Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic design, deployment and evaluation of gamified cybersecurity learning environments. Ionian University, Greece, (2022)National Archive of PhD Theses: oai:10442/52096.A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study., , , , , , and . PCI, page 328-333. ACM, (2021)A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games., , , and . TrustBus, volume 13582 of Lecture Notes in Computer Science, page 33-49. Springer, (2022)Automated and On-Demand Cybersecurity Certification., , , , and . CSR, page 174-179. IEEE, (2021)An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools., , and . WISE, volume 579 of IFIP Advances in Information and Communication Technology, page 61-77. Springer, (2020)A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities., , , , and . IISA, page 1-6. IEEE, (2022)A Digital Twin-Based Cyber Range for SOC Analysts., , , , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 293-311. Springer, (2021)Game-Based Information Security/Privacy Education and Awareness: Theory and Practice., , , and . EMCIS, volume 402 of Lecture Notes in Business Information Processing, page 509-525. Springer, (2020)Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory., , , and . ARES, page 81:1-81:8. ACM, (2022)Incident Handling for Healthcare Organizations and Supply-Chains., , , , , , , , and . ISCC, page 1-7. IEEE, (2022)