Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises., , , , and . Inf., 12 (8): 318 (2021)Systematic design, deployment and evaluation of gamified cybersecurity learning environments. Ionian University, Greece, (2022)National Archive of PhD Theses: oai:10442/52096.Adapting CTF challenges into virtual cybersecurity learning environments., and . Inf. Comput. Secur., 29 (1): 105-132 (2021)Automated and On-Demand Cybersecurity Certification., , , , and . CSR, page 174-179. IEEE, (2021)A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games., , , and . TrustBus, volume 13582 of Lecture Notes in Computer Science, page 33-49. Springer, (2022)A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations: Deploying and Documenting Realistic Cyberattack Scenarios - A Rootkit Case Study., , , , , , and . PCI, page 328-333. ACM, (2021)Incident Handling for Healthcare Organizations and Supply-Chains., , , , , , , , and . ISCC, page 1-7. IEEE, (2022)Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory., , , and . ARES, page 81:1-81:8. ACM, (2022)Sandboxing the Cyberspace for Cybersecurity Education and Learning., , , and . DETIPS/DeSECSys/MPS/SPOSE@ESORICS, volume 12580 of Lecture Notes in Computer Science, page 181-196. Springer, (2020)Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams., , , , , and . J. Netw. Syst. Manag., 32 (2): 42 (April 2024)