Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/ijsg/HendrixAB16
%A Hendrix, Maurice
%A Al-Sherbaz, Ali
%A Bloom, Victoria
%D 2016
%J Int. J. Serious Games
%K
%N 1
%T Game Based Cyber Security Training: are Serious Games suitable for cyber security training?
%U http://dblp.uni-trier.de/db/journals/ijsg/ijsg3.html#HendrixAB16
%V 3
@article{journals/ijsg/HendrixAB16,
added-at = {2023-12-14T15:52:55.000+0100},
author = {Hendrix, Maurice and Al-Sherbaz, Ali and Bloom, Victoria},
biburl = {https://www.bibsonomy.org/bibtex/2e4089664ef4ac7cc2328aa7b59aa6ed4/admin},
ee = {http://journal.seriousgamessociety.org/index.php?journal=IJSG&page=article&op=view&path%5B%5D=107},
interhash = {f0b763232f30918a0ea58d2dbee85f20},
intrahash = {e4089664ef4ac7cc2328aa7b59aa6ed4},
journal = {Int. J. Serious Games},
keywords = {},
number = 1,
timestamp = {2023-12-14T15:52:55.000+0100},
title = {Game Based Cyber Security Training: are Serious Games suitable for cyber security training?},
url = {http://dblp.uni-trier.de/db/journals/ijsg/ijsg3.html#HendrixAB16},
volume = 3,
year = 2016
}