Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering., , , , and . CoRR, (2023)Smart Environment for Adaptive Learning of Cybersecurity Skills., , , and . CoRR, (2023)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals., , , , , and . ITiCSE (1), page 236-242. ACM, (2023)Teaching Lab: Training Novice Computer Science Teachers., , and . ITiCSE, page 561. ACM, (2020)Challenges Arising from Prerequisite Testing in Cybersecurity Games., and . CoRR, (2017)What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences., , and . CoRR, (2019)How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run?, , and . FIE, page 1-9. IEEE, (2020)The Stack: Unplugged Activities for Teaching Computer Science., and . SIGCSE, page 1242. ACM, (2021)Preventing Cheating in Hands-on Lab Assignments., , , and . SIGCSE (1), page 78-84. ACM, (2022)Towards Generalizable Detection of Urgency of Discussion Forum Posts., , , , and . EDM, International Educational Data Mining Society, (2023)