, The cLEMCy architecture, 2017.
Collective views of the NSA/CSS cyber defense exercise on curricula and learning objectives, Proceedings of the Second Workshop on Cyber Security Experimentation and Test. USENIX Association, 2009. ,
Why information security is hard-an economic perspective, Proceedings of the 17th Annual Computer Security Applications Conference, 2001. ,
,
Information security economics -and beyond, Advances in Cryptology -Proceedings of Crypto, vol.4622, pp.68-91, 2007. ,
The use of a collegiate cyber defense competition in information security education, Proceedings of the Second Annual Conference on Information Security Curriculum Development, pp.16-18, 2005. ,
Defcon capture the flag: Defending vulnerable code from intense attack, Proceedings of the 2003 DARPA Information Survivability Conference and Exposition, 2003. ,
Exploring a national cybersecurity exercise for universities, IEEE Security & Privacy, vol.3, issue.5, pp.27-33, 2005. ,
, Web application exploits and defenses, 2017.
Operating system penetration, Proceedings of the AFIPS '75 National Computer Conference, pp.361-268, 1975. ,
How the cyber defense exercise shaped an information-assurance curriculum, IEEE Security& Privacy, vol.5, issue.5, pp.40-49, 2007. ,
The outcomes of cybersecurity competitions and implications for underrepresented populations, IEEE Security & Privacy, vol.14, issue.6, pp.90-95, 2016. ,
Preparing for the collegiate cyber defense competition (CCDC): A guide for new teams and recommendations for experienced players, National Cyberwatch Center, 2015. ,
Teaching network security through live exercises, Proceedings of the IFlP TC11/WGll.8 Third Annual World Conference on Information Security Education. IFIP Advances in Information and Communication Technology, vol.125, pp.3-18, 2003. ,
Ten years of iCTF: The good, the bad, and the ugly, Proceedings of the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education. USENIX Association, 2014. ,
Experiences in cyber security education: The MIT lincoln laboratory capture-the-flag exercise, Proceedings of the Fourth Workshop on Cyber Security Experimentation and Test. USENIX Association, 2011. ,