Proceedings of the 17th Annual Conference on Information Technology Education 2016
DOI: 10.1145/2978192.2978224
|View full text |Cite
|
Sign up to set email alerts
|

SecLab

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…There are extensive literature works on the lab design for the broad field of Cybersecurity Education. Depending on the employed technologies or methodologies, these lab designs can be categorized into three major groups: virtualization-based lab design (e.g., [3,4,12,13,19]), Web-based lab design (e.g., [8,10,27]), and USB-drivebased lab design (e.g., [20]). The target of the design is either a general security course (e.g., [22]), a singular security issue (e.g., EH for Web security [26]) or security of one particular system (e.g., mobile device security in [28], and NoSQL database security in [11]).…”
Section: Introductionmentioning
confidence: 99%
“…There are extensive literature works on the lab design for the broad field of Cybersecurity Education. Depending on the employed technologies or methodologies, these lab designs can be categorized into three major groups: virtualization-based lab design (e.g., [3,4,12,13,19]), Web-based lab design (e.g., [8,10,27]), and USB-drivebased lab design (e.g., [20]). The target of the design is either a general security course (e.g., [22]), a singular security issue (e.g., EH for Web security [26]) or security of one particular system (e.g., mobile device security in [28], and NoSQL database security in [11]).…”
Section: Introductionmentioning
confidence: 99%