{"id":"https://openalex.org/W2069844676","doi":"https://doi.org/10.1109/tridentcom.2007.4444679","title":"Configuring a Lab to Support Community-Based Security Audit Projects","display_name":"Configuring a Lab to Support Community-Based Security Audit Projects","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2069844676","doi":"https://doi.org/10.1109/tridentcom.2007.4444679","mag":"2069844676"},"language":"en","primary_location":{"id":"doi:10.1109/tridentcom.2007.4444679","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tridentcom.2007.4444679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110249845","display_name":"Andrew Holland","orcid":null},"institutions":[{"id":"https://openalex.org/I183437572","display_name":"University of Wisconsin\u2013Parkside","ror":"https://ror.org/05s9f4d27","country_code":"US","type":"education","lineage":["https://openalex.org/I183437572"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrew Holland","raw_affiliation_strings":["Computer Science, University of Wisconsin, Parkside, Kenosha, WI, USA","University of Wisconsin\u2013Parkside, Kenosha"],"affiliations":[{"raw_affiliation_string":"Computer Science, University of Wisconsin, Parkside, Kenosha, WI, USA","institution_ids":["https://openalex.org/I183437572"]},{"raw_affiliation_string":"University of Wisconsin\u2013Parkside, Kenosha","institution_ids":["https://openalex.org/I183437572"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045813880","display_name":"Susan Lincke","orcid":"https://orcid.org/0000-0002-1942-399X"},"institutions":[{"id":"https://openalex.org/I183437572","display_name":"University of Wisconsin\u2013Parkside","ror":"https://ror.org/05s9f4d27","country_code":"US","type":"education","lineage":["https://openalex.org/I183437572"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Susan J. Lincke","raw_affiliation_strings":["Computer Science, University of Wisconsin, Parkside, Kenosha, WI, USA","University of Wisconsin\u2013Parkside, Kenosha"],"affiliations":[{"raw_affiliation_string":"Computer Science, University of Wisconsin, Parkside, Kenosha, WI, USA","institution_ids":["https://openalex.org/I183437572"]},{"raw_affiliation_string":"University of Wisconsin\u2013Parkside, Kenosha","institution_ids":["https://openalex.org/I183437572"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110249845"],"corresponding_institution_ids":["https://openalex.org/I183437572"],"apc_list":null,"apc_paid":null,"fwci":0.4692,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74974678,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.8318261504173279},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7075452208518982},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.7070788741111755},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5068309903144836},{"id":"https://openalex.org/keywords/audit-trail","display_name":"Audit trail","score":0.5041376352310181},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.5032276511192322},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4793694317340851},{"id":"https://openalex.org/keywords/workstation","display_name":"Workstation","score":0.4740167260169983},{"id":"https://openalex.org/keywords/information-technology-audit","display_name":"Information technology audit","score":0.46341317892074585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41800838708877563},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3609777092933655},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.3426922559738159},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3252515494823456},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.32236891984939575},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.27778857946395874},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19389575719833374},{"id":"https://openalex.org/keywords/internal-audit","display_name":"Internal audit","score":0.14744487404823303},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.102937251329422},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08732745051383972},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.0808667242527008}],"concepts":[{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.8318261504173279},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7075452208518982},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.7070788741111755},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5068309903144836},{"id":"https://openalex.org/C80958533","wikidata":"https://www.wikidata.org/wiki/Q1047174","display_name":"Audit trail","level":3,"score":0.5041376352310181},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.5032276511192322},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4793694317340851},{"id":"https://openalex.org/C67953723","wikidata":"https://www.wikidata.org/wiki/Q192525","display_name":"Workstation","level":2,"score":0.4740167260169983},{"id":"https://openalex.org/C177309310","wikidata":"https://www.wikidata.org/wiki/Q758917","display_name":"Information technology audit","level":5,"score":0.46341317892074585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41800838708877563},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3609777092933655},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3426922559738159},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3252515494823456},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.32236891984939575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27778857946395874},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19389575719833374},{"id":"https://openalex.org/C170856484","wikidata":"https://www.wikidata.org/wiki/Q6452684","display_name":"Internal audit","level":3,"score":0.14744487404823303},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.102937251329422},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08732745051383972},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.0808667242527008},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C191602146","wikidata":"https://www.wikidata.org/wiki/Q6269489","display_name":"Joint audit","level":4,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tridentcom.2007.4444679","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tridentcom.2007.4444679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1523165607","https://openalex.org/W1655958391","https://openalex.org/W1970799258","https://openalex.org/W1979807069","https://openalex.org/W2047631121","https://openalex.org/W2117909503","https://openalex.org/W2149920540","https://openalex.org/W2294704675","https://openalex.org/W4245476264","https://openalex.org/W4249128304","https://openalex.org/W4256394779","https://openalex.org/W6637080381"],"related_works":["https://openalex.org/W2379831727","https://openalex.org/W2099785322","https://openalex.org/W2360780502","https://openalex.org/W2562041511","https://openalex.org/W2383770576","https://openalex.org/W2008551576","https://openalex.org/W2112354032","https://openalex.org/W2392777754","https://openalex.org/W3215158158","https://openalex.org/W2547664145"],"abstract_inverted_index":{"The":[0,44,95],"University":[1],"of":[2,42,93],"Wisconsin-Parkside":[3],"cyber-security":[4],"lab":[5,65,96],"is":[6,97,110],"designed":[7],"to":[8,26,85,101,119],"emphasize":[9],"training":[10],"in":[11],"network":[12,28,66],"security,":[13],"with":[14,80],"a":[15,40,120],"focus":[16],"on":[17,39],"auditing.":[18],"Audits":[19],"require":[20],"extensive":[21],"security":[22,74],"knowledge,":[23],"including":[24,68],"how":[25],"configure":[27],"equipment,":[29],"analyze":[30],"OS":[31],"configurations,":[32],"recognize":[33],"hacks,":[34],"and":[35,63,70,73,89,113],"compare":[36],"audit":[37,90,114],"results":[38],"variety":[41],"systems.":[43,94],"audits":[45],"are":[46],"taught":[47],"using":[48],"active":[49],"learning":[50,109],"labs,":[51],"but":[52,104],"implemented":[53,79],"via":[54],"community-based":[55],"learning.":[56],"This":[57],"paper":[58],"outlines":[59],"the":[60],"education":[61],"plan":[62],"describes":[64],"configuration,":[67],"server":[69],"workstation":[71],"implementations,":[72],"software.":[75],"Diverse":[76],"operating":[77],"systems,":[78],"VMware,":[81],"allow":[82,102],"for":[83],"students":[84],"simultaneously":[86],"run,":[87],"observe,":[88],"different":[91],"types":[92],"sufficiently":[98,105],"isolated":[99],"not":[100,111],"harm,":[103],"available":[106],"so":[107],"that":[108],"restricted,":[112],"tools":[115],"can":[116],"be":[117],"polled":[118],"customer":[121],"site.":[122]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
