Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybersecurity: Exploring core concepts through six scenarios., , , , , , , and . Cryptologia, 42 (4): 337-377 (2018)Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes., , , , , , and . IEEE Trans. Educ., 61 (1): 11-20 (2018)Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project., , , , , , , , , and . CoRR, (2017)Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments., , , , , , and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 185-201. Springer, (2019)How students reason about Cybersecurity concepts., , , , , , and . FIE, page 1-5. IEEE Computer Society, (2016)The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories., , , , , , , , , and 5 other author(s). IEEE Secur. Priv., 17 (6): 77-83 (2019)Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity., , , , , , , and . NCS, volume 1271 of Advances in Intelligent Systems and Computing, page 3-34. Springer, (2020)