共 38 条
[1]
[Anonymous], 2020, [No title captured], DOI [10.1145/3467967, DOI 10.1145/3467967]
[3]
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[4]
Carlisle Martin C., 2015, 2015 USENIX SUMM GAM
[5]
Chung K., 2014, P 2014 USENIX SUMM G
[6]
Cohen J. W, 1988, STAT POWER ANAL BEHA, DOI 10.4324/9780203771587
[7]
Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security Class
[J].
PROCEEDINGS OF THE 27TH ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, ITICSE 2022, VOL 1,
2022,
:470-476
[8]
CS2023 Task Force, 2023, Computer Science Curricula 2023: Version Beta
[9]
Denning D.E. R., 1982, Cryptography and Data Security, V112
[10]
Anonymizing NYC Taxi Data: Does It Matter?
[J].
PROCEEDINGS OF 3RD IEEE/ACM INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS, (DSAA 2016),
2016,
:140-148