Publisher
Springer International Publishing
Reference21 articles.
1. Asadoorian, P.: Enabling Nessus on Kali Linux - The Official Guide. http://www.tenable.com/blog/enabling-nessus-on-backtrack-5-the-official-guide
2. Buffer Overflow using Backtrack 5. http://www.hackerthreads.org/Topic-47252
3. Choi, Y.B., Lim, S, Oh, T.H.: Feasibility of virtual security laboratory for three tiered distance education. In: Proceedings of the 2010 SIGITE Conference (SIGITE 2010), pp. 53–57 (2010)
4. Du, W., Wang, R.: A suite of instructional laboratory projects for computer security education (SEED Project). ACM J. Educ. Resour. Comput. 8(1) (2008). Article 3
5. Edge, C., Stamey, J.: Security education on budget: “Getting the most Bang for Buck” with limited time and resources. In: InforSecCD 2010, 1–2 October 2010, Kennesaw, pp. 29–35 (2010)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated feedback for participants of hands-on cybersecurity training;Education and Information Technologies;2023-11-02
2. A Survey on Cyber Security Threats;2021 International Conference on Technological Advancements and Innovations (ICTAI);2021-11-10
3. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training;2021 IEEE Frontiers in Education Conference (FIE);2021-10-13
4. Android Hacking in Kali Linux Using Metasploit Framework;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2021-06-01
5. Learning Environments for Digital Forensics Teaching in Higher Education;Cybersecurity Teaching in Higher Education;2012-02-24