{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:03Z","timestamp":1750306503206,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,2,17]],"date-time":"2016-02-17T00:00:00Z","timestamp":1455667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2,17]]},"DOI":"10.1145\/2839509.2844648","type":"proceedings-article","created":{"date-parts":[[2016,2,22]],"date-time":"2016-02-22T13:18:49Z","timestamp":1456147129000},"page":"603-608","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Facilitating a Battle Between Hackers"],"prefix":"10.1145","author":[{"given":"Nathan","family":"Backman","sequence":"first","affiliation":[{"name":"Buena Vista University, Storm Lake, IA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,2,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ACM International Collegiate Programming Contest http:\/\/icpc.baylor.edu.  ACM International Collegiate Programming Contest http:\/\/icpc.baylor.edu."},{"volume-title":"CON\u00ae Hacking Conference, A History of Capture The Flag at DEF CON, https:\/\/www.defcon.org\/html\/links\/dc-ctf-history.html.","author":"DEF","key":"e_1_3_2_1_2_1","unstructured":"DEF CON\u00ae Hacking Conference, A History of Capture The Flag at DEF CON, https:\/\/www.defcon.org\/html\/links\/dc-ctf-history.html. DEF CON\u00ae Hacking Conference, A History of Capture The Flag at DEF CON, https:\/\/www.defcon.org\/html\/links\/dc-ctf-history.html."},{"key":"e_1_3_2_1_3_1","unstructured":"The UCSB iCTF Competition http:\/\/ictf.cs.ucsb.edu.  The UCSB iCTF Competition http:\/\/ictf.cs.ucsb.edu."},{"key":"e_1_3_2_1_4_1","unstructured":"RuCTFE Online international challenge of information security https:\/\/ructf.org\/e.  RuCTFE Online international challenge of information security https:\/\/ructf.org\/e."},{"key":"e_1_3_2_1_5_1","unstructured":"CTFtime.org: All about CTF (Capture the Flag) https:\/\/ctftime.org.  CTFtime.org: All about CTF (Capture the Flag) https:\/\/ctftime.org."},{"volume-title":"Amazon.com","author":"Compute Cloud Amazon Elastic","key":"e_1_3_2_1_6_1","unstructured":"Amazon Elastic Compute Cloud , http:\/\/aws.amazon.com\/ec2\/ , Amazon.com , Inc . Amazon Elastic Compute Cloud, http:\/\/aws.amazon.com\/ec2\/, Amazon.com, Inc."},{"volume-title":"http:\/\/www.ecs.csus.edu\/pc2\/","author":"Programming Contest CSUS","key":"e_1_3_2_1_7_1","unstructured":"CSUS Programming Contest Control (PC2) , http:\/\/www.ecs.csus.edu\/pc2\/ , California State University , Sacramento . CSUS Programming Contest Control (PC2), http:\/\/www.ecs.csus.edu\/pc2\/, California State University, Sacramento."},{"key":"e_1_3_2_1_8_1","volume-title":"Edurange: Meeting the pedagogical challenges of student participation in cybertraining environments. In 7th Workshop on Cyber Security Experimentation and Test (CSET 14)","author":"Boesen S.","year":"2014","unstructured":"S. Boesen , R. Weiss , J. Sullivan , M. E. Locasto , J. Mache , and E. Nilsen . Edurange: Meeting the pedagogical challenges of student participation in cybertraining environments. In 7th Workshop on Cyber Security Experimentation and Test (CSET 14) , San Diego, CA , Aug. 2014 . USENIX Association. S. Boesen, R. Weiss, J. Sullivan, M. E. Locasto, J. Mache, and E. Nilsen. Edurange: Meeting the pedagogical challenges of student participation in cybertraining environments. In 7th Workshop on Cyber Security Experimentation and Test (CSET 14), San Diego, CA, Aug. 2014. USENIX Association."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1884848.1884859"},{"key":"e_1_3_2_1_10_1","volume-title":"ACM","author":"Joint Task Force on Computing Curricula, Association for Computing Machinery (ACM) and IEEE Computer Society.","year":"2013","unstructured":"Joint Task Force on Computing Curricula, Association for Computing Machinery (ACM) and IEEE Computer Society. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science . ACM , New York, NY, USA , 2013 . Joint Task Force on Computing Curricula, Association for Computing Machinery (ACM) and IEEE Computer Society. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. ACM, New York, NY, USA, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231056"},{"key":"e_1_3_2_1_12_1","volume-title":"Ten years of ictf: The good, the bad, and the ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Vigna G.","year":"2014","unstructured":"G. Vigna , K. Borgolte , J. Corbetta , A. Doup\u00e9 , Y. Fratantonio , L. Invernizzi , D. Kirat , and Y. Shoshitaishvili . Ten years of ictf: The good, the bad, and the ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) , San Diego, CA , Aug. 2014 . USENIX Association . G. Vigna, K. Borgolte, J. Corbetta, A. Doup\u00e9, Y. Fratantonio, L. Invernizzi, D. Kirat, and Y. Shoshitaishvili. Ten years of ictf: The good, the bad, and the ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14), San Diego, CA, Aug. 2014. USENIX Association."}],"event":{"name":"SIGCSE '16: The 47th ACM Technical Symposium on Computing Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Memphis Tennessee USA","acronym":"SIGCSE '16"},"container-title":["Proceedings of the 47th ACM Technical Symposium on Computing Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2839509.2844648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2839509.2844648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:53Z","timestamp":1750225733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2839509.2844648"}},"subtitle":["Computer Security Outside of the Classroom"],"short-title":[],"issued":{"date-parts":[[2016,2,17]]},"references-count":12,"alternative-id":["10.1145\/2839509.2844648","10.1145\/2839509"],"URL":"https:\/\/doi.org\/10.1145\/2839509.2844648","relation":{},"subject":[],"published":{"date-parts":[[2016,2,17]]},"assertion":[{"value":"2016-02-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}