References
- Anantapadmanabhan, V., Frankl, P., Memon, N., & Naumovich, G. (2003). Design of a laboratory for information security education. In C. Irvine & H. Armstrong (Eds.), Security Education and Critical Infrastructures (pp. 61–73). Norwell, MA: Kluwer Academic Publishers.
- Anderson, R. J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Indianapolis, IN: Wiley Publishing.
- CERT (2016). CERT STEPfwd. Retrieved December 2, 2016, from http://stepfwd.cert.org/lms
- Chess, D., & White, S. (2000). An undetectable computer virus. Proceedings of the Virus Bulletin Conference 2000, Orlando, FL.
- Chinnow, J., Bye, R., Schmidt, S., Bsufka, K., Camtepe, S. A., & Albayrak, S. (2009). An Extensible Simulation Framework for Critical Infrastructure Security (Technical Report TUB-DAI 09/09-01, DAI-Labor). Berlin: Technische Universität. Retrieved from http://www.dai-labor.de/fileadmin/files/publications/TRNessi20909-1.pdf
- Cohen, F. (1987). Computer viruses. Computer Security, 6, 22–35.
- Gaffer, S., & Daniyal, A. (2012). Using virtual security lab in teaching cryptography. Modern Education and Computer Science, 1, 26–32.
- Google Developers (2016). Protocol buffers. Retrieved December 3, 2016, from https://developers.google.com/protocol-buffers/
- Hirstein, W., & Ramachandran, V. (1997). Capgras syndrome: A novel probe for understanding the neural representation of the identity and familiarity of person. Proceedings of the Royal Society of London. Series B: Biological Sciences (Vol. 264, pp. 437–444). London: The Royal Society.
- Joncheray, L. (1995). A simple active attack against tcp. Proceedings of the 5th Conference on USENIX UNIX Security Symposium. SSYM’95 (Vol. 5, pp. 2–2). Berkeley, CA, USA: USENIX Association.
- Leveson, N. G. (1993). An investigation of the therac-25 accidents. IEEE Computer, 26, 18–41.
- Lewis, J., & Lunsford, P. (2010). Tls man-in-the-middle laboratory exercise for network security education. Proceedings of the 2010 ACM Conference on Information Technology Education, SIGITE ’10 (pp. 117–120). ACM: New York, NY, USA.
- Liljenstam, M., Liu, J., Nicol, D., Yuan, Y., Yan, G., & Grier, C. (2005). RINSE: The real-time immersive network simulation environment for network security exercises. Proceedings -- Workshop on Principles of Advanced and Distributed Simulation, PADS (pp. 119–128). Monterey, CA: IEEE Computer Society.
- Marsá-Maestre, I., de la Hoz, E., Giménez-Guzmán, J. M., & López-Carmona, M. A. (2013). Design and evaluation of a learning environment to effectively provide network security skills. Computers & Education, 69, 225–236.
- Papanikolaou, A., Karakoidas, V., Vlachos, V., Venieris, A., Ilioudis, C., & Zouganelis, G. (2011). A hacker’s perspective on educating future security experts. 15th Panhellenic Conference on Informatics with international participation (PCI 2011) (pp. 68–72). Kastoria, Greece.
- Postel, J. (1981). RFC 791: Internet Protocol. Retrieved from https://tools.ietf.org/html/rfc791
- Saha, A. (2012). Parallel pi approximation algorithm. Retrieved December 4, 2013, from https://gist.github.com/amitsaha/2036026
- Schneier, B. (2000). Semantic attacks: The third wave of network attacks. Retrieved from https://www.schneier.com/crypto-gram/archives/2000/1015.html#1
- Standard, S., Greenlaw, R., Phillips, A., Stahl, D., & Schultz, J. (2013). Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course. ACM Inroads, 4, 52–64.
- The PyPy Project (2016). Pypy’s sandboxing features. Retreived December 3, 2016, from http://doc.pypy.org/en/latest/sandbox.html
- Thompson, K. (1984). Reflections on trusting trust. Commun. ACM, 27, 761–763.
- Trabelsi, Z. (2012). Switch’s cam table poisoning attack: Hands-on lab exercises for network security education. Proceedings of the Fourteenth Australasian Computing Education Conference. ACE ’12 (Vol. 123, pp. 113–120). Darlinghurst, Australia: Australian Computer Society Inc.
- Turing, A. M. (1936). On computable numbers, with an application to the Entscheidungsproblem. Proceedings of the London Mathematical Society, 2, 230–265.
- Twisted Matrix Labs (2016). What is twisted?. Retrieved December 3, 2016, from https://twistedmatrix.com/trac/
- Werther, J., Zhivich, M., Leek, T., & Zeldovich, N. (2011). Experiences in cyber security education: The mit lincoln laboratory capture-the-flag exercise. Proceedings of the 4th Conference on Cyber Security Experimentation and Test, CSET’11 (pp. 12–12). Berkeley, CA, USA: USENIX Association.