Applications of educational data mining and learning analytics on data from cybersecurity training

V Švábenský, J Vykopal, P Čeleda, L Kraus - Education and Information …, 2022 - Springer
Cybersecurity professionals need hands-on training to prepare for managing the current
advanced cyber threats. To practice cybersecurity skills, training participants use numerous …

Student assessment in cybersecurity training automated by pattern mining and clustering

V Švábenský, J Vykopal, P Čeleda, K Tkáčik… - Education and …, 2022 - Springer
Hands-on cybersecurity training allows students and professionals to practice various tools
and improve their technical skills. The training occurs in an interactive learning environment …

Evaluating two approaches to assessing student progress in cybersecurity exercises

V Švábenský, R Weiss, J Cook, J Vykopal… - Proceedings of the 53rd …, 2022 - dl.acm.org
Cybersecurity students need to develop practical skills such as using command-line tools.
Hands-on exercises are the most direct way to assess these skills, but assessing students' …

Applying process discovery to cybersecurity training: an experience report

M Macák, R Oslejsek, B Buhnova - 2022 IEEE European …, 2022 - ieeexplore.ieee.org
Quality improvement of practical cybersecurity training is challenging due to the process-
oriented nature of this learning domain. Event logs provide only a sparse preview of …

Process mining analysis of puzzle-based cybersecurity training

M Macák, R Oslejsek, B Buhnova - … of the 27th ACM Conference on on …, 2022 - dl.acm.org
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks
effectively. However, practical cybersecurity training is strongly process-oriented, making the …

Multi-layer protection approach MLPA for the detection of advanced persistent threat

N Mohamed, E Alam, GL Stubbs - Journal of Positive School …, 2022 - 184.168.115.16
Background: The ongoing coronavirus (COVID-19) pandemic has had a profound global
impact. Although it has unexpectedly placed considerable strain on healthcare sectors, the …

Toolset for collecting shell commands and its application in hands-on cybersecurity training

V Švábenský, J Vykopal, D Tovarňák… - 2021 IEEE Frontiers in …, 2021 - ieeexplore.ieee.org
This Full Paper in the Innovative Practice category presents and evaluates a technical
innovation for hands-on classes. When learning cybersecurity, operating systems, or …

[HTML][HTML] Integration of machine learning-based attack detectors into defensive exercises of a 5G cyber range

A Mozo, A Pastor, A Karamchandani, L de la Cal… - Applied Sciences, 2022 - mdpi.com
Cybercrime has become more pervasive and sophisticated over the years. Cyber ranges
have emerged as a solution to keep pace with the rapid evolution of cybersecurity threats …

[HTML][HTML] A step-by-step definition of a reference architecture for cyber ranges

V Kampourakis, V Gkioulos, S Katsikas - Journal of Information Security and …, 2025 - Elsevier
Being on the advent of Industry 5.0, organizations have been progressively incorporating
information technology into their formerly air-gapped operational technology architectures …

Visual feedback for players of multi-level capture the flag games: Field usability study

R Ošlejšek, V Rusňák, K Burská… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Capture the Flag games represent a popular method of cybersecurity training. Providing
meaningful insight into the training progress is essential for increasing learning impact and …