{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:09Z","timestamp":1755780009148,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Undergraduate Teaching Quality Enhancement Program Project of Anhui Polytechnic University","award":["No. 2022SZYZK59, 2022JYXM38"],"award-info":[{"award-number":["No. 2022SZYZK59, 2022JYXM38"]}]},{"name":"the Advanced Research Project of Anhui Polytechnic University","award":["No. XJKY2020119, XJKY2020122"],"award-info":[{"award-number":["No. XJKY2020119, XJKY2020122"]}]},{"name":"the Research Start-up Fund for Talent Introduction of Anhui Polytechnic University","award":["No. 2020YQQ062"],"award-info":[{"award-number":["No. 2020YQQ062"]}]},{"name":"Provincial Natural Science Foundation of Anhui","award":["No. 2108085QF264, 2108085QF268"],"award-info":[{"award-number":["No. 2108085QF264, 2108085QF268"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3660043.3660165","type":"proceedings-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T10:18:07Z","timestamp":1717064287000},"page":"684-690","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Innovative Teaching Approach for Information Security: Improving Students' Practical and High-Level Skills by Using Ubiquitous Learning and Competition: Enhancing Students' Information Security Skills through Ubiquitous Learning and Competition"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6308-1114","authenticated-orcid":false,"given":"Xianglin","family":"Bao","sequence":"first","affiliation":[{"name":"School of Computer and Information, Anhui Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3674-199X","authenticated-orcid":false,"given":"Xiaofeng","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7620-9572","authenticated-orcid":false,"given":"Tao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4768-6399","authenticated-orcid":false,"given":"Sanmin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0397-5057","authenticated-orcid":false,"given":"Wenhan","family":"Li","sequence":"additional","affiliation":[{"name":"Wuhu Xiangyi Software Technology Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8378-1978","authenticated-orcid":false,"given":"Yuehong","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Polytechnic University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.52810\/TC.2021.100020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2013.2282285"},{"volume-title":"Using computer virtualization and software tools to implement a low cost laboratory for the teaching of storage area networks","author":"\u0131a J.","key":"e_1_3_2_1_3_1","unstructured":"J. Garc \u0301 \u0131a and J. Entrialgo, \u201cUsing computer virtualization and software tools to implement a low cost laboratory for the teaching of storage area networks,\u201d computer applications in engineering education , vol. 23, no. 5, pp. 715\u2013723, 2015."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.18488\/journal.61.2018.64.253.270"},{"key":"e_1_3_2_1_5_1","first-page":"5","volume-title":"conference (fie) . IEEE","author":"Hu X.","year":"2018","unstructured":"X. Hu, H. Le, A. G. Bourgeois, and Y. Pan, \u201cCollaborative learning in cloud-based virtual computer labs,\u201d in 2018 ieee frontiers in education conference (fie) . IEEE, 2018, pp. 1\u20135."},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"51","article-title":"Cyber security teaching and learning laboratories: A survey","volume":"35","author":"Topham L.","year":"2016","unstructured":"L. Topham, K. Kifayat, Y. A. Younis, Q. Shi, and B. Askwith, \u201cCyber security teaching and learning laboratories: A survey,\u201d Information & Security , vol. 35, no. 1, p. 51, 2016.","journal-title":"Information & Security"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274062"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888060"},{"key":"e_1_3_2_1_9_1","first-page":"230","volume-title":"Proceedings of the Linux symposium","volume":"1","author":"Kivity A.","year":"2007","unstructured":"A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori, \u201ckvm: the linux virtual machine monitor,\u201d in Proceedings of the Linux symposium , vol. 1, no. 8. Dttawa, Dntorio, Canada, 2007, pp. 225\u2013230."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium","author":"Trickel E.","year":"2017","unstructured":"E. Trickel, F. Disperati, E. Gustafson, F. Kalantari, M. Mabey, N. Tiwari, Y. Safaei, A. Doup \u0301 e, and G. Vigna, \u201cShell we play a game? ctf-as-a-service for security education.\u201d in ASE@ USENIX Security Symposium, 2017."}],"event":{"name":"ICIEAI 2023: 2023 International Conference on Information Education and Artificial Intelligence","acronym":"ICIEAI 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660043.3660165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:18:24Z","timestamp":1755778704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":10,"alternative-id":["10.1145\/3660043.3660165","10.1145\/3660043"],"URL":"https:\/\/doi.org\/10.1145\/3660043.3660165","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}