{"id":"https://openalex.org/W2047631121","doi":"https://doi.org/10.1145/1227310.1227472","title":"Network security auditing as a community-based learning project","display_name":"Network security auditing as a community-based learning project","publication_year":2007,"publication_date":"2007-03-07","ids":{"openalex":"https://openalex.org/W2047631121","doi":"https://doi.org/10.1145/1227310.1227472","mag":"2047631121"},"language":"en","primary_location":{"id":"doi:10.1145/1227310.1227472","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1227310.1227472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th SIGCSE technical symposium on Computer science education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045813880","display_name":"Susan Lincke","orcid":"https://orcid.org/0000-0002-1942-399X"},"institutions":[{"id":"https://openalex.org/I183437572","display_name":"University of Wisconsin\u2013Parkside","ror":"https://ror.org/05s9f4d27","country_code":"US","type":"education","lineage":["https://openalex.org/I183437572"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Susan J. Lincke","raw_affiliation_strings":["University of Wisconsin-Parkside, Kenosha, Wisconsin"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Parkside, Kenosha, Wisconsin","institution_ids":["https://openalex.org/I183437572"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5045813880"],"corresponding_institution_ids":["https://openalex.org/I183437572"],"apc_list":null,"apc_paid":null,"fwci":1.5824,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.88526997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"476","last_page":"480"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13034","display_name":"Information Systems Education and Curriculum Development","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9355000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.8308887481689453},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.6580323576927185},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6193923354148865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5365550518035889},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5225245952606201},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5196551084518433},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5191578269004822},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4708152413368225},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45056501030921936},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4404951333999634},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.43499141931533813},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.4127180874347687},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2964823842048645},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.21922290325164795},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.200873464345932},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16214203834533691},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.12923070788383484}],"concepts":[{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.8308887481689453},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.6580323576927185},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6193923354148865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5365550518035889},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5225245952606201},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5196551084518433},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5191578269004822},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4708152413368225},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45056501030921936},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4404951333999634},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.43499141931533813},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.4127180874347687},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2964823842048645},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.21922290325164795},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.200873464345932},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16214203834533691},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.12923070788383484},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1227310.1227472","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1227310.1227472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th SIGCSE technical symposium on Computer science education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1525451939","https://openalex.org/W1970799258","https://openalex.org/W2040257868","https://openalex.org/W2117909503","https://openalex.org/W4245476264"],"related_works":["https://openalex.org/W4386208045","https://openalex.org/W4235956733","https://openalex.org/W2497647994","https://openalex.org/W4226413107","https://openalex.org/W4248680916","https://openalex.org/W2584162156","https://openalex.org/W1991422097","https://openalex.org/W1956752644","https://openalex.org/W2741061559","https://openalex.org/W2393695651"],"abstract_inverted_index":{"Security":[0],"courses":[1],"can":[2],"focus":[3],"on":[4],"encryption/authentication":[5],"algorithm":[6],"design,":[7],"attack/defend":[8],"methodologies,":[9],"or":[10],"security":[11,66],"techniques.":[12],"Our":[13],"goal":[14],"is":[15,55],"to":[16,22,29,62],"train":[17],"computer":[18],"personnel":[19],"in":[20,57,65,81],"how":[21],"secure":[23],"networks.":[24],"What":[25],"better":[26],"way":[27],"than":[28],"work":[30],"with":[31],"real":[32,35],"equipment":[33],"and":[34,59,71],"organizations?":[36],"This":[37,76],"course":[38],"includes":[39],"a":[40,49],"community-based":[41,83],"project":[42],"which":[43],"involves":[44],"students":[45,61],"auditing":[46,69],"part":[47],"of":[48,74],"syst":[50],"for":[51],"local":[52],"organizations.":[53],"Auditing":[54],"common":[56],"industry,":[58],"requires":[60],"be":[63],"well-versed":[64],"techniques,":[67],"the":[68,72,87],"process,":[70],"application":[73],"results.":[75],"paper":[77],"outlines":[78],"our":[79],"experiences":[80],"bringing":[82],"audit":[84],"projects":[85],"into":[86],"classroom.":[88]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
