Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering., , , , and . CoRR, (2023)Smart Environment for Adaptive Learning of Cybersecurity Skills., , , and . CoRR, (2023)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals., , , , , and . ITiCSE (1), page 236-242. ACM, (2023)Teaching Lab: Training Novice Computer Science Teachers., , and . ITiCSE, page 561. ACM, (2020)Reflective Diary for Professional Development of Novice Teachers., , and . CoRR, (2018)Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training., , , , , and . CoRR, (2020)Cybersecurity knowledge and skills taught in capture the flag challenges., , , and . Comput. Secur., (2021)Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises., , , , , , , and . SIGCSE (1), page 787-793. ACM, (2022)Toward Guidelines for Designing Cybersecurity Serious Games., , and . SIGCSE, page 1275. ACM, (2021)Reinforcing Cybersecurity Hands-on Training With Adaptive Learning., , , and . FIE, page 1-9. IEEE, (2021)