Obtaining better metrics for complex serious games within virtualised simulation environments
暂无分享,去创建一个
[1] M. Blanton. Bloom's Taxonomy Revisited , 1982 .
[2] Eduardo Salas,et al. Flight Simulator Training Effectiveness: A Meta-Analysis , 1992 .
[3] Frank L. Greitzer,et al. Cognitive science implications for enhancing training effectiveness in a serious gaming context , 2007, JERC.
[4] D. Manson,et al. A League of Our Own: The Future of Cyber Defense Competitions , 2011 .
[5] Jean-Pierre Jessel,et al. Classifying Serious Games: The G/P/S Model , 2011 .
[6] Melissa E. DeRosier,et al. Zoo U: A Stealth Approach to Social Skills Assessment in Schools , 2012, Adv. Hum. Comput. Interact..
[7] Christian Sebastian Loh,et al. Performance metrics for serious games: Will the (real) expert please step forward? , 2013, Proceedings of CGAMES'2013 USA.
[8] Christian Sebastian Loh,et al. Measuring the (dis-)similarity between expert and novice behaviors as serious games analytics , 2013, Education and Information Technologies.
[9] Rain Ottis,et al. Light Weight Tabletop Exercise for Cybersecurity Education , 2014 .
[10] Kadri Umbleja,et al. New concepts of automatic answer evaluation in competence based learning , 2014, 2014 IEEE Global Engineering Education Conference (EDUCON).
[11] Dirk Ifenthaler,et al. Serious Games Analytics: Theoretical Framework , 2015 .
[12] O. Maennel,et al. i-tee: A fully automated Cyber Defense Competition for Students , 2015, SIGCOMM.
[13] Xenia Mountrouidou,et al. Denial of service lab for experiential cybersecurity learning in primarily undergraduate institutions , 2016 .
[14] Prashanth Rajivan,et al. Predicting proficiency in cyber defense team exercises , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[15] Salvador Ros,et al. A distributed laboratory architecture for game based learning in cybersecurity and critical infrastructures , 2016, 2016 13th International Conference on Remote Engineering and Virtual Instrumentation (REV).
[16] Rituparna Chaki,et al. Modular logic of authentication using dynamic keystroke pattern analysis , 2016 .
[17] Michele Nappi,et al. Eye movement analysis for human authentication: a critical survey , 2016, Pattern Recognit. Lett..
[18] M. B. Manjunatha,et al. Speech Features Extraction Techniques for Robust Emotional Speech Analysis/Recognition , 2017 .
[19] R. Jacobs,et al. Interprofessional simulation education designed to teach occupational therapy and nursing students complex patient transfers , 2017 .
[20] Alexandru Soceanu,et al. Improving Cybersecurity Skills Using Network Security Virtual Labs , 2017 .
[21] William Newhouse,et al. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (Portuguese translation) , 2017 .
[22] Angelo Furfaro,et al. Using virtual environments for the assessment of cybersecurity issues in IoT scenarios , 2017, Simul. Model. Pract. Theory.