{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:29:59Z","timestamp":1740101399063,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8650-20-2-1136"],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016942","name":"Ohio Department of Higher Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016942","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1936794"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,2]]},"DOI":"10.1145\/3545945.3569761","type":"proceedings-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T23:40:27Z","timestamp":1677886827000},"page":"987-993","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Reflections of Cybersecurity Workshop for K-12 Teachers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4058-8147","authenticated-orcid":false,"given":"Chad","family":"Mourning","sequence":"first","affiliation":[{"name":"Ohio University, Athens, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3272-7020","authenticated-orcid":false,"given":"Harsha","family":"Chenji","sequence":"additional","affiliation":[{"name":"Ohio University, Athens, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7852-3464","authenticated-orcid":false,"given":"Allyson","family":"Hallman-Thrasher","sequence":"additional","affiliation":[{"name":"Ohio University, Athens, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6010-1271","authenticated-orcid":false,"given":"Savas","family":"Kaya","sequence":"additional","affiliation":[{"name":"Ohio University, Athens, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1785-1640","authenticated-orcid":false,"given":"Nasseef","family":"Abukamail","sequence":"additional","affiliation":[{"name":"Ohio University, Athens, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1656-5781","authenticated-orcid":false,"given":"David","family":"Juedes","sequence":"additional","affiliation":[{"name":"Ohio University, Athens, OH, USA"}]},{"given":"Avinash","family":"Karanth","sequence":"additional","affiliation":[{"name":"Ohio University, Athens, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/resources\/online- learning-content"},{"key":"e_1_3_2_1_2_1","unstructured":"Swarup Bhunia and Mark Tehranipoor. 2018. Hardware security: a hands-on learning approach. Morgan Kaufmann."},{"key":"e_1_3_2_1_3_1","volume-title":"Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. A Report in the Computing Curricula Series Joint Task Force on Cybersecurity Education. ACM","author":"Curricula Cybersecurity","year":"2017","unstructured":"Cybersecurity Curricula. 2017. Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. A Report in the Computing Curricula Series Joint Task Force on Cybersecurity Education. ACM, IEEE, AIS, IFIP, USA (2017)."},{"key":"e_1_3_2_1_4_1","unstructured":"Thomas Kluyver Benjamin Ragan-Kelley Fernando P\u00e9rez Brian E Granger Matthias Bussonnier Jonathan Frederic Kyle Kelley Jessica B Hamrick Jason Grout Sylvain Corlay et al. 2016. Jupyter Notebooks-a publishing format for reproducible computational workflows. Vol. 2016."},{"key":"e_1_3_2_1_5_1","volume-title":"Pentester Lab: From SQL injection to Shell. https:\/\/www.vulnhub.com\/entry\/pentester-lab-from-sql-injection-to-shell,80\/Retrieved 2021-08-11 from","author":"Lab Pentester","year":"2021","unstructured":"Pentester Lab. 2021. Pentester Lab: From SQL injection to Shell. https:\/\/www.vulnhub.com\/entry\/pentester-lab-from-sql-injection-to-shell,80\/Retrieved 2021-08-11 from"},{"key":"e_1_3_2_1_6_1","volume-title":"Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals.","author":"Markettos Theo","year":"2019","unstructured":"Theo Markettos, Colin Rothwell, Brett F Gutstein, Allison Pearce, Peter G Neumann, Simon Moore, and Robert Watson. 2019. Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals. (2019)."},{"key":"e_1_3_2_1_7_1","volume-title":"Vanstone","author":"Menezes Alfred J.","year":"1996","unstructured":"Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. 1996. Handbook of Applied Cryptography 1st edition ed.). CRC Press, Boca Raton."},{"key":"e_1_3_2_1_8_1","unstructured":"MITRE. 2021. MITRE ATT&CK\u00ae. https:\/\/attack.mitre.org\/ Retrieved 2021-08-11 from"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"e_1_3_2_1_10_1","unstructured":"Pimoroni. 2021. Enviro Plus. https:\/\/learn.pimoroni.com\/tutorial\/sandyj\/getting-started-with-enviro-plus"},{"key":"e_1_3_2_1_11_1","volume-title":"The Gold Bug. Dollar Newspaper","author":"Poe Edgar Allen","year":"1843","unstructured":"Edgar Allen Poe. 1843. The Gold Bug. Dollar Newspaper (1843)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCDL.2017.7991618"},{"key":"e_1_3_2_1_13_1","volume-title":"Threat Modeling: Designing for Security","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack. 2014. Threat Modeling: Designing for Security 1st edition ed.). Wiley, Indianapolis, IN.","edition":"1"},{"key":"e_1_3_2_1_14_1","volume-title":"Computer Security: Principles and Practice","author":"Stallings William","year":"2017","unstructured":"William Stallings and Lawrie Brown. 2017. Computer Security: Principles and Practice 4th edition ed.). Pearson, New York, NY.","edition":"4"},{"volume-title":"Raspberry Pi user guide","author":"Upton Eben","key":"e_1_3_2_1_15_1","unstructured":"Eben Upton and Gareth Halfacree. 2014. Raspberry Pi user guide. John Wiley & Sons."}],"event":{"name":"SIGCSE 2023: The 54th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Toronto ON Canada","acronym":"SIGCSE 2023"},"container-title":["Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545945.3569761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T17:21:40Z","timestamp":1709400100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545945.3569761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":15,"alternative-id":["10.1145\/3545945.3569761","10.1145\/3545945"],"URL":"https:\/\/doi.org\/10.1145\/3545945.3569761","relation":{},"subject":[],"published":{"date-parts":[[2023,3,2]]},"assertion":[{"value":"2023-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}