{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:49:07Z","timestamp":1772772547205,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,28]],"date-time":"2007-09-28T00:00:00Z","timestamp":1190937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,28]]},"DOI":"10.1145\/1409908.1409918","type":"proceedings-article","created":{"date-parts":[[2008,9,30]],"date-time":"2008-09-30T13:03:19Z","timestamp":1222779799000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["VLabNet"],"prefix":"10.1145","author":[{"given":"Valerie J. H.","family":"Powell","sequence":"first","affiliation":[{"name":"C&amp;IS, RMU, Moon Twp., PA"}]},{"given":"Christopher T.","family":"Davis","sequence":"additional","affiliation":[{"name":"Educ. Tech. Center, RMU, Moon Twp., PA"}]},{"given":"Randall S.","family":"Johnson","sequence":"additional","affiliation":[{"name":"IT, RMU, Moon Twp., PA"}]},{"given":"Peter Y.","family":"Wu","sequence":"additional","affiliation":[{"name":"C&amp;IS, RMU, Moon Twp., PA"}]},{"given":"John C.","family":"Turchek","sequence":"additional","affiliation":[{"name":"C&amp;IS, RMU, Moon Twp., PA"}]},{"given":"Ian W.","family":"Parker","sequence":"additional","affiliation":[{"name":"IT, RMU, Moon Twp., PA"}]}],"member":"320","published-online":{"date-parts":[[2007,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Abler R. T. Contis D. Grizzard J. and. Owen H. L. \"Georgia Tech 'Hands On' Network Security Laboratory.\" www.cisco.com\/web\/about\/security\/security_services\/ciag\/pdf\/GeorgiaTech_Cisco_TeachingLab.pdf 2004.  Abler R. T. Contis D. Grizzard J. and. Owen H. L. \"Georgia Tech 'Hands On' Network Security Laboratory.\" www.cisco.com\/web\/about\/security\/security_services\/ciag\/pdf\/GeorgiaTech_Cisco_TeachingLab.pdf 2004."},{"key":"e_1_3_2_1_2_1","unstructured":"Andreasson O. \"Iptables Tutorial 1.2.2\" http:\/\/iptables-tutorial.frozentux.net\/iptables-tutorial.html 2006.  Andreasson O. \"Iptables Tutorial 1.2.2\" http:\/\/iptables-tutorial.frozentux.net\/iptables-tutorial.html 2006."},{"key":"#cr-split#-e_1_3_2_1_3_1.1","unstructured":"Harvey V. J. Johnson R. S. and Turchek J. C. \"Virtual Laboratory Intrusion Detection Experience for Information Systems Professionals \" Information Systems Education Journal 5 (5). http:\/\/isedj.org\/5\/5\/. ISSN: 1545-679X. (2007) (Online at http:\/\/isedj.org\/5\/5\/"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","unstructured":"also appears in The Proceedings of ISECON 2006: &sect;3722. ISSN: 1542--7382.) Harvey V. J. Johnson R. S. and Turchek J. C. \"Virtual Laboratory Intrusion Detection Experience for Information Systems Professionals \" Information Systems Education Journal 5 (5). http:\/\/isedj.org\/5\/5\/. ISSN: 1545-679X. (2007) (Online at http:\/\/isedj.org\/5\/5\/"},{"key":"#cr-split#-e_1_3_2_1_3_1.3","unstructured":"also appears in The Proceedings of ISECON 2006: &sect;3722. ISSN: 1542--7382.)"},{"key":"e_1_3_2_1_4_1","unstructured":"Harvey V. J. Johnson R. S. and Turchek J. C. \"A Model for Virtual Laboratory Intrusion Detection Experience \" Kennesaw State University Information Security Curriculum Development (INFOSECCD) Conference 2006.  Harvey V. J. Johnson R. S. and Turchek J. C. \"A Model for Virtual Laboratory Intrusion Detection Experience \" Kennesaw State University Information Security Curriculum Development (INFOSECCD) Conference 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"Johnson E. \"Laboratory assignment 3: Firewalling with Linux.\" www.ce.chalmers.se\/edu\/course\/EDA262\/04\/lab3.ps 2007.  Johnson E. \"Laboratory assignment 3: Firewalling with Linux.\" www.ce.chalmers.se\/edu\/course\/EDA262\/04\/lab3.ps 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"NJ: Pearson","author":"Kauchak D.","year":"2005"},{"key":"e_1_3_2_1_7_1","first-page":"41","volume":"1","author":"Jason Kretzer J.","year":"2006","journal-title":"Journal of Computing Sciences in Colleges (21"},{"key":"e_1_3_2_1_8_1","unstructured":"Kung L. and Hou J. C. \"CS397 Network System Labs Project 5: Netfilter Tutorial \" http:\/\/lion.cs.uiuc.edu\/courses\/cs397hou\/lectures\/Netfilter_Tutorial.pdf 2007.  Kung L. and Hou J. C. \"CS397 Network System Labs Project 5: Netfilter Tutorial \" http:\/\/lion.cs.uiuc.edu\/courses\/cs397hou\/lectures\/Netfilter_Tutorial.pdf 2007."},{"key":"e_1_3_2_1_9_1","unstructured":"Noubir G. \"CSG254: Network Security: Practical Systems Security Lab Lab Assignment 3: Network Defense \" http:\/\/www.ccs.neu.edu\/home\/noubir\/Courses\/CSG254\/S06\/Labs\/LA3\/la3.html. 2006.  Noubir G. \"CSG254: Network Security: Practical Systems Security Lab Lab Assignment 3: Network Defense \" http:\/\/www.ccs.neu.edu\/home\/noubir\/Courses\/CSG254\/S06\/Labs\/LA3\/la3.html. 2006."},{"key":"e_1_3_2_1_10_1","unstructured":"Russell R. \"Packet-Filtering-HOWTO\" http:\/\/www.netfilter.org\/documentation\/HOWTO\/packetfiltering-HOWTO-7.html 2000.  Russell R. \"Packet-Filtering-HOWTO\" http:\/\/www.netfilter.org\/documentation\/HOWTO\/packetfiltering-HOWTO-7.html 2000."},{"key":"e_1_3_2_1_11_1","volume-title":"Inc.","author":"Tomei L. A.,.","year":"2001"},{"key":"e_1_3_2_1_12_1","unstructured":"Zou C. \"Setting up Linux Firewall using IPTABLES (updated: 06\/24\/03) http:\/\/tennis.ecs.umass.edu\/~czou\/linux\/firewall.html 2003.  Zou C. \"Setting up Linux Firewall using IPTABLES (updated: 06\/24\/03) http:\/\/tennis.ecs.umass.edu\/~czou\/linux\/firewall.html 2003."}],"event":{"name":"InfoSecCD07: 2007 Information Security Curriculum Development Conference","location":"Kennesaw Georgia","acronym":"InfoSecCD07"},"container-title":["Proceedings of the 4th annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409908.1409918","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1409908.1409918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:09Z","timestamp":1750258029000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1409908.1409918"}},"subtitle":["the integrated design of hands-on learning in information security and networking"],"short-title":[],"issued":{"date-parts":[[2007,9,28]]},"references-count":14,"alternative-id":["10.1145\/1409908.1409918","10.1145\/1409908"],"URL":"https:\/\/doi.org\/10.1145\/1409908.1409918","relation":{},"subject":[],"published":{"date-parts":[[2007,9,28]]},"assertion":[{"value":"2007-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}