{"id":"https://openalex.org/W2058318920","doi":"https://doi.org/10.1145/2676723.2678290","title":"SEED Labs","display_name":"SEED Labs","publication_year":2015,"publication_date":"2015-02-24","ids":{"openalex":"https://openalex.org/W2058318920","doi":"https://doi.org/10.1145/2676723.2678290","mag":"2058318920"},"language":"en","primary_location":{"id":"doi:10.1145/2676723.2678290","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676723.2678290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047825382","display_name":"Wenliang Du","orcid":"https://orcid.org/0000-0002-9234-0912"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wenliang Du","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5047825382"],"corresponding_institution_ids":["https://openalex.org/I70983195"],"apc_list":null,"apc_paid":null,"fwci":0.8115,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81045995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"704","last_page":"704"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9541000127792358,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9251000285148621,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/laptop","display_name":"Laptop","score":0.6960646510124207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6356890201568604},{"id":"https://openalex.org/keywords/computer-lab","display_name":"Computer lab","score":0.49159011244773865},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.48463115096092224},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4697912931442261},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46437186002731323},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4275878965854645},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4242587089538574},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.41899383068084717},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.41785967350006104},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.4165412187576294},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.41211533546447754},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3916247487068176},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.33111488819122314},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2673609256744385},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24454954266548157},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15791624784469604}],"concepts":[{"id":"https://openalex.org/C2780008327","wikidata":"https://www.wikidata.org/wiki/Q3962","display_name":"Laptop","level":2,"score":0.6960646510124207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6356890201568604},{"id":"https://openalex.org/C2777145589","wikidata":"https://www.wikidata.org/wiki/Q4130071","display_name":"Computer lab","level":2,"score":0.49159011244773865},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.48463115096092224},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4697912931442261},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46437186002731323},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4275878965854645},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4242587089538574},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.41899383068084717},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.41785967350006104},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.4165412187576294},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.41211533546447754},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3916247487068176},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.33111488819122314},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2673609256744385},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24454954266548157},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15791624784469604},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2676723.2678290","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2676723.2678290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th ACM Technical Symposium on Computer Science Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.44999998807907104,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2145285432","https://openalex.org/W3129953142","https://openalex.org/W2048218368","https://openalex.org/W3009708860","https://openalex.org/W2101626060","https://openalex.org/W1553472162","https://openalex.org/W2185947721","https://openalex.org/W2767521770","https://openalex.org/W2613586557","https://openalex.org/W3174444035"],"abstract_inverted_index":{"Security":[0],"courses":[1],"have":[2,32,151],"been":[3,133,152],"integrated":[4],"into":[5],"many":[6],"mainstream":[7],"undergraduate":[8],"and":[9,127,184],"graduate":[10],"computer":[11,39,98],"science":[12],"curricula.":[13],"To":[14],"achieve":[15],"effective":[16],"education,":[17],"learning":[18],"security":[19,40,53],"principles":[20],"must":[21],"be":[22,85,100],"grounded":[23],"in":[24,122,158,193,222],"experience.":[25],"Over":[26],"the":[27,80,123,169,186,194],"last":[28],"12":[29],"years,":[30],"we":[31,164],"developed":[33],"30":[34,159],"hands-on":[35],"lab":[36],"exercises":[37],"for":[38,114],"education.":[41],"These":[42,71],"labs,":[43,108,173,183],"called":[44],"SEED":[45,130,149,172,212],"labs":[46,72,124,150,192,213],"(SEcurity":[47],"EDucation),":[48],"cover":[49],"a":[50,76,96,115,140],"variety":[51],"of":[52,82,143,168],"topics,":[54],"including":[55],"vulnerabilities,":[56],"attacks,":[57],"software":[58,120],"security,":[59,61,63,65],"system":[60],"network":[62],"web":[64,89],"access":[66],"control,":[67],"authentication,":[68],"cryptography,":[69],"etc.":[70],"are":[73,197],"built":[74],"upon":[75],"Linux":[77],"virtual":[78],"machine,":[79],"image":[81],"which":[83],"can":[84,214],"downloaded":[86],"from":[87],"our":[88,218],"site.":[90],"Students":[91],"just":[92],"need":[93,113],"to":[94,104,188,199,207,216],"use":[95],"single":[97],"(can":[99],"their":[101,201],"own":[102,202],"laptop)":[103],"work":[105,189],"on":[106,190],"these":[107,191],"so":[109],"there":[110],"is":[111,125],"no":[112],"dedicated":[116],"physical":[117],"laboratory.":[118],"All":[119],"used":[121,153],"open-source":[126],"free.":[128],"The":[129],"project":[131],"has":[132],"funded":[134],"by":[135,154],"3":[136],"NSF":[137],"grants":[138],"with":[139,210],"total":[141],"budget":[142],"1.3":[144],"million":[145],"dollars.":[146],"So":[147],"far,":[148],"over":[155],"250":[156],"institutes":[157],"countries.":[160],"In":[161],"this":[162],"workshop,":[163],"will":[165,179],"select":[166,181],"some":[167],"most":[170],"popular":[171],"demonstrate":[174],"how":[175],"they":[176],"work.":[177],"We":[178],"then":[180],"three":[182],"guide":[185],"participants":[187],"workshop.":[195],"Participants":[196,204],"expected":[198],"bring":[200],"laptops.":[203],"who":[205],"want":[206],"gain":[208],"experiences":[209],"more":[211],"apply":[215],"attend":[217],"free":[219],"3-day":[220],"workshop":[221],"June.":[223]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
