{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:06:51Z","timestamp":1771045611404,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:00:00Z","timestamp":1739318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,12]]},"DOI":"10.1145\/3641554.3701922","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T09:19:36Z","timestamp":1740043176000},"page":"819-825","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Practical Cybersecurity Education: A Course Model Using Experiential Learning Theory"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5377-3750","authenticated-orcid":false,"given":"Sashank","family":"Narain","sequence":"first","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8375-7823","authenticated-orcid":false,"given":"Pranathi","family":"Rayavaram","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9403-6837","authenticated-orcid":false,"given":"Christopher","family":"Morales-Gonzalez","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1749-7976","authenticated-orcid":false,"given":"Matthew","family":"Harper","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6590-1683","authenticated-orcid":false,"given":"Maryam","family":"Abbasalizadeh","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7419-8426","authenticated-orcid":false,"given":"Krishnaa","family":"Vellamchety","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2391-7789","authenticated-orcid":false,"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCN.2012.6206857"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0065"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368308.3415394"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SACI58269.2023.10158562"},{"key":"e_1_3_2_1_5_1","volume-title":"International Journal of English Language Teaching","volume":"4","author":"Boggu Anita","year":"2016","unstructured":"Anita Boggu. 2016. THE IMPACT OF EXPERIENTIAL LEARNING CYCLE ON LANGUAGE LEARNING STRATEGIES. International Journal of English Language Teaching, Vol. 4 (12 2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353--4858(06)70425-1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3286032"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91716-02"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585059.3611402"},{"key":"e_1_3_2_1_10_1","unstructured":"Easy-RSA Team. 2024. Easy-RSA Documentation. https:\/\/easy-rsa.readthedocs.io\/en\/latest\/ Accessed: 2024-07--12."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386392.3399311"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cedpsych.2013.06.001"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.56726\/irjmets32176"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2-195"},{"key":"e_1_3_2_1_15_1","unstructured":"Gordon Lyon. 2024. Nmap Network Scanning. https:\/\/nmap.org\/ Accessed: 2024-07-12."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6749"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545947.3569637"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8701960"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.28945\/4200"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2022.39802"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290511.3290524"},{"key":"e_1_3_2_1_22_1","volume-title":"Kolb","author":"Kolb Alice Y.","year":"2006","unstructured":"Alice Y. Kolb and David A. Kolb. 2006. Learning styles and learning spaces: A review of the multidisciplinary application of experiential learning theory in higher education. Learning styles and learning: A key to meeting the accountability demands in education (2006)."},{"key":"e_1_3_2_1_23_1","volume-title":"Experiential Learning: Experience as the Source of Learning and Development","author":"Kolb David A","year":"1984","unstructured":"David A Kolb. 1984. Experiential Learning: Experience as the Source of Learning and Development. Prentice Hall."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3379532"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.34190\/eccws.22.1.1145"},{"key":"e_1_3_2_1_26_1","article-title":"Docker: lightweight Linux containers for consistent development and deployment","volume":"2014","author":"Merkel Dirk","year":"2014","unstructured":"Dirk Merkel. 2014. Docker: lightweight Linux containers for consistent development and deployment. Linux Journal, Vol. 2014, 239, Article 2 (mar 2014).","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_27_1","unstructured":"Nextcloud. 2024. Nextcloud - Open source content collaboration platform. https:\/\/nextcloud.com\/about\/ Accessed: 2024-07--12."},{"key":"e_1_3_2_1_28_1","unstructured":"OpenSSH. 2024. OpenSSH. https:\/\/www.openssh.com\/. Accessed: 2024-07-12."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--30429"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179532"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2018.8340471"},{"key":"e_1_3_2_1_32_1","volume-title":"Snort: The Open Source Network Intrusion Detection System. https:\/\/www.snort.org\/ Accessed: 2024-07-12.","year":"2024","unstructured":"Snort. 2024. Snort: The Open Source Network Intrusion Detection System. https:\/\/www.snort.org\/ Accessed: 2024-07-12."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--34187"},{"key":"e_1_3_2_1_34_1","unstructured":"Chris Sullo and David Lodge. 2024. Nikto Web Scanner. https:\/\/cirt.net\/Nikto2 Version 2.5."},{"key":"e_1_3_2_1_35_1","unstructured":"Igor Sysoev. 2024. NGINX. https:\/\/nginx.org\/en\/ Accessed: 2024-07-12."},{"key":"e_1_3_2_1_36_1","unstructured":"Tenable. 2024. Nessus Vulnerability Scanner. https:\/\/www.tenable.com\/products\/nessus Accessed: 2024-07-12."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.53889\/ijses.v3i1.132"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00015"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.54"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Tatu Ylonen and Chris Lonvick. 2006. The Secure Shell (SSH) Protocol Architecture. RFC 4251. https:\/\/www.rfc-editor.org\/rfc\/rfc4251.","DOI":"10.17487\/rfc4251"}],"event":{"name":"SIGCSE TS 2025: The 56th ACM Technical Symposium on Computer Science Education","location":"Pittsburgh PA USA","acronym":"SIGCSE TS 2025","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701922","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641554.3701922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T06:29:10Z","timestamp":1755757750000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,12]]},"references-count":40,"alternative-id":["10.1145\/3641554.3701922","10.1145\/3641554"],"URL":"https:\/\/doi.org\/10.1145\/3641554.3701922","relation":{},"subject":[],"published":{"date-parts":[[2025,2,12]]},"assertion":[{"value":"2025-02-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}