暂无分享,去创建一个
[1] Jan Vykopal,et al. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training , 2021, 2021 IEEE Frontiers in Education Conference (FIE).
[2] Thomas Shaw,et al. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events , 2017, ASE @ USENIX Security Symposium.
[3] Davide Fossati,et al. Unlimited Trace Tutor: Learning Code Tracing With Automatically Generated Programs , 2020, SIGCSE.
[4] David Brumley,et al. Automatic Problem Generation for Capture-the-Flag Competitions , 2015 .
[5] Jan Vykopal,et al. Benefits and Pitfalls of Using Capture the Flag Games in University Courses , 2020, SIGCSE.
[6] Craig Zilles,et al. Superficial Code-guise: Investigating the Impact of Surface Feature Changes on Students' Programming Question Scores , 2021, SIGCSE.
[7] Kevin Chung. Live Lesson: Lowering the Barriers to Capture The Flag Administration and Participation , 2017, ASE @ USENIX Security Symposium.
[8] Jan Vykopal,et al. Scalable Learning Environments for Teaching Cybersecurity Hands-on , 2021, 2021 IEEE Frontiers in Education Conference (FIE).
[9] Anja Feldmann,et al. NAT Usage in Residential Broadband Networks , 2011, PAM.
[10] Christoph Meinel,et al. Online assessment for hands-on cyber security training in a virtual lab , 2012, Proceedings of the 2012 IEEE Global Engineering Education Conference (EDUCON).
[11] Sanjit A. Seshia,et al. Automating exercise generation: a step towards meeting the MOOC challenge for embedded systems , 2012, WESE '12.
[12] Tom Chothia,et al. An Offline Capture The Flag-Style Virtual Machine and an Assessment of Its Value for Cybersecurity Education , 2015 .
[13] Ruben Rios,et al. PERSONALIZED COMPUTER SECURITY TASKS WITH AUTOMATIC EVALUATION AND FEEDBACK , 2019 .
[14] Wu-chang Feng. A Scaffolded, Metamorphic CTF for Reverse Engineering , 2015 .