Author of the publication

Finding the Balance Between Guidance and Independence in Cybersecurity Exercises.

, , , , and . ASE @ USENIX Security Symposium, USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Token-based extraction of straight lines., , and . IEEE Trans. Syst. Man Cybern., 19 (6): 1581-1594 (1989)Can We Calibrate a Camera Using an Image of a Flat, Textureless Lambertian Surface?, and . ECCV (2), volume 1843 of Lecture Notes in Computer Science, page 640-653. Springer, (2000)Path planning using Laplace's equation., , and . ICRA, page 2102-2106. IEEE, (1990)Recipes for Immortality Healing, Religion, and Community in South India. Oxford University Press, New York, (in press 2009)EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments., , , , , and . CSET, USENIX Association, (2014)Force domain models for multifingered grasp control., and . ICRA, page 418-423. IEEE Computer Society, (1991)Image-based homing., , , , and . ICRA, page 620-625. IEEE Computer Society, (1991)A Hierarchical Approach to Sign Recognition., , and . WACV/MOTION, page 22-28. IEEE Computer Society, (2005)Automatic Sign Detection and Recognition in Natural Scenes., , , , and . CVPR Workshops, page 27. IEEE Computer Society, (2005)View Variation of Point-Set and Line-Segment Features., , and . IEEE Trans. Pattern Anal. Mach. Intell., 15 (1): 51-68 (1993)