{"id":"https://openalex.org/W2982662962","doi":"https://doi.org/10.1109/icnp.2019.8888060","title":"Powering Hands-on Cybersecurity Practices with Cloud Computing","display_name":"Powering Hands-on Cybersecurity Practices with Cloud Computing","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2982662962","doi":"https://doi.org/10.1109/icnp.2019.8888060","mag":"2982662962"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2019.8888060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100747986","display_name":"Ruipeng Zhang","orcid":"https://orcid.org/0000-0002-8180-5438"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruipeng Zhang","raw_affiliation_strings":["The University of Tennessee at Chattanooga"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee at Chattanooga","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100387708","display_name":"Chen Xu","orcid":"https://orcid.org/0000-0002-1198-4178"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen Xu","raw_affiliation_strings":["The University of Tennessee at Chattanooga"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee at Chattanooga","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048083201","display_name":"Mengjun Xie","orcid":"https://orcid.org/0000-0001-5089-9614"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mengjun Xie","raw_affiliation_strings":["The University of Tennessee at Chattanooga"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee at Chattanooga","institution_ids":["https://openalex.org/I177097968"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100747986"],"corresponding_institution_ids":["https://openalex.org/I177097968"],"apc_list":null,"apc_paid":null,"fwci":1.6958,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.88621786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8942716121673584},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7236912250518799},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6961009502410889},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6798217296600342},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.5846688747406006},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5416695475578308},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5148638486862183},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.48198264837265015},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.38649773597717285},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18491321802139282},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0844849944114685}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8942716121673584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7236912250518799},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6961009502410889},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6798217296600342},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.5846688747406006},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5416695475578308},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5148638486862183},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.48198264837265015},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38649773597717285},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18491321802139282},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0844849944114685},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp.2019.8888060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1499482908","https://openalex.org/W2026529069","https://openalex.org/W2053142757","https://openalex.org/W2093477505","https://openalex.org/W2515710585","https://openalex.org/W2757722301","https://openalex.org/W2890817412","https://openalex.org/W6629889793","https://openalex.org/W6754354322"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W4401658540"],"abstract_inverted_index":{"Cybersecurity":[0],"education":[1],"and":[2,15,24,29,80,91,102,117,125,133,139,165],"training":[3],"have":[4,26,111,129,158],"gained":[5],"increasing":[6],"attention":[7],"in":[8,86,143,149],"all":[9],"sectors":[10],"due":[11],"to":[12,31,50,62,122],"the":[13,33,137],"prevalence":[14],"quick":[16],"evolution":[17],"of":[18,22,36,83],"cyberattacks.":[19],"A":[20],"variety":[21],"platforms":[23],"systems":[25,42],"been":[27],"proposed":[28],"developed":[30,130],"accommodate":[32],"growing":[34],"needs":[35],"hands-on":[37,75,169],"cybersecurity":[38,76,170],"practice.":[39,171],"However,":[40],"those":[41],"are":[43],"either":[44],"lacking":[45],"sufficient":[46],"flexibility":[47],"(e.g.,":[48],"tied":[49],"a":[51,69],"specific":[52],"virtual":[53],"computing":[54,166],"service":[55],"provider,":[56],"little":[57],"customization":[58],"support)":[59],"or":[60,107],"difficult":[61],"scale.":[63],"In":[64],"this":[65],"work,":[66],"we":[67],"present":[68],"cloud-based":[70],"platform":[71],"named":[72],"EZSetup":[73,88,164],"for":[74,168],"practice":[77],"at":[78],"scale":[79],"our":[81,118],"experience":[82],"using":[84,136,163],"it":[85],"class.":[87],"is":[89],"customizable":[90],"cloud-agnostic.":[92],"Users":[93],"can":[94],"create":[95],"labs":[96,135,142],"through":[97],"an":[98,144],"intuitive":[99],"Web":[100],"interface":[101],"deploy":[103,126],"them":[104],"onto":[105],"one":[106],"multiple":[108],"clouds.":[109],"We":[110,128],"used":[112],"NSF":[113],"funded":[114],"Chameleon":[115],"cloud":[116,121],"private":[119],"OpenStack":[120],"develop,":[123],"test":[124],"EZSetup.":[127],"14":[131],"network":[132,146],"security":[134,147],"tool":[138],"included":[140],"six":[141],"undergraduate":[145],"course":[148],"spring":[150],"2019.":[151],"Our":[152],"survey":[153],"results":[154],"show":[155],"that":[156],"students":[157],"very":[159],"positive":[160],"feedback":[161],"on":[162],"clouds":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
