What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences

V Švábenský, J Vykopal, P Čeleda - Proceedings of the 51st ACM …, 2020 - dl.acm.org
Cybersecurity is now more important than ever, and so is education in this field. However,
the cybersecurity domain encompasses an extensive set of concepts, which can be taught in …

Cybersecurity knowledge and skills taught in capture the flag challenges

V Švábenský, P Čeleda, J Vykopal, S Brišáková - Computers & Security, 2021 - Elsevier
Capture the Flag challenges are a popular form of cybersecurity education, where students
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …

SoK: a proposal for incorporating accessible gamified cybersecurity awareness training informed by a systematic literature review

S Das - Proceedings of the workshop on usable security and …, 2022 - papers.ssrn.com
SoK: A Proposal for Incorporating Accessible Gamified Cybersecurity Awareness Training
Informed by a Systematic Literature Revie Page 1 SoK: A Proposal for Incorporating …

An empirical evaluation of llms for solving offensive security challenges

M Shao, B Chen, S Jancheska, B Dolan-Gavitt… - arXiv preprint arXiv …, 2024 - arxiv.org
Capture The Flag (CTF) challenges are puzzles related to computer security scenarios. With
the advent of large language models (LLMs), more and more CTF participants are using …

Teaching a hands-on mobile and wireless cybersecurity course

TJ OConnor, C Stricklan - Proceedings of the 26th ACM Conference on …, 2021 - dl.acm.org
The combination of theory-based and practical hands-on learning represents a powerful
approach for cybersecurity education. Placing the student in the adversarial mindset …

Impact of capture the flag (CTF)-style vs. traditional exercises in an introductory computer security class

SV Cole - Proceedings of the 27th ACM Conference on on …, 2022 - dl.acm.org
The importance of possessing hands-on skills in addition to theoretical knowledge for
cybersecurity researchers and professionals cannot be overstated. Computer security …

A Survey of Cybersecurity {Professionals'} Perceptions and Experiences of Safety and Belonging in the Community

S Katcher, L Wang, C Yang, C Messdaghi… - … Symposium on Usable …, 2024 - usenix.org
The cybersecurity workforce lacks diversity; the field is predominately men and White or
Asian, with only 10% identifying as women, Latine, or Black. Previous studies identified …

Hacked: A pedagogical analysis of online vulnerability discovery exercises

D Votipka, E Zhang, ML Mazurek - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Hacking exercises are a common tool for security education, but there is limited investigation
of how they teach security concepts and whether they follow pedagogical best practices …

Compete, collaborate, investigate: exploring the social structures of open source intelligence investigations

Y Belghith, S Venkatagiri, K Luther - … of the 2022 CHI Conference on …, 2022 - dl.acm.org
Online investigations are increasingly conducted by individuals with diverse skill levels and
experiences, with mixed results. Novice investigations often result in vigilantism or doxxing …

Automatic Problem Generation for CTF-Style Assessments in IT Forensics Courses

S Minagar, A Sakzad - Proceedings of the 2023 Conference on …, 2023 - dl.acm.org
In this experience paper, we present an automated assessment and marking generation
framework to create capture-the-flag (CTF) questions in the context of Information …