Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education

T Balon, I Baggili - Education and Information Technologies, 2023 - Springer
Over the last decade, industry and academia have worked towards raising students'
interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity …

SoK: a proposal for incorporating accessible gamified cybersecurity awareness training informed by a systematic literature review

S Das - Proceedings of the workshop on usable security and …, 2022 - papers.ssrn.com
SoK: A Proposal for Incorporating Accessible Gamified Cybersecurity Awareness Training
Informed by a Systematic Literature Revie Page 1 SoK: A Proposal for Incorporating …

[HTML][HTML] Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises

M Glas, G Messmann, G Pernul - Computers & Security, 2024 - Elsevier
The global shortage of cybersecurity professionals poses a daunting challenge for
organizations seeking to protect their assets and data. To counteract this workforce …

Hacked: A pedagogical analysis of online vulnerability discovery exercises

D Votipka, E Zhang, ML Mazurek - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Hacking exercises are a common tool for security education, but there is limited investigation
of how they teach security concepts and whether they follow pedagogical best practices …

[HTML][HTML] Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project

C Grajeda, J Berrios, S Benzo, E Ogunwobi… - Forensic Science …, 2023 - Elsevier
Digital Forensics (DF) is a multidisciplinary domain that involves computing, law, criminology
and other disciplines. At the core of the domain, however, is the Acquisition, Authentication …

Sim-Cyberpunk: Serious Play, Hackers and Capture the Flag Competitions

AD Cybulski - 2023 - search.proquest.com
Capture the flag (CTF) is a style of game developed within the hacker community to
simulate/emulate the practice of vulnerability research. In a CTF players identify security …

Defending Against Adversarial Machine Learning: Insights from Students vs. Professionals

VJ Kakkad - 2023 - search.proquest.com
Abstract While Machine Learning is becoming an imperative part of modern-day Computer
Science, it is not impervious to security attacks, just like any other faction in this industry. In …

PEMBANGUNAN SISTEM PEMBELAJARAN LINUX MENGGUNAKAN METODE PERMAINAN CAPTURE THE FLAG

ALDL Toruan - 2024 - e-journal.uajy.ac.id
Pembelajaran keahlian teknologi informasi khususnya penggunaan Linux umumnya
dilaksanakan di dalam sebuah kelas dan terdapat seorang instruktur yang akan …

Construção de um jogo de segurança voltado para alunos do MSI

JLL Silva - 2021 - estudogeral.uc.pt
Globalmente, na última década as universidades apostam cada vez mais na oferta de
cursos e programas em segurança informática, devido à elevada procura por especialistas …