{"id":"https://openalex.org/W2005948999","doi":"https://doi.org/10.1145/1248453.1248458","title":"Laboratory experiments for network security instruction","display_name":"Laboratory experiments for network security instruction","publication_year":2006,"publication_date":"2006-12-01","ids":{"openalex":"https://openalex.org/W2005948999","doi":"https://doi.org/10.1145/1248453.1248458","mag":"2005948999"},"language":"en","primary_location":{"id":"doi:10.1145/1248453.1248458","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1248453.1248458","pdf_url":null,"source":{"id":"https://openalex.org/S4210208609","display_name":"Journal on Educational Resources in Computing","issn_l":"1531-4278","issn":["1531-4278"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal on Educational Resources in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085723324","display_name":"Jos\u00e9 Carlos Brustoloni","orcid":null},"institutions":[{"id":"https://openalex.org/I170201317","display_name":"University of Pittsburgh","ror":"https://ror.org/01an3r305","country_code":"US","type":"education","lineage":["https://openalex.org/I170201317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jos\u00e9 Carlos Brustoloni","raw_affiliation_strings":["University of Pittsburgh, Pittsburgh, Pennsylvania"],"affiliations":[{"raw_affiliation_string":"University of Pittsburgh, Pittsburgh, Pennsylvania","institution_ids":["https://openalex.org/I170201317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5085723324"],"corresponding_institution_ids":["https://openalex.org/I170201317"],"apc_list":null,"apc_paid":null,"fwci":1.9345,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.85026933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":"4","first_page":"5","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8068934679031372},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7278919816017151},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7232382297515869},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6544843912124634},{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.5789527297019958},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5481940507888794},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.5240911841392517},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.48170047998428345},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.47590264678001404},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.47237661480903625},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42988860607147217},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.42107146978378296},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2592490315437317},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18068251013755798},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12685710191726685},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11120602488517761}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8068934679031372},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7278919816017151},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7232382297515869},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6544843912124634},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.5789527297019958},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5481940507888794},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.5240911841392517},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.48170047998428345},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.47590264678001404},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.47237661480903625},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42988860607147217},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.42107146978378296},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2592490315437317},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18068251013755798},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12685710191726685},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11120602488517761},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1248453.1248458","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1248453.1248458","pdf_url":null,"source":{"id":"https://openalex.org/S4210208609","display_name":"Journal on Educational Resources in Computing","issn_l":"1531-4278","issn":["1531-4278"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal on Educational Resources in Computing","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.89.464","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.464","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.pitt.edu/~jcb/papers/jeric2006.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W74016655","https://openalex.org/W110195509","https://openalex.org/W581695378","https://openalex.org/W1485200701","https://openalex.org/W1494001678","https://openalex.org/W1508143344","https://openalex.org/W1513380209","https://openalex.org/W1518544047","https://openalex.org/W1531104082","https://openalex.org/W1561062765","https://openalex.org/W1593925121","https://openalex.org/W1638186213","https://openalex.org/W1678529581","https://openalex.org/W1733713784","https://openalex.org/W1825211960","https://openalex.org/W1949415606","https://openalex.org/W1963985030","https://openalex.org/W1970799258","https://openalex.org/W1979807069","https://openalex.org/W1996360405","https://openalex.org/W2006761539","https://openalex.org/W2011924530","https://openalex.org/W2050498734","https://openalex.org/W2066313397","https://openalex.org/W2077510895","https://openalex.org/W2091014239","https://openalex.org/W2105922461","https://openalex.org/W2107031757","https://openalex.org/W2114538687","https://openalex.org/W2117353058","https://openalex.org/W2126458319","https://openalex.org/W2133671968","https://openalex.org/W2140471436","https://openalex.org/W2149920540","https://openalex.org/W2294704675","https://openalex.org/W4232836212","https://openalex.org/W4299627282","https://openalex.org/W6616959382","https://openalex.org/W6662952212","https://openalex.org/W6676028428"],"related_works":["https://openalex.org/W2371101663","https://openalex.org/W2370638195","https://openalex.org/W2291371046","https://openalex.org/W2350672869","https://openalex.org/W2504906136","https://openalex.org/W2413322689","https://openalex.org/W2371096117","https://openalex.org/W2350433134","https://openalex.org/W2347954679","https://openalex.org/W2359171496"],"abstract_inverted_index":{"We":[0],"describe":[1],"a":[2,113,155],"sequence":[3,171],"of":[4,17,39,48,172,185],"five":[5],"experiments":[6,25,32,173,192],"on":[7,161],"network":[8],"security":[9,197],"that":[10,152,167,190],"cast":[11],"students":[12,35,90,168],"successively":[13],"in":[14,27,36,177,182],"the":[15,37,52,65,71,170,183,191],"roles":[16],"computer":[18],"user,":[19],"programmer,":[20],"and":[21,70,83,118,121,125,129,135,147,158,180],"system":[22],"administrator.":[23],"Unlike":[24],"described":[26],"several":[28],"previous":[29],"papers,":[30],"these":[31],"avoid":[33],"placing":[34],"role":[38,66],"attacker.":[40],"Each":[41],"experiment":[42,150],"starts":[43],"with":[44,96,103,174],"an":[45,49],"in-class":[46],"demonstration":[47],"attack":[50,72],"by":[51,89],"instructor.":[53],"Students":[54],"then":[55],"learn":[56],"how":[57,92,98,105,109,130],"to":[58,93,99,106,110,131],"use":[59],"open-source":[60],"defense":[61],"tools":[62],"appropriate":[63],"for":[64,195],"they":[67],"are":[68,193],"playing":[69],"at":[73],"hand.":[74],"Threats":[75],"covered":[76],"include":[77,91],"eavesdropping,":[78],"dictionary,":[79],"man-in-the-middle,":[80],"port":[81],"scanning,":[82],"fingerprinting":[84],"attacks.":[85],"Defense":[86],"skills":[87],"gained":[88],"forward":[94],"ports":[95],"OpenSSH,":[97],"prevent":[100],"weak":[101],"passwords":[102],"CrackLib,":[104],"salt":[107],"passwords,":[108],"set":[111,132],"up":[112,133],"simple":[114],"certifying":[115],"authority,":[116],"issue":[117],"verify":[119],"certificates,":[120],"guarantee":[122],"communication":[123],"confidentiality":[124],"integrity":[126],"using":[127],"OpenSSL,":[128],"firewalls":[134],"IPsec-based":[136],"virtual":[137],"private":[138],"networks.":[139],"At":[140],"two":[141],"separate":[142],"offerings,":[143],"tests":[144],"taken":[145],"before":[146],"after":[148],"each":[149,153],"showed":[151],"has":[154],"statistically":[156],"significant":[157],"large":[159],"effect":[160],"students'":[162],"learning.":[163],"Moreover,":[164],"surveys":[165],"show":[166],"finish":[169],"high":[175],"interest":[176],"further":[178],"studies":[179],"work":[181],"area":[184],"security.":[186],"These":[187],"results":[188],"suggest":[189],"well-suited":[194],"introductory":[196],"or":[198],"networking":[199],"courses.":[200]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
