{"id":"https://openalex.org/W2726481556","doi":"https://doi.org/10.1145/3059009.3072982","title":"Building a Secure Hacking Lab in a Small University","display_name":"Building a Secure Hacking Lab in a Small University","publication_year":2017,"publication_date":"2017-06-28","ids":{"openalex":"https://openalex.org/W2726481556","doi":"https://doi.org/10.1145/3059009.3072982","mag":"2726481556"},"language":"en","primary_location":{"id":"doi:10.1145/3059009.3072982","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3059009.3072982","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034208426","display_name":"N. V. R. Mahadev","orcid":null},"institutions":[{"id":"https://openalex.org/I5429594","display_name":"Fitchburg State University","ror":"https://ror.org/031tt0491","country_code":"US","type":"education","lineage":["https://openalex.org/I5429594"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nadimpalli Mahadev","raw_affiliation_strings":["Fitchburg State University, Fitchburg, MA, USA"],"affiliations":[{"raw_affiliation_string":"Fitchburg State University, Fitchburg, MA, USA","institution_ids":["https://openalex.org/I5429594"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5034208426"],"corresponding_institution_ids":["https://openalex.org/I5429594"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.10162022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"371","last_page":"371"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9524999856948853,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.9768860340118408},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6592796444892883},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5994482636451721},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49112173914909363},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4847642779350281},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46602511405944824},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2654215097427368}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.9768860340118408},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6592796444892883},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5994482636451721},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49112173914909363},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4847642779350281},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46602511405944824},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2654215097427368}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3059009.3072982","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3059009.3072982","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2267590236"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W2725637128","https://openalex.org/W2897593657","https://openalex.org/W2294330327","https://openalex.org/W3006507989","https://openalex.org/W4251184983","https://openalex.org/W2371430952","https://openalex.org/W2381740503","https://openalex.org/W2360633292"],"abstract_inverted_index":{"Ethical":[0],"Hacking":[1],"is":[2,16,61],"an":[3],"important":[4],"course":[5,33],"in":[6,71],"any":[7],"cyber":[8],"security":[9,57],"program.":[10],"The":[11,32,59],"objective":[12],"of":[13,74],"ethical":[14],"hacking":[15,27,36,52,75,81],"to":[17,62,69,102],"test":[18],"a":[19,35,86,106],"given":[20],"network":[21],"for":[22,51],"possible":[23],"vulnerabilities":[24],"through":[25,42],"authorized":[26],"and":[28,48,53],"report":[29],"the":[30,65,91],"findings.":[31],"requires":[34],"lab":[37,92],"where":[38],"students":[39,66],"can":[40],"learn":[41],"hands":[43],"on":[44],"experience":[45],"various":[46],"tools":[47],"techniques":[49],"used":[50],"gain":[54],"insight":[55],"into":[56,82],"fundamentals.":[58],"challenge":[60],"ensure":[63],"that":[64],"have":[67],"access":[68],"Internet":[70],"some":[72],"stages":[73],"but":[76],"are":[77],"prevented":[78],"from":[79],"accidentally":[80],"unauthorized":[83],"systems.":[84],"In":[85],"small":[87],"university":[88],"like":[89],"ours,":[90],"must":[93],"also":[94],"be":[95],"cost-effective.":[96],"We":[97],"present":[98],"here":[99],"our":[100],"approach":[101],"setting":[103],"up":[104],"such":[105],"lab.":[107]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
