1. Academy K. Intro to cryptography. https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography; 2011.
2. U. of Adelaide. Cyberwar, surveillance and security. https://www.edx.org/course/cyberwar-surveillance-security-adelaidex-cyber101x-0#!; N/A.
3. Bashir M, Lambert A, Wee JMC, Guo B. An examination of the vocational and psychological characteristics of cybersecurity competition participants. 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15); 2015.
4. Beuran R, Chinen KI, Tan Y, Shinoda Y. Towards effective cybersecurity education and training; 2016.
5. Learning cyber security through gamification;Boopathi;Indian Journal of Science and Technology,2015