{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:35Z","timestamp":1750306535901,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T00:00:00Z","timestamp":1424736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,2,24]]},"DOI":"10.1145\/2676723.2677257","type":"proceedings-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T14:09:31Z","timestamp":1424786971000},"page":"326-331","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Hands-On Network Programming Projects in the Cloud"],"prefix":"10.1145","author":[{"given":"Weiying","family":"Zhu","sequence":"first","affiliation":[{"name":"Metropolitan State University of Denver, Denver, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AWS Identity and Access Management: Using IAM (API Version 2010-05-08). Website= http:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/IAM_Introduction.html.  AWS Identity and Access Management: Using IAM (API Version 2010-05-08). Website= http:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/IAM_Introduction.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Elastic Compute Cloud Documentation. Website= http:\/\/aws.amazon.com\/documentation\/ec2\/  Amazon Elastic Compute Cloud Documentation. Website= http:\/\/aws.amazon.com\/documentation\/ec2\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508865.1508905"},{"volume-title":"Proceedings of 13th International Conference on Optimization of Electrical and Electronic Equipment (Brasov, Romania, May 24 - 26, 2012). OPTIM 2012. IEEE, 1314--1318","author":"Dinita R.I.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348713.1348716"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047594.2047642"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631728.1631765"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985500.1985503"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538880"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.230"},{"volume-title":"Proceedings of the conference on Cyber security experimentation and test","year":"2008","author":"Sun W.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325296.2325357"},{"key":"e_1_3_2_1_13_1","first-page":"4","article-title":"Network security development process: a framework for teaching network security courses","volume":"21","author":"Yang T. A.","year":"2006","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--22175"}],"event":{"name":"SIGCSE '15: The 46th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Kansas City Missouri USA","acronym":"SIGCSE '15"},"container-title":["Proceedings of the 46th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676723.2677257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676723.2677257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:20Z","timestamp":1750227140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676723.2677257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,24]]},"references-count":14,"alternative-id":["10.1145\/2676723.2677257","10.1145\/2676723"],"URL":"https:\/\/doi.org\/10.1145\/2676723.2677257","relation":{},"subject":[],"published":{"date-parts":[[2015,2,24]]},"assertion":[{"value":"2015-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}