default search action
21st WISE 2020: Maribor, Slovenia
- Lynette Drevin, Suné von Solms, Marianthi Theocharidou:
Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings. IFIP Advances in Information and Communication Technology 579, Springer 2020, ISBN 978-3-030-59290-5
Teaching Methods and Tools
- Konstantin Knorr:
Learning and Grading Cryptology via Automated Test Driven Software Development. 3-17 - Erik Moore, Daniel M. Likarish, Bobbie Bastian, Michael Brooks:
An Institutional Risk Reduction Model for Teaching Cybersecurity. 18-31 - Steven Furnell, Matt Bishop:
Education for the Multifaith Community of Cybersecurity. 32-45 - Simone Fischer-Hübner, Matthias Beckerle, Alberto Lluch-Lafuente, Antonio Ruiz-Martínez, Karo Saharinen, Antonio F. Skarmeta, Pierantonia Sterlini:
Quality Criteria for Cyber Security MOOCs. 46-60 - Stylianos Karagiannis, Elpidoforos Maragkos-Belmpas, Emmanouil Magkos:
An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools. 61-77
Cybersecurity Knowledge Within the Organisation
- Andrey Vybornov, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Designing Competency Models for Cybersecurity Professionals for the Banking Sector. 81-95 - Anzel Berndt, Jacques Ophoff:
Exploring the Value of a Cyber Threat Intelligence Function in an Organization. 96-109 - Alireza Shojaifar, Samuel A. Fricker, Martin Gwerder:
Automating the Communication of Cybersecurity Knowledge: Multi-case Study. 110-124
Gaming for Cybersecurity Training
- Ludwig Englbrecht, Günther Pernul:
A Serious Game-Based Peer-Instruction Digital Forensics Workshop. 127-141 - Audun Jøsang, Viktoria Stray, Hanne Rygge:
Threat Poker: Gamification of Secure Agile. 142-155
Teaching of Detection and Forensics
- Matthieu Journault, Pascal Lafourcade, Malika More, Rémy Poulain, Léo Robert:
How to Teach the Undecidability of Malware Detection Problem and Halting Problem. 159-169 - Frans F. Blauw:
Enlivening Port Scanning Exercises with Capture the Flag and Deduction. 170-183 - Wai Sze Leung:
Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings. 184-197
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.