Cited By
View all- Pfaller TSkopik FSmith PLeitner M(2024)Towards Customized Cyber Exercises using a Process-based Lifecycle ModelProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655713(37-45)Online publication date: 5-Jun-2024
- Švábenský VVykopal JČeleda PDovjak J(2024)Automated feedback for participants of hands-on cybersecurity trainingEducation and Information Technologies10.1007/s10639-023-12265-829:9(11555-11584)Online publication date: 1-Jun-2024
- Bridges ROesch SIannacone MHuffer KJewell BNichols JWeber BVerma MScofield DMiles CPlummer TDaniell MTall ABeaver JSmith J(2023)Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware DetectorsDigital Threats: Research and Practice10.1145/35674324:2(1-22)Online publication date: 10-Aug-2023
- Show More Cited By