{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:16:31Z","timestamp":1757542591197,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,29]],"date-time":"2015-09-29T00:00:00Z","timestamp":1443484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1140310 1140308"],"award-info":[{"award-number":["1140310 1140308"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,29]]},"DOI":"10.1145\/2808006.2808023","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T19:31:27Z","timestamp":1442950287000},"page":"161-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Hands-on Exercises for IT Security Education"],"prefix":"10.1145","author":[{"given":"Xinli","family":"Wang","sequence":"first","affiliation":[{"name":"Michigan Technological University, Houghton, MI, USA"}]},{"given":"Yan","family":"Bai","sequence":"additional","affiliation":[{"name":"University of Washington Tacoma, Tacoma, WA, USA"}]},{"given":"Guy C.","family":"Hembroff","sequence":"additional","affiliation":[{"name":"Michigan Technological University, Houghton, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2005.858403"},{"volume-title":"April","year":"2012","author":"Abrams L.","key":"e_1_3_2_1_2_1"},{"volume-title":"Applied Information Security: A Hands-On Guide to Information Security Software","year":"2009","author":"Boyle R.","key":"e_1_3_2_1_3_1"},{"volume-title":"June","year":"2011","author":"Chen L.-C.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005817.1005836"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610265"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Computer Applications in Engineering Education","author":"Dobrilovic D.","year":"2009"},{"volume-title":"March","year":"2011","author":"Du W.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.139"},{"key":"e_1_3_2_1_10_1","first-page":"56","volume-title":"5th Annual Symposium on Information Assurance (ASIA'10)","author":"Du W.","year":"2010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348713.1348716"},{"key":"e_1_3_2_1_12_1","unstructured":"Ettercap. Ettercap home page. online. http:\/\/ettercap.github.io\/ettercap\/ last retrieved on February 28 2015.  Ettercap. Ettercap home page. online. http:\/\/ettercap.github.io\/ettercap\/ last retrieved on February 28 2015."},{"volume-title":"Semptemberl","year":"2008","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243481.1243483"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1352079.1352093"},{"volume-title":"Project home page. online. https:\/\/www.kali.org\/. last retrieved on","year":"2015","author":"Linux Kali","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","first-page":"78","volume-title":"Distributed Open Systems","author":"Kohl J. T.","year":"1994"},{"volume-title":"May","year":"2012","author":"National Security Agency.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124706.1121346"},{"key":"e_1_3_2_1_21_1","unstructured":"OpenSSL. Home page of the OpenSSL project. online. http:\/\/www.openssl.org\/ last retrieved on February 28 2015.  OpenSSL. Home page of the OpenSSL project. online. http:\/\/www.openssl.org\/ last retrieved on February 28 2015."},{"volume-title":"March","year":"2010","author":"VPN.","key":"e_1_3_2_1_22_1"},{"volume-title":"March","year":"2010","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.393.0720"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1629036.1629042"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1516595.1516626"},{"key":"e_1_3_2_1_27_1","unstructured":"SecTools.Org. Top 125 network security tools. online. http:\/\/sectools.org\/. last retrieved on February 28 2015.  SecTools.Org. Top 125 network security tools. online. http:\/\/sectools.org\/. last retrieved on February 28 2015."},{"key":"e_1_3_2_1_28_1","unstructured":"SNORT. Snort home page. online. http:\/\/www.snort.org\/ last retrieved on February 28 2015.  SNORT. Snort home page. online. http:\/\/www.snort.org\/ last retrieved on February 28 2015."},{"key":"e_1_3_2_1_29_1","volume-title":"Computer Security: Principles and Practice","author":"Stallings W.","year":"2015","edition":"3"},{"key":"e_1_3_2_1_30_1","unstructured":"B. Taylor S. Kaza and E. Hawthorne. Security injections @ towson. online. http:\/\/cis1.towson.edu\/ cssecinj\/ last retrieved on February 28 2015.  B. Taylor S. Kaza and E. Hawthorne. Security injections @ towson. online. http:\/\/cis1.towson.edu\/ cssecinj\/ last retrieved on February 28 2015."},{"volume-title":"Home page of the project. online, l. https:\/\/www.virtualbox.org\/. last retrieved on","year":"2015","key":"e_1_3_2_1_31_1"},{"volume-title":"June","year":"2013","author":"Wang X.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867651.1867665"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1457575"},{"key":"e_1_3_2_1_35_1","volume-title":"Hands-on Information Security Lab Manual. Course Technology","author":"Whitman M. E.","year":"2013","edition":"4"}],"event":{"name":"SIGITE\/RIIT '15: The 16th Annual Conference on Information Technology Education and the 4th Annual Conference on Research in Information Technology","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Chicago Illinois USA","acronym":"SIGITE\/RIIT '15"},"container-title":["Proceedings of the 16th Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808006.2808023","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808006.2808023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:11Z","timestamp":1750223231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808006.2808023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,29]]},"references-count":35,"alternative-id":["10.1145\/2808006.2808023","10.1145\/2808006"],"URL":"https:\/\/doi.org\/10.1145\/2808006.2808023","relation":{},"subject":[],"published":{"date-parts":[[2015,9,29]]},"assertion":[{"value":"2015-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}