共 20 条
[1]
[Anonymous], 2017, Association for Computing Machinery, DOI DOI 10.1145/3184594
[2]
[Anonymous], 2013, J COMPUT SCI COLL
[3]
Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities
[J].
SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION,
2018,
:179-184
[4]
Cooper Stephen, 2009, SIGCSE Bulletin, V41, P109, DOI 10.1145/1709424.1709457
[5]
Cooper S., 2010, P ITICSE WORK GROUP, P49, DOI [10.1145/1971681.1971686, DOI 10.1145/1971681.1971686]
[6]
Henry Adam P, 2017, TECHNICAL REPORT
[7]
Hoag J., 2013, P 2013 INF SEC CURR, DOI DOI 10.1145/2528908.2528925
[8]
Game based Cybersecurity Training for High School Students
[J].
SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION,
2018,
:68-73
[9]
On Designing a Cybersecurity Educational Program for Higher Education
[J].
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTERS (ICETC 2018),
2018,
:195-200
[10]
Global Perspectives on Cybersecurity Education for 2030: A Case for a Meta-discipline
[J].
ITICSE 2018 COMPANION: PROCEEDINGS COMPANION OF THE 23RD ANNUAL ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION,
2018,
:36-54