{"id":"https://openalex.org/W2071158459","doi":"https://doi.org/10.1145/2676723.2677225","title":"A Simple Laboratory Environment for Real-World Offensive Security Education","display_name":"A Simple Laboratory Environment for Real-World Offensive Security Education","publication_year":2015,"publication_date":"2015-02-24","ids":{"openalex":"https://openalex.org/W2071158459","doi":"https://doi.org/10.1145/2676723.2677225","mag":"2071158459"},"language":"en","primary_location":{"id":"doi:10.1145/2676723.2677225","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676723.2677225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027492061","display_name":"Maxim Timchenko","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Maxim Timchenko","raw_affiliation_strings":["Boston University, Boston, MA, USA","Boston University , Boston , MA , USA"],"affiliations":[{"raw_affiliation_string":"Boston University, Boston, MA, USA","institution_ids":[]},{"raw_affiliation_string":"Boston University , Boston , MA , USA","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011231717","display_name":"David Starobinski","orcid":"https://orcid.org/0000-0002-8071-3865"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Starobinski","raw_affiliation_strings":["Boston University, Boston, MA, USA","Boston University , Boston , MA , USA"],"affiliations":[{"raw_affiliation_string":"Boston University, Boston, MA, USA","institution_ids":[]},{"raw_affiliation_string":"Boston University , Boston , MA , USA","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027492061"],"corresponding_institution_ids":["https://openalex.org/I111088046"],"apc_list":null,"apc_paid":null,"fwci":1.1488,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.78743004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"657","last_page":"662"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.8195788860321045},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.742874264717102},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.7322911024093628},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7025497555732727},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.6733555197715759},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6285772919654846},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5966580510139465},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5523161888122559},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4839820861816406},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4552724063396454},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3838830888271332},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.3655654788017273},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2559654116630554},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25557059049606323},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21173086762428284},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.13723939657211304}],"concepts":[{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.8195788860321045},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.742874264717102},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.7322911024093628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7025497555732727},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.6733555197715759},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6285772919654846},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5966580510139465},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5523161888122559},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4839820861816406},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4552724063396454},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3838830888271332},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3655654788017273},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2559654116630554},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25557059049606323},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21173086762428284},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.13723939657211304},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2676723.2677225","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676723.2677225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G455446024","display_name":null,"funder_award_id":"CNS-1012910, CNS-1409053","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1976281568","https://openalex.org/W1989671526","https://openalex.org/W2031251374","https://openalex.org/W2078891974","https://openalex.org/W2118350594","https://openalex.org/W2308033362","https://openalex.org/W2903958740","https://openalex.org/W4400539460"],"related_works":["https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W4287020359","https://openalex.org/W3213194066","https://openalex.org/W268355439","https://openalex.org/W2967125893","https://openalex.org/W4385323698","https://openalex.org/W2385362579","https://openalex.org/W2380993274"],"abstract_inverted_index":{"In":[0,60],"recent":[1],"years":[2],"cybersecurity":[3,35],"has":[4,52],"gained":[5],"prominence":[6],"as":[7],"a":[8,34,65,81,104],"field":[9],"of":[10,27,84,96,103,121],"expertise":[11],"and":[12,25,43,124],"the":[13,23,49,97,101],"relevant":[14],"practical":[15],"skills":[16],"are":[17],"in":[18,55],"high":[19],"demand.":[20],"To":[21],"reduce":[22],"cost":[24],"amount":[26],"dedicated":[28],"hardware":[29],"required":[30],"to":[31,37,99],"set":[32,83],"up":[33],"lab":[36,85,115,122],"teach":[38],"those":[39],"skills,":[40],"several":[41],"virtualization":[42],"outsourcing":[44],"approaches":[45],"were":[46],"developed":[47,87],"but":[48],"resulting":[50],"setup":[51,72,90],"often":[53],"increased":[54],"total":[56],"complexity,":[57],"hampering":[58],"adoption.":[59],"this":[61,89],"paper":[62],"we":[63],"present":[64,125],"very":[66],"simple":[67],"(and":[68],"therefore":[69],"highly":[70],"scalable)":[71],"that":[73,91],"incorporates":[74],"state-of-the-art":[75],"industry":[76],"tools.":[77],"We":[78,112],"also":[79],"describe":[80],"structured":[82],"assignments":[86,123],"for":[88,128],"build":[92],"one":[93],"on":[94],"top":[95],"other":[98,118],"cover":[100],"material":[102],"semester-long":[105],"Cybersecurity":[106],"course":[107],"taught":[108],"at":[109],"Boston":[110],"University.":[111],"explore":[113],"alternative":[114],"architectures,":[116],"discuss":[117],"existing":[119],"sets":[120],"some":[126],"ideas":[127],"further":[129],"improvement.":[130]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
