Author:
Moore Erik,Fulton Steven,Likarish Dan
Publisher
Springer International Publishing
Reference9 articles.
1. Kenney, M.: Cyber-terrorism in a post-stuxnet world. Orbis 59(1), 111–128 (2015)
2. IFIP Advances in Information and Communication Technology;E Moore,2015
3. Saunders, J.H.: Simulation approaches in information security education. In: Proceedings of the 6th National Colloquium for Information System Security Education, Redmond, WA, June (2002)
4. Perry, R.W.: Disaster exercise outcomes for professional emergency personnel and citizen volunteers. J. Contingencies Crisis Manag. 12(2), 64–75 (2004)
5. Petress, K.: What is meant by “active learning?” Education 128(4), 566 (2008)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Data Driven Skill Assessment for Cybersecurity Exercises;2023 10th International Conference on Future Internet of Things and Cloud (FiCloud);2023-08-14
2. Modeling and executing cyber security exercise scenarios in cyber ranges;Computers & Security;2022-05
3. A Layered Model for Building Cyber Defense Training Capacity;Information Security Education for Cyber Resilience;2021
4. Learning Analytics Perspective: Evidencing Learning from Digital Datasets in Cybersecurity Exercises;2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2020-09
5. Make it and Break it;Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control;2018-09-21