{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:25Z","timestamp":1750308685404,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T00:00:00Z","timestamp":1380672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,2]]},"DOI":"10.1145\/2512276.2512290","type":"proceedings-article","created":{"date-parts":[[2013,10,3]],"date-time":"2013-10-03T13:37:34Z","timestamp":1380807454000},"page":"3-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Training cyber-defense and securing information assets using student blue teams"],"prefix":"10.1145","author":[{"given":"Scott J.","family":"Pack","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"given":"Dale C.","family":"Rowe","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.110"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/366413.364533"},{"key":"e_1_3_2_1_3_1","unstructured":"Jr R. D. 2003. Organization and training of a cyber security team. Systems Man and .... (2003).  Jr R. D. 2003. Organization and training of a cyber security team. Systems Man and .... (2003)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380552.2380573"},{"key":"e_1_3_2_1_5_1","unstructured":"Rowe D. 2012. Cyber-Security IAS and the Cyber Warrior. The Colloquium for Information Systems Security .... (2012).  Rowe D. 2012. Cyber-Security IAS and the Cyber Warrior. The Colloquium for Information Systems Security .... (2012)."},{"key":"e_1_3_2_1_6_1","first-page":"8","article-title":"Teaching Hands-On Network Security: Testbeds and Live Exercises","volume":"2","author":"Vigna G.","year":"2003","journal-title":"Journal of Information Warfare."},{"key":"e_1_3_2_1_7_1","unstructured":"Wang X. Hembroff G.C. Yedica R. Ave N.M. and Bay G. 2008. Using VMware VCenter Lab Manager in Undergraduate Education for System Administration and Network Security Categories and Subject Descriptors. CISSE (2008) 43--51.  Wang X. Hembroff G.C. Yedica R. Ave N.M. and Bay G. 2008. Using VMware VCenter Lab Manager in Undergraduate Education for System Administration and Network Security Categories and Subject Descriptors. CISSE (2008) 43--51."}],"event":{"name":"SIGITE\/RIIT'13: SIGITE\/RIIT 2013","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Orlando Florida USA","acronym":"SIGITE\/RIIT'13"},"container-title":["Proceedings of the 14th annual ACM SIGITE conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2512276.2512290","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2512276.2512290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:08Z","timestamp":1750276868000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2512276.2512290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,2]]},"references-count":7,"alternative-id":["10.1145\/2512276.2512290","10.1145\/2512276"],"URL":"https:\/\/doi.org\/10.1145\/2512276.2512290","relation":{},"subject":[],"published":{"date-parts":[[2013,10,2]]},"assertion":[{"value":"2013-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}