Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering., , , , and . CoRR, (2023)Smart Environment for Adaptive Learning of Cybersecurity Skills., , , and . CoRR, (2023)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals., , , , , and . ITiCSE (1), page 236-242. ACM, (2023)Teaching Lab: Training Novice Computer Science Teachers., , and . ITiCSE, page 561. ACM, (2020)What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences., , and . CoRR, (2019)Challenges Arising from Prerequisite Testing in Cybersecurity Games., and . CoRR, (2017)Towards Generalizable Detection of Urgency of Discussion Forum Posts., , , , and . EDM, International Educational Data Mining Society, (2023)Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study., , , , and . VizSEC, page 1-11. IEEE, (2019)Preventing Cheating in Hands-on Lab Assignments., , , and . SIGCSE (1), page 78-84. ACM, (2022)The Stack: Unplugged Activities for Teaching Computer Science., and . SIGCSE, page 1242. ACM, (2021)