Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems (English)
- New search for: Knüpfer, Marcus
- New search for: Bierwirth, Tore
- New search for: Stiemert, Lars
- New search for: Schopp, Matthias
- New search for: Seeber, Sebastian
- New search for: Pöhn, Daniela
- New search for: Hillmann, Peter
- New search for: Knüpfer, Marcus
- New search for: Bierwirth, Tore
- New search for: Stiemert, Lars
- New search for: Schopp, Matthias
- New search for: Seeber, Sebastian
- New search for: Pöhn, Daniela
- New search for: Hillmann, Peter
In:
Model-driven simulation and training environments for cybersecurity
; 3-21
;
2020
-
ISBN:
- Conference paper / Print
-
Title:Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems
-
Contributors:Knüpfer, Marcus ( author ) / Bierwirth, Tore ( author ) / Stiemert, Lars ( author ) / Schopp, Matthias ( author ) / Seeber, Sebastian ( author ) / Pöhn, Daniela ( author ) / Hillmann, Peter ( author )
-
Conference:MSTEC ; 2. ; 2020 ; Online
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2020
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education SystemsKnüpfer, Marcus / Bierwirth, Tore / Stiemert, Lars / Schopp, Matthias / Seeber, Sebastian / Pöhn, Daniela / Hillmann, Peter et al. | 2020
- 22
-
Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation ModelsSmyrlis, Michail / Fysarakis, Konstantinos / Spanoudakis, George / Hatzivasilis, George et al. | 2020
- 41
-
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing EducationRoepke, Rene / Koehler, Klemens / Drury, Vincent / Schroeder, Ulrik / Wolf, Martin R. / Meyer, Ulrike et al. | 2020
- 61
-
Conceptualization of a CyberSecurity Awareness QuizPape, Sebastian / Goeke, Ludger / Quintanar, Alejandro / Beckers, Kristian et al. | 2020
- 79
-
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber RangesBraghin, Chiara / Cimato, Stelvio / Damiani, Ernesto / Frat, Fulvio / Riccobene, Elvinia / Astaneh, Sadegh et al. | 2020
- 92
-
Automatically Protecting Network Communities by Malware EpidemiologyWang, Xiao-Si / Welding, Jessica / Chung, Tek Kan et al. | 2020
- 111
-
Chasing Botnets: A Real Security Incident InvestigationHatzivasilis, George / Kunc, Martin et al. | 2020
- 125
-
Software System Exploration Using Library Call AnalysisTsantekidis, Marinos / Prevelakis, Vassilis et al. | 2020
- 143
-
A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI PropertiesManos, Papoutsakis / Konstantinos, Fysarakis / Emmanouil, Michalodimitrakis / Eftychia, Lakka / Nikolaos, Petroulakis / George, Spanoudakis / Sotiris, Ioannidis et al. | 2020
- 157
-
Password Management: How Secure Is Your Login Process?Hatzivasilis, George et al. | 2020