Proceedings of the 19th Annual SIG Conference on Information Technology Education 2018
DOI: 10.1145/3241815.3241839
|View full text |Cite
|
Sign up to set email alerts
|

Review of the Existing Game Based Learning System in Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…There are two primary types of cybersecurity exercises: tabletop discussions and hands-on operationbased exercises [5][6][7]. Tabletop exercises involve discussions and are often conducted through sem-inars, workshops, and idea exchanges, primarily focusing on policy-related issues.…”
Section: Cyber Security Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…There are two primary types of cybersecurity exercises: tabletop discussions and hands-on operationbased exercises [5][6][7]. Tabletop exercises involve discussions and are often conducted through sem-inars, workshops, and idea exchanges, primarily focusing on policy-related issues.…”
Section: Cyber Security Scenariosmentioning
confidence: 99%
“…Section (5) is based on the case study. In the concluding phase, Section (6) concludes the paper and outlines future work.…”
Section: Introductionmentioning
confidence: 99%