{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:36Z","timestamp":1750308636921,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,21]],"date-time":"2018-02-21T00:00:00Z","timestamp":1519171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,21]]},"DOI":"10.1145\/3159450.3159489","type":"proceedings-article","created":{"date-parts":[[2018,2,21]],"date-time":"2018-02-21T16:46:16Z","timestamp":1519231576000},"page":"179-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities"],"prefix":"10.1145","author":[{"given":"Muhammad Rizwan","family":"Asghar","sequence":"first","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"given":"Andrew","family":"Luxton-Reilly","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2018,2,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083004"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"45","article-title":"Constructivism in computer science education","volume":"20","author":"Ben-Ari M.","year":"2001","unstructured":"M. Ben-Ari . Constructivism in computer science education . Journal of Computers in Mathematics and Science Teaching , 20 ( 1 ): 45 -- 73 , 2001 . M. Ben-Ari. Constructivism in computer science education. Journal of Computers in Mathematics and Science Teaching, 20(1):45--73, 2001.","journal-title":"Journal of Computers in Mathematics and Science Teaching"},{"key":"e_1_3_2_1_3_1","volume-title":"USA","author":"Cassel L.","year":"2008","unstructured":"L. Cassel , A. Clements , G. Davies , M. Guzdial , R. McCauley , A. McGettrick , B. Sloan , L. Snyder , P. Tymann , and B. W. Weide . Computer science curriculum 2008: An interim revision of cs 2001. Technical report, New York, NY , USA , 2008 . L. Cassel, A. Clements, G. Davies, M. Guzdial, R. McCauley, A. McGettrick, B. Sloan, L. Snyder, P. Tymann, and B. W. Weide. Computer science curriculum 2008: An interim revision of cs 2001. Technical report, New York, NY, USA, 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107627"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.51"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157202"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512276.2512301"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563446"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1473195.1473242"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411732.1411734"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677268"},{"key":"e_1_3_2_1_12_1","volume-title":"ACM","author":"A.","year":"2013","unstructured":"A. f. C. M. A. Joint Task Force on Computing Curricula and I. C. Society. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science . ACM , New York, NY, USA , 2013 . 999133. A. f. C. M. A. Joint Task Force on Computing Curricula and I. C. Society. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. ACM, New York, NY, USA, 2013. 999133."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2077808.2077826"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067445.1067451"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231056"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140124.1140141"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543050002315"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543068003249"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01443410500345172"},{"key":"e_1_3_2_1_20_1","volume-title":"Ten years of ictf: The good, the bad, and the ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Vigna G.","year":"2014","unstructured":"G. Vigna , K. Borgolte , J. Corbetta , A. Doup\u00e9 , Y. Fratantonio , L. Invernizzi , D. Kirat , and Y. Shoshitaishvili . Ten years of ictf: The good, the bad, and the ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) , San Diego, CA , 2014 . USENIX Association . G. Vigna, K. Borgolte, J. Corbetta, A. Doup\u00e9, Y. Fratantonio, L. Invernizzi, D. Kirat, and Y. Shoshitaishvili. Ten years of ictf: The good, the bad, and the ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14), San Diego, CA, 2014. USENIX Association."},{"key":"e_1_3_2_1_21_1","volume-title":"Harvard University Press","author":"Vygotsky L. S.","year":"1978","unstructured":"L. S. Vygotsky . Mind in Society . Harvard University Press , Cambridge, MA , 1978 . L. S. Vygotsky. Mind in Society. Harvard University Press, Cambridge, MA, 1978."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456625.1456627"}],"event":{"name":"SIGCSE '18: The 49th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Baltimore Maryland USA","acronym":"SIGCSE '18"},"container-title":["Proceedings of the 49th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3159450.3159489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3159450.3159489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:08:06Z","timestamp":1750273686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3159450.3159489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,21]]},"references-count":22,"alternative-id":["10.1145\/3159450.3159489","10.1145\/3159450"],"URL":"https:\/\/doi.org\/10.1145\/3159450.3159489","relation":{},"subject":[],"published":{"date-parts":[[2018,2,21]]},"assertion":[{"value":"2018-02-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}