Gamified Training for Cyber Defence : Methods and Automated Tools for Situation and Threat Assessment
暂无分享,去创建一个
Per M. Gustavsson | Sten F. Andler | Maurice Hendrix | Joni de Almeida Amorim | S. F. Andler | J. A. Amorim | M. Hendrix
[1] Michael Zyda,et al. From visual simulation to virtual reality to games , 2005, Computer.
[2] Rose-Mharie Åhlfeldt,et al. Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem , 2013, 2013 European Intelligence and Security Informatics Conference.
[3] Robin Kay. A Systematic Evaluation of Learning Objects for Secondary School Students , 2007 .
[4] Jochen Krebs,et al. Agile Portfolio Management , 2008 .
[5] James Llinas,et al. Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems , 2013, 2013 European Intelligence and Security Informatics Conference.
[6] Per Backlund,et al. Educational games - Are they worth the effort? A literature survey of the effectiveness of serious games , 2013, 2013 5th International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES).
[7] Martin Gürtler. NATO Cooperative Cyber Defence Centre of Excellence , 2021, 2021 13th International Conference on Cyber Conflict (CyCon).
[8] Clark Aldrich,et al. The Complete Guide to Simulations and Serious Games: How the Most Valuable Content Will be Created in the Age Beyond Gutenberg to Google , 2009 .
[9] Dean Leffingwell,et al. Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise , 2011 .
[10] Dan Shoemaker,et al. Cybersecurity: The Essential Body Of Knowledge , 2011 .
[11] M. Fardo. KAPP, Karl M. The gamification of learning and instruction: game-based methods and strategies for training and education. San Francisco: Pfeiffer, 2012. , 2013 .
[12] H.A.M. Luiijf,et al. National Cyber Security Framework Manual , 2013 .
[13] Robin Kay,et al. A Multi-Component Model for Assessing Learning Objects: The Learning Object Evaluation Metric (LOEM) , 2008 .
[14] Jesse Schell,et al. The Art of Game Design: A book of lenses , 2019 .
[15] Christopher A. Chung,et al. Simulation Modeling Handbook: A Practical Approach , 2003 .
[16] Y. R. Storch Rudall. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners , 2012 .
[17] John W. Rice,et al. The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education , 2012, Int. J. Gaming Comput. Mediat. Simulations.
[18] Fabio Roli,et al. Information fusion in computer security , 2009, Inf. Fusion.