From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering., , , , и . CoRR, (2023)Smart Environment for Adaptive Learning of Cybersecurity Skills., , , и . CoRR, (2023)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals., , , , , и . ITiCSE (1), стр. 236-242. ACM, (2023)Teaching Lab: Training Novice Computer Science Teachers., , и . ITiCSE, стр. 561. ACM, (2020)What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences., , и . CoRR, (2019)Challenges Arising from Prerequisite Testing in Cybersecurity Games., и . CoRR, (2017)Towards Generalizable Detection of Urgency of Discussion Forum Posts., , , , и . EDM, International Educational Data Mining Society, (2023)Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study., , , , и . VizSEC, стр. 1-11. IEEE, (2019)Preventing Cheating in Hands-on Lab Assignments., , , и . SIGCSE (1), стр. 78-84. ACM, (2022)The Stack: Unplugged Activities for Teaching Computer Science., и . SIGCSE, стр. 1242. ACM, (2021)