From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cybersecurity: Exploring core concepts through six scenarios., , , , , , , и . Cryptologia, 42 (4): 337-377 (2018)Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes., , , , , , и . IEEE Trans. Educ., 61 (1): 11-20 (2018)Psychometric Evaluation of the Cybersecurity Concept Inventory., , , , , , , и . ACM Trans. Comput. Educ., 22 (1): 6:1-6:18 (2022)Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project., , , , , , , , , и . CoRR, (2017)Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments., , , , , , и . NCS, том 1055 из Advances in Intelligent Systems and Computing, стр. 185-201. Springer, (2019)Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review., , , , , , и . FIE, стр. 1-9. IEEE, (2019)The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories., , , , , , , , , и 5 other автор(ы). IEEE Secur. Priv., 17 (6): 77-83 (2019)Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity., , , , , , , и . NCS, том 1271 из Advances in Intelligent Systems and Computing, стр. 3-34. Springer, (2020)How students reason about Cybersecurity concepts., , , , , , и . FIE, стр. 1-5. IEEE Computer Society, (2016)