Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CSET '18: The 11th USENIX Workshop on Cyber Security Experimentation and Test.. login Usenix Mag., (2018)Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity., , , , , , , and . NCS, volume 1271 of Advances in Intelligent Systems and Computing, page 3-34. Springer, (2020)Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments., , , , , , and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 185-201. Springer, (2019)Project-based learning continues to inspire cybersecurity students: the 2018-2019 SFS research studies at UMBC., , , , , , , , , and 26 other author(s). Inroads, 11 (2): 46-54 (2020)Shadow IT in higher education: survey and case study for cybersecurity., , , , , , , and . Cryptologia, 48 (1): 26-90 (January 2024)Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation., , , and . ASE, page 899-911. IEEE, (2019)Project-Based Learning Inspires Cybersecurity Students: A Scholarship-for-Service Research Study., , , , , , , , , and 7 other author(s). IEEE Secur. Priv., 17 (3): 82-88 (2019)Psychometric Evaluation of the Cybersecurity Concept Inventory., , , , , , , and . ACM Trans. Comput. Educ., 22 (1): 6:1-6:18 (2022)Psychometric Evaluation of the Cybersecurity Curriculum Assessment., , , , , and . SIGCSE (1), page 228-234. ACM, (2023)Datacomp: Locally Independent Adaptive Compression for Real-World Systems., and . ICDCS, page 211-220. IEEE Computer Society, (2016)