{"id":"https://openalex.org/W2216743866","doi":"https://doi.org/10.1145/1656255.1656258","title":"Visualization Tools for Teaching Computer Security","display_name":"Visualization Tools for Teaching Computer Security","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2216743866","doi":"https://doi.org/10.1145/1656255.1656258","mag":"2216743866"},"language":"en","primary_location":{"id":"doi:10.1145/1656255.1656258","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1656255.1656258","pdf_url":null,"source":{"id":"https://openalex.org/S2764465379","display_name":"ACM Transactions on Computing Education","issn_l":"1946-6226","issn":["1946-6226"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Computing Education","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078766422","display_name":"Xiaohong Yuan","orcid":"https://orcid.org/0000-0002-1295-9812"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiaohong Yuan","raw_affiliation_strings":["North Carolina A&amp;T State University"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007068742","display_name":"Percy Vega","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Percy Vega","raw_affiliation_strings":["North Carolina A&amp;T State University"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065175412","display_name":"Yaseen Qadah","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yaseen Qadah","raw_affiliation_strings":["North Carolina A&amp;T State University"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037231381","display_name":"Ricky Archer","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ricky Archer","raw_affiliation_strings":["North Carolina A&amp;T State University"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103515983","display_name":"Huiming Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huiming Yu","raw_affiliation_strings":["North Carolina A&amp;T State University"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100949006","display_name":"Jinsheng Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinsheng Xu","raw_affiliation_strings":["North Carolina A&amp;T State University"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University","institution_ids":["https://openalex.org/I35777872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5078766422"],"corresponding_institution_ids":["https://openalex.org/I35777872"],"apc_list":null,"apc_paid":null,"fwci":4.6707,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.95593544,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"4","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9470999836921692,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11283","display_name":"Experimental Learning in Engineering","score":0.9332000017166138,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8276232481002808},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6353607177734375},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.5261030793190002},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5161300897598267},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4868849813938141},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4810769557952881},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4405219256877899},{"id":"https://openalex.org/keywords/animation","display_name":"Animation","score":0.43450629711151123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18999367952346802},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.09952831268310547}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8276232481002808},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6353607177734375},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.5261030793190002},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5161300897598267},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4868849813938141},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4810769557952881},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4405219256877899},{"id":"https://openalex.org/C502989409","wikidata":"https://www.wikidata.org/wiki/Q11425","display_name":"Animation","level":2,"score":0.43450629711151123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18999367952346802},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.09952831268310547},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1656255.1656258","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1656255.1656258","pdf_url":null,"source":{"id":"https://openalex.org/S2764465379","display_name":"ACM Transactions on Computing Education","issn_l":"1946-6226","issn":["1946-6226"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Computing Education","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[{"id":"https://openalex.org/G1420215221","display_name":null,"funder_award_id":"DUE-0415571DUE-0723491","funder_id":"https://openalex.org/F4320337408","funder_display_name":"Division of Undergraduate Education"}],"funders":[{"id":"https://openalex.org/F4320337408","display_name":"Division of Undergraduate Education","ror":"https://ror.org/02kd4km72"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W329998640","https://openalex.org/W1521567421","https://openalex.org/W1583788159","https://openalex.org/W1597982698","https://openalex.org/W1963985030","https://openalex.org/W1971094374","https://openalex.org/W2001057265","https://openalex.org/W2005989158","https://openalex.org/W2011924530","https://openalex.org/W2034745976","https://openalex.org/W2044315278","https://openalex.org/W2067394485","https://openalex.org/W2072561403","https://openalex.org/W2114538687","https://openalex.org/W2118689744","https://openalex.org/W2138231095","https://openalex.org/W2146323809","https://openalex.org/W2146749986","https://openalex.org/W2150930945","https://openalex.org/W2155878676","https://openalex.org/W2337655059","https://openalex.org/W2406872628","https://openalex.org/W3170819194","https://openalex.org/W4206509225","https://openalex.org/W4232996385","https://openalex.org/W4254118410","https://openalex.org/W4300978744","https://openalex.org/W4301972031","https://openalex.org/W6611465443","https://openalex.org/W6631228100"],"related_works":["https://openalex.org/W4310844315","https://openalex.org/W2532377291","https://openalex.org/W2000013817","https://openalex.org/W2068608913","https://openalex.org/W4296190881","https://openalex.org/W3124914020","https://openalex.org/W2366362996","https://openalex.org/W2517624617","https://openalex.org/W2378422373","https://openalex.org/W2129566390"],"abstract_inverted_index":{"Using":[0],"animated":[1],"visualization":[2,18,79],"tools":[3,21,54,80,110],"has":[4],"been":[5,112],"an":[6],"important":[7],"teaching":[8],"approach":[9],"in":[10,86,114],"computer":[11,42,89,116],"science":[12],"education.":[13],"We":[14],"have":[15,111,129],"developed":[16],"three":[17],"and":[19,28,40,49,91,118,128],"animation":[20],"that":[22],"demonstrate":[23],"various":[24,115],"information":[25,33,119],"security":[26,34,92,120],"concepts":[27,35],"actively":[29],"engage":[30],"learners.":[31],"The":[32,63],"illustrated":[36],"include:":[37],"packet":[38],"sniffer":[39],"related":[41],"network":[43,51,90,117],"concepts,":[44],"the":[45,134],"Kerberos":[46],"authentication":[47],"architecture,":[48],"wireless":[50],"attacks.":[52],"These":[53,78,109],"are":[55,81],"implemented":[56],"using":[57],"Macromedia":[58],"Flash":[59,72],"MX":[60],"Professional":[61],"Edition.":[62],"animations":[64],"can":[65,95],"run":[66],"from":[67,133],"a":[68],"Web":[69],"page":[70],"as":[71,75,98],"Applets":[73],"or":[74,104],"standalone":[76],"applications.":[77],"intended":[82],"to":[83],"be":[84,96],"used":[85,97,113],"undergraduate":[87],"level":[88],"courses.":[93],"They":[94],"classroom":[99],"instructor":[100],"demos,":[101],"student":[102,106],"exercises,":[103],"Web-based":[105],"learning":[107],"resources.":[108],"courses":[121],"at":[122],"North":[123],"Carolina":[124],"A&amp;T":[125],"State":[126],"University,":[127],"received":[130],"positive":[131],"feedback":[132],"students.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
