From post

An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools.

, , и . WISE, том 579 из IFIP Advances in Information and Communication Technology, стр. 61-77. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Systematic design, deployment and evaluation of gamified cybersecurity learning environments. Ionian University, Greece, (2022)National Archive of PhD Theses: oai:10442/52096.A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study., , , , , , и . PCI, стр. 328-333. ACM, (2021)A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games., , , и . TrustBus, том 13582 из Lecture Notes in Computer Science, стр. 33-49. Springer, (2022)Automated and On-Demand Cybersecurity Certification., , , , и . CSR, стр. 174-179. IEEE, (2021)NITRO: an Interconnected 5G-IoT Cyber Range., , , , , и . ARES, стр. 129:1-129:6. ACM, (2024)An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools., , и . WISE, том 579 из IFIP Advances in Information and Communication Technology, стр. 61-77. Springer, (2020)A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities., , , , и . IISA, стр. 1-6. IEEE, (2022)A Digital Twin-Based Cyber Range for SOC Analysts., , , , , и . DBSec, том 12840 из Lecture Notes in Computer Science, стр. 293-311. Springer, (2021)Game-Based Information Security/Privacy Education and Awareness: Theory and Practice., , , и . EMCIS, том 402 из Lecture Notes in Business Information Processing, стр. 509-525. Springer, (2020)AI-Powered Penetration Testing using Shennina: From Simulation to Validation., , , , , , и . ARES, стр. 169:1-169:7. ACM, (2024)