CyberCIEGE Scenario Design and Implementation
暂无分享,去创建一个
[1] Ken Allen,et al. CyberCIEGE: Gaming for Information Assurance , 2005, IEEE Secur. Priv..
[2] Cynthia E. Irvine,et al. Teaching Objectives of a Simulation Game for Computer Security , 2003 .
[3] Cynthia E. Irvine,et al. Active Learning with the CyberCIEGE Video Game , 2011, CSET.
[4] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[5] P. A. Karger,et al. Multics security evaluation: vulnerability analysis , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[6] C. E. Irvine,et al. Simulation of PKI-enabled communication for identity management using CyberCIEGE , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[7] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[8] Chun Che Fung,et al. Raising information security awareness in digital ecosystem with games - a pilot study in Thailand , 2008, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies.
[9] Willis H Ware. Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security , 1979 .
[10] Xiaohong Yuan,et al. A comparative study of CyberCIEGE game and Department of Defense Information Assurance Awareness video , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).
[11] Cynthia E. Irvine,et al. A video game for cyber security training and awareness , 2007, Comput. Secur..
[12] Cynthia E. Irvine,et al. Expressing an information security policy within a security simulation game , 2004 .
[13] Daniel A. Sledz,et al. A Dynamic Three-Dimensional Network Visualization Program for Integration into CyberCIEGE and Other Network Visualization Scenarios , 2007 .
[14] Xuquan Stanley. Chang,et al. A CyberCIEGE Traffic Analysis Extension for Teaching Network Security , 2011 .
[15] Edward Packard,et al. The Cave of Time , 1979 .
[16] Ernest Adams,et al. Fundamentals of Game Design , 2006 .