{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142510,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T00:00:00Z","timestamp":1319068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,20]]},"DOI":"10.1145\/2047594.2047669","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"293-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing network security education with research and development content"],"prefix":"10.1145","author":[{"given":"Mostafa","family":"Bassiouni","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Ratan","family":"Guha","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Abley J. and Lindqvist K. 2006. Operation of Anycast Services. IETF Request for Comments: 4786 (December 2006).  Abley J. and Lindqvist K. 2006. Operation of Anycast Services. IETF Request for Comments: 4786 (December 2006).","DOI":"10.17487\/rfc4786"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080127"},{"key":"e_1_3_2_1_3_1","unstructured":"Forouzan B. 2008. Cryptography and Network Security 1st Edition McGraw Hill (2008).   Forouzan B. 2008. Cryptography and Network Security 1st Edition McGraw Hill (2008)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Hardie T. 2002. Distributing Authoritative Name Servers via Shared Unicast Addresses. IETF Request for Comments: 3258 (April 2002).   Hardie T. 2002. Distributing Authoritative Name Servers via Shared Unicast Addresses. IETF Request for Comments: 3258 (April 2002).","DOI":"10.17487\/rfc3258"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Spring N. Wetherall D. and Ely D. 2003. Robust Explicit Congestion Notification (ECN) Signaling with Nonces. IETF Request for Comments: 3540 (June 2003).   Spring N. Wetherall D. and Ely D. 2003. Robust Explicit Congestion Notification (ECN) Signaling with Nonces. IETF Request for Comments: 3540 (June 2003).","DOI":"10.17487\/rfc3540"},{"key":"e_1_3_2_1_6_1","unstructured":"Stallings W. 2011. Cryptography and Network Security: Principles and Practice 5th Edition Pearson-Prentice Hall (2011).   Stallings W. 2011. Cryptography and Network Security: Principles and Practice 5th Edition Pearson-Prentice Hall (2011)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867651.1867656"}],"event":{"name":"SIGITE' 11: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"West Point New York USA","acronym":"SIGITE' 11"},"container-title":["Proceedings of the 2011 conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047594.2047669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:55Z","timestamp":1750240135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,20]]},"references-count":7,"alternative-id":["10.1145\/2047594.2047669","10.1145\/2047594"],"URL":"https:\/\/doi.org\/10.1145\/2047594.2047669","relation":{},"subject":[],"published":{"date-parts":[[2011,10,20]]},"assertion":[{"value":"2011-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}