Security scenario generator ({{{{{SecGen)}}}}}: A framework for generating randomly vulnerable rich-scenario {VMs} for learning computer security and hosting {CTF} …

ZC Schreuders, T Shaw, M Shan-A-Khuda… - … USENIX Workshop on …, 2017 - usenix.org
Computer security students benefit from hands-on experience applying security tools and
techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an …

Teaching computer science with cybersecurity education built-in

C Yue - 2016 USENIX Workshop on Advances in Security …, 2016 - usenix.org
Despite the remarkable cybersecurity education efforts from traditional approaches such as
offering dedicated courses and even degree programs or tracks, the computer science …

Shell we play a game?{CTF-as-a-service} for security education

E Trickel, F Disperati, E Gustafson, F Kalantari… - … USENIX Workshop on …, 2017 - usenix.org
Although we are facing a shortage of cybersecurity professionals, the shortage can be
reduced by using technology to empower all security educators to efficiently and effectively …

Capture the flag unplugged: an offline cyber competition

V Ford, A Siraj, A Haynes, E Brown - … of the 2017 ACM SIGCSE Technical …, 2017 - dl.acm.org
In order to meet the cybersecurity workforce demand, it is important to raise cybersecurity
interest among the youth. Just like ACM programming competitions, Capture the Flag (CTF) …

Game based cybersecurity training for high school students

G Jin, M Tu, TH Kim, J Heffron, J White - Proceedings of the 49th ACM …, 2018 - dl.acm.org
Cybersecurity is critical to the national infrastructure, federal and local government, military,
industry, and personal privacy. To defend the US against the cyber threats, a significant …

Security, privacy and safety risk assessment for virtual reality learning environment applications

A Gulhane, A Vyas, R Mitra, R Oruche… - 2019 16th IEEE …, 2019 - ieeexplore.ieee.org
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render
instructional content in a three-dimensional immersive computer experience for training …

Realistic cybersecurity training via scenario progression management

R Beuran, T Inoue, Y Tan… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Cybersecurity training activities are being conducted worldwide in order to address the
increase in security threats that is plaguing our network-centric society. However, most of …

Hit'em where it hurts: a live security exercise on cyber situational awareness

A Doupé, M Egele, B Caillat, G Stringhini… - Proceedings of the 27th …, 2011 - dl.acm.org
Live security exercises are a powerful educational tool to motivate students to excel and
foster research and development of novel security solutions. Our insight is to design a live …

Kypo4industry: A testbed for teaching cybersecurity of industrial control systems

P Čeleda, J Vykopal, V Švábenský… - Proceedings of the 51st …, 2020 - dl.acm.org
There are different requirements on cybersecurity of industrial control systems and
information technology systems. This fact exacerbates the global issue of hiring …

Science fiction prototyping and security education: cultivating contextual and societal thinking in computer security education and beyond

T Kohno, BD Johnson - Proceedings of the 42nd ACM technical …, 2011 - dl.acm.org
Computer security courses typically cover a breadth of technical topics, including threat
modeling, applied cryptography, software security, and Web security. The technical artifacts …