Adapting CTF challenges into virtual cybersecurity learning environments

S Karagiannis, E Magkos - Information & Computer Security, 2020 - emerald.com
Adapting CTF challenges into virtual cybersecurity learning environments | Emerald Insight
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …

[HTML][HTML] Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role …

C La Fleur, B Hoffman, CB Gibson, N Buchler - Computers & Security, 2021 - Elsevier
A critical component to any modern cybersecurity endeavor is effective use of its human
resources to secure networks, maintain services and mitigate adversarial events. Despite …

Playing the new devil's advocate role in facilitated modelling processes to address group homogeneity

G Cunico, N Zimmermann, N Videira - Journal of the Operational …, 2024 - Taylor & Francis
To address complex issues, facilitated modelling aims to represent and accommodate plural
worldviews from many stakeholders and experts. In these contexts, group homogeneity can …

{CTF}:{State-of-the-Art} and Building the Next Generation

C Taylor, P Arias, J Klopchic, C Matarazzo… - 2017 USENIX Workshop …, 2017 - usenix.org
Capture the flag (CTF) style events have become increasingly popular events for
recruitment, training, evaluation, and recreation in the field of computer security. Today …

Teaching cybersecurity to criminal justice majors

B Nodeland, S Belshaw, M Saber - Journal of Criminal Justice …, 2019 - Taylor & Francis
Responses to breaches in cybersecurity are increasingly reliant on criminal justice
practitioners. However, while the demand for criminal justice participation in cybersecurity …

CiRA-Core: The Connector for Developer Teachers and User Teachers to Artificial Intelligence

R Jomtarak, C Faikhamta, T Prasoplarb… - … on Technology in …, 2023 - Springer
Technology becomes the essential connector of transdisciplinary education as known as
STEM education and as the tool for enhancing learners to become a technologically literate …

Code Review for CyberSecurity in the Industry: Insights from Gameplay Analytics

AC Iosif, U Lechner, M Pinto-Albuquerque… - 5th International …, 2024 - drops.dagstuhl.de
In pursuing a secure software development lifecycle, industrial developers employ a
combination of automated and manual techniques to mitigate vulnerabilities in source code …

Teaching about the Dark Web in Criminal Justice or Related Programs at the Community College and University Levels.

SH Belshaw, B Nodeland, L Underwood… - Journal of Cybersecurity …, 2020 - ERIC
Increasingly, criminal justice practitioners have been called on to help solve breaches in
cyber security. However, while the demand for criminal justice participation in cyber …

Security Simulations in Undergraduate Education: A Review.

J Simpson, A Brantly - Journal of Cybersecurity Education, Research and …, 2022 - ERIC
Several decades of research in simulation and gamification in higher education shows that
simulations are highly effective in improving a range of outcomes for students including …

Revolutionizing the visual design of Capture the Flag (CTF) competitions

R Senanayake, P Porras, J Kaehler - … Conference, HCI-CPT 2019, Held as …, 2019 - Springer
There are a variety of cyber-security challenge tournaments held within the INFOSEC and
Hacker communities, which among their benefits help to promote and identify emerging …