Linked e-resources
Details
Table of Contents
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems
Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education
Conceptualization of a CyberSecurity Awareness Quiz
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges
Automatically protecting network communities by malware epidemiology
Chasing Botnets: A Real Security Incident Investigation
Software System Exploration using Library Call Analysis
A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties
Password Management: How Secure Is Your Login Process?.
Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education
Conceptualization of a CyberSecurity Awareness Quiz
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges
Automatically protecting network communities by malware epidemiology
Chasing Botnets: A Real Security Incident Investigation
Software System Exploration using Library Call Analysis
A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties
Password Management: How Secure Is Your Login Process?.