![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 157 matches
- 2022
- Petrus Duvenage
, Victor Jaquire
, Sebastiaan H. von Solms
:
South Africa's Taxi Industry as a Cybersecurity-Awareness Game Changer: Why and How? World Conference on Information Security Education 2022: 92-106 - Sabrina Friedl
, Magdalena Glas
, Ludwig Englbrecht
, Fabian Böhm
, Günther Pernul
:
ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics. World Conference on Information Security Education 2022: 77-91 - Steven Furnell
, Gregor Langner
, Teemu Tokola
, Jerry Andriessen
, Gerald Quirchmayr
, Carmela Luciano
:
Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements. World Conference on Information Security Education 2022: 46-59 - Konstantin Knorr:
Analyzing Error Rates in Cryptological Programming Assignments. World Conference on Information Security Education 2022: 3-16 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
How to Overcome Staff Shortage in Professionals for SOCs and NSICs. World Conference on Information Security Education 2022: 31-45 - Ida Ngambeki
, Matt Bishop
, Jun Dai
, Phillip Nico
, Shiven Mian
, Ong Thao, Tran Ngoc Bao Huynh
, Zed Chance
, Isslam Alhasan
, Motunrola Afolabi
:
SecTutor: An Intelligent Tutoring System for Secure Programming. World Conference on Information Security Education 2022: 17-28 - Georgios Potamos
, Savvas Theodoulou, Eliana Stavrou
, Stavros Stavrou:
Maritime Cyber Threats Detection Framework: Building Capabilities. World Conference on Information Security Education 2022: 107-129 - Silvia Vidor
, Carlos E. Budde
:
A Maturity Assessment Model for Cyber Security Education in Europe. World Conference on Information Security Education 2022: 60-74 - Lynette Drevin
, Natalia G. Miloslavskaya
, Wai Sze Leung
, Suné von Solms
:
Information Security Education - Adapting to the Fourth Industrial Revolution - 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings. IFIP Advances in Information and Communication Technology 650, Springer 2022, ISBN 978-3-031-08171-2 [contents] - 2021
- Johann Allers
, Günther R. Drevin
, Dirk P. Snyman
, Hennie A. Kruger
, Lynette Drevin
:
Children's Awareness of Digital Wellness: A Serious Games Approach. World Conference on Information Security Education 2021: 95-110 - Leon Bernard
, Sagar Raina
, Blair Taylor
, Siddharth Kaza
:
Minimizing Cognitive Overload in Cybersecurity Learning Materials: An Experimental Study Using Eye-Tracking. World Conference on Information Security Education 2021: 47-63 - Matt Bishop
, Lynette Drevin
, Lynn Futcher
, Wai Sze Leung
, Natalia G. Miloslavskaya
, Erik L. Moore
, Jacques Ophoff
, Suné von Solms
:
A Brief History and Overview of WISE. World Conference on Information Security Education 2021: 3-9 - Matt Bishop
, Ida Ngambeki
, Shiven Mian
, Jun Dai
, Phillip Nico
:
Measuring Self-efficacy in Secure Programming. World Conference on Information Security Education 2021: 81-92 - Ryan Hosler
, Xukai Zou
, Matt Bishop
:
Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education. World Conference on Information Security Education 2021: 27-43 - Popyeni Kautondokwa
, Zainab Ruhwanya
, Jacques Ophoff
:
Environmental Uncertainty and End-User Security Behaviour: A Study During the COVID-19 Pandemic. World Conference on Information Security Education 2021: 111-125 - Joakim Kävrestad
, Steven Furnell
, Marcus Nohlberg
:
What Parts of Usable Security Are Most Important to Users? World Conference on Information Security Education 2021: 126-139 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
Formation of General Professional Competencies in Academic Training of Information Security Professionals. World Conference on Information Security Education 2021: 13-26 - Erik L. Moore
, Steven P. Fulton
, Roberta A. Mancuso
, Tristen K. Amador
, Daniel M. Likarish
:
A Layered Model for Building Cyber Defense Training Capacity. World Conference on Information Security Education 2021: 64-80 - Lynette Drevin
, Natalia G. Miloslavskaya
, Wai Sze Leung
, Suné von Solms
:
Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24, 2021, Proceedings. IFIP Advances in Information and Communication Technology 615, Springer 2021, ISBN 978-3-030-80864-8 [contents] - 2019
- Pascal Lafourcade
, Takaaki Mizuki
, Atsuki Nagao
, Kazumasa Shinagawa
:
Light Cryptography. World Conference on Information Security Education 2019: 89-101 - Matt Bishop
, Melissa Dark, Lynn Futcher
, Johan Van Niekerk
, Ida Ngambeki, Somdutta Bose, Minghua Zhu:
Learning Principles and the Secure Programming Clinic. World Conference on Information Security Education 2019: 16-29 - Dimitrios Damopoulos, Susanne Wetzel:
Introducing Research into the Undergraduate Curriculum in Cybersecurity. World Conference on Information Security Education 2019: 30-42 - Vuyolwethu Sizoli Mdunyelwa
, Lynn Futcher
, Johan Van Niekerk
:
An Educational Intervention for Teaching Secure Coding Practices. World Conference on Information Security Education 2019: 3-15 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
Blockchain and Its Security: Ignore or Insert into Academic Training? World Conference on Information Security Education 2019: 102-113 - Erik L. Moore
, Steven P. Fulton
, Roberta A. Mancuso
, Tristen K. Amador
, Daniel M. Likarish
:
A Short-Cycle Framework Approach to Integrating Psychometric Feedback and Data Analytics to Rapid Cyber Defense. World Conference on Information Security Education 2019: 45-58 - Jacques Ophoff
, Frauke Dietz:
Using Gamification to Improve Information Security Behavior: A Password Strength Experiment. World Conference on Information Security Education 2019: 157-169 - Juan-Marc Scrimgeour, Jacques Ophoff
:
Lessons Learned from an Organizational Information Security Awareness Campaign. World Conference on Information Security Education 2019: 129-142 - Rudi Serfontein
, Hennie A. Kruger
, Lynette Drevin
:
Identifying Information Security Risks in a Social Network Using Self-organising Maps. World Conference on Information Security Education 2019: 114-126 - Suné von Solms
, Annlizé Marnewick
:
Identifying Security Requirements Body of Knowledge for the Security Systems Engineer. World Conference on Information Security Education 2019: 59-71 - Alaa Tolah
, Steven M. Furnell, Maria Papadaki
:
A Comprehensive Framework for Understanding Security Culture in Organizations. World Conference on Information Security Education 2019: 143-156
skipping 127 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-26 16:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint