1203228","DOI":"10.1109\/MSECP.2003.1203228"},{"key":"e_1_2_1_35_1","volume-title":"dsniff. {Online} http:\/\/naughty.monkey.org\/dugsong\/dsniff\/, last accessed","author":"Song D.","year":"2005","unstructured":"Song , D. 2000. dsniff. {Online} http:\/\/naughty.monkey.org\/dugsong\/dsniff\/, last accessed Mar. 2005 . Song, D. 2000. dsniff. {Online} http:\/\/naughty.monkey.org\/dugsong\/dsniff\/, last accessed Mar. 2005."},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Srisuresh P. and Holdrege M. 1999. IP Network Address Translator (NAT) Technology and Considerations. IETF RFC 2663. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/pdfrfc\/rfc2663.txt.pdf.   Srisuresh P. and Holdrege M. 1999. IP Network Address Translator (NAT) Technology and Considerations. IETF RFC 2663. {Online} ftp:\/\/ftp.rfc-editor.org\/in-notes\/pdfrfc\/rfc2663.txt.pdf.","DOI":"10.17487\/rfc2663"},{"key":"e_1_2_1_37_1","volume-title":"Distributed Systems: Principles and Paradigms","author":"Tanenbaum A.","year":"2002","unstructured":"Tanenbaum , A. and van Steen , M. 2002 . Distributed Systems: Principles and Paradigms . Prentice-Hall , Upper Saddle River, NJ. Tanenbaum, A. and van Steen, M. 2002. Distributed Systems: Principles and Paradigms. Prentice-Hall, Upper Saddle River, NJ."},{"key":"e_1_2_1_38_1","volume-title":"last accessed","author":"Tcpdump","year":"2005","unstructured":"Tcpdump . 2003. Homepage. {Online} http:\/\/www.tcpdump.org\/ , last accessed Mar. 2005 . Tcpdump. 2003. Homepage. {Online} http:\/\/www.tcpdump.org\/, last accessed Mar. 2005."},{"key":"e_1_2_1_39_1","first-page":"5","article-title":"The challenges of designing lab exercises for a curriculum in computer security","volume":"18","author":"Tikekar R.","year":"2003","unstructured":"Tikekar , R. and Bacon , T. 2003 . The challenges of designing lab exercises for a curriculum in computer security . Journal of Computing Sciences in Colleges 18 , 5 (May), 175--183. Tikekar, R. and Bacon, T. 2003. The challenges of designing lab exercises for a curriculum in computer security. Journal of Computing Sciences in Colleges 18, 5 (May), 175--183.","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of SIGCSE. ACM","author":"Vaughn R. Jr.","year":"2000","unstructured":"Vaughn R. Jr. 2000 . Application of security to the computing science curriculum . In Proceedings of SIGCSE. ACM , New York. 90--94. 10.1145\/330908.33 1822 Vaughn R. Jr. 2000. Application of security to the computing science curriculum. In Proceedings of SIGCSE. ACM, New York. 90--94. 10.1145\/330908.331822"},{"key":"e_1_2_1_41_1","unstructured":"Viega J. Messier M. and Chandra P. 2002. Network Security with OpenSSL. O'Reilly Sebastopol CA.   Viega J. Messier M. and Chandra P. 2002. Network Security with OpenSSL. O'Reilly Sebastopol CA."},{"volume-title":"Proceedings of SIGCSE. ACM","author":"Wagner P.","key":"e_1_2_1_42_1","unstructured":"Wagner , P. and Wudi , J . 2004. Designing and implementing a cyberwar laboratory exercise for a computer security course . In Proceedings of SIGCSE. ACM , New York. 402--406. 10.1145\/971300.971438 Wagner, P. and Wudi, J. 2004. Designing and implementing a cyberwar laboratory exercise for a computer security course. In Proceedings of SIGCSE. ACM, New York. 402--406. 10.1145\/971300.971438"},{"volume-title":"Proceedings of Usenix Security Symposium. {Online} http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec99\/full_papers\/whitten\/whitten.ps.","author":"Whitten A.","key":"e_1_2_1_43_1","unstructured":"Whitten , A. and Tygar , J. D . 1999. Why Johnny can't encrypt: A case study . In Proceedings of Usenix Security Symposium. {Online} http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec99\/full_papers\/whitten\/whitten.ps. Whitten, A. and Tygar, J. D. 1999. Why Johnny can't encrypt: A case study. In Proceedings of Usenix Security Symposium. {Online} http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec99\/full_papers\/whitten\/whitten.ps."},{"key":"e_1_2_1_44_1","first-page":"1","article-title":"Implementing a minimal lab for an undergraduate network security course","volume":"19","author":"Wulf T.","year":"2003","unstructured":"Wulf , T. 2003 . Implementing a minimal lab for an undergraduate network security course . Journal of Computing Sciences in Colleges 19 , 1 (Oct.), 94--98. Wulf, T. 2003. Implementing a minimal lab for an undergraduate network security course. Journal of Computing Sciences in Colleges 19, 1 (Oct.), 94--98.","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of WWW 2005","author":"Xia H.","year":"2005","unstructured":"Xia , H. and Brustoloni , J . 2005. Hardening web browsers against man-in-the-middle and eavesdropping attacks . In Proceedings of WWW 2005 . IW3C2\/ACM. {Online} http:\/\/www.cs.pitt.edu\/~jcb\/papers\/www 2005 .pdf. 10.1145\/1060745.1060817 Xia, H. and Brustoloni, J. 2005. Hardening web browsers against man-in-the-middle and eavesdropping attacks. In Proceedings of WWW 2005. IW3C2\/ACM. {Online} http:\/\/www.cs.pitt.edu\/~jcb\/papers\/www2005.pdf. 10.1145\/1060745.1060817"}],"container-title":["Journal on Educational Resources in Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1248453.1248458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1248453.1248458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:26Z","timestamp":1750258286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1248453.1248458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["10.1145\/1248453.1248458"],"URL":"https:\/\/doi.org\/10.1145\/1248453.1248458","relation":{},"ISSN":["1531-4278","1531-4278"],"issn-type":[{"type":"print","value":"1531-4278"},{"type":"electronic","value":"1531-4278"}],"subject":[],"published":{"date-parts":[[2006,12]]},"assertion":[{"value":"2006-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}