Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Applications of educational data mining and learning analytics on data from cybersecurity training
Cybersecurity professionals need hands-on training to prepare for managing the current
advanced cyber threats. To practice cybersecurity skills, training participants use numerous …
advanced cyber threats. To practice cybersecurity skills, training participants use numerous …
Student assessment in cybersecurity training automated by pattern mining and clustering
Hands-on cybersecurity training allows students and professionals to practice various tools
and improve their technical skills. The training occurs in an interactive learning environment …
and improve their technical skills. The training occurs in an interactive learning environment …
Evaluating two approaches to assessing student progress in cybersecurity exercises
Cybersecurity students need to develop practical skills such as using command-line tools.
Hands-on exercises are the most direct way to assess these skills, but assessing students' …
Hands-on exercises are the most direct way to assess these skills, but assessing students' …
Applying process discovery to cybersecurity training: an experience report
Quality improvement of practical cybersecurity training is challenging due to the process-
oriented nature of this learning domain. Event logs provide only a sparse preview of …
oriented nature of this learning domain. Event logs provide only a sparse preview of …
Process mining analysis of puzzle-based cybersecurity training
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks
effectively. However, practical cybersecurity training is strongly process-oriented, making the …
effectively. However, practical cybersecurity training is strongly process-oriented, making the …
Multi-layer protection approach MLPA for the detection of advanced persistent threat
Background: The ongoing coronavirus (COVID-19) pandemic has had a profound global
impact. Although it has unexpectedly placed considerable strain on healthcare sectors, the …
impact. Although it has unexpectedly placed considerable strain on healthcare sectors, the …
Toolset for collecting shell commands and its application in hands-on cybersecurity training
This Full Paper in the Innovative Practice category presents and evaluates a technical
innovation for hands-on classes. When learning cybersecurity, operating systems, or …
innovation for hands-on classes. When learning cybersecurity, operating systems, or …
[HTML][HTML] Integration of machine learning-based attack detectors into defensive exercises of a 5G cyber range
Cybercrime has become more pervasive and sophisticated over the years. Cyber ranges
have emerged as a solution to keep pace with the rapid evolution of cybersecurity threats …
have emerged as a solution to keep pace with the rapid evolution of cybersecurity threats …
[HTML][HTML] A step-by-step definition of a reference architecture for cyber ranges
Being on the advent of Industry 5.0, organizations have been progressively incorporating
information technology into their formerly air-gapped operational technology architectures …
information technology into their formerly air-gapped operational technology architectures …
Visual feedback for players of multi-level capture the flag games: Field usability study
Capture the Flag games represent a popular method of cybersecurity training. Providing
meaningful insight into the training progress is essential for increasing learning impact and …
meaningful insight into the training progress is essential for increasing learning impact and …