[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review

N Chowdhury, V Gkioulos - Computer Science Review, 2021 - Elsevier
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …

A systematic review of multimedia tools for cybersecurity awareness and education

L Zhang-Kennedy, S Chiasson - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
We conduct a comprehensive review covering academic publications and industry products
relating to tools for cybersecurity awareness and education aimed at non-expert end-users …

A systematic literature review on the cyber security

Y Perwej, SQ Abbas, JP Dixit, N Akhtar… - International Journal of …, 2021 - hal.science
In recent years, the Internet has become an integral element of people's everyday lifestyles
all across the world. Online criminality, on the other hand, has risen in tandem with the …

Phishing threat avoidance behaviour: An empirical investigation

NAG Arachchilage, S Love, K Beznosov - Computers in Human Behavior, 2016 - Elsevier
Phishing is an online identity theft that aims to steal sensitive information such as username,
password and online banking details from its victims. Phishing education needs to be …

Serious games as a tool to model attack and defense scenarios for cyber-security exercises

MM Yamin, B Katt, M Nowostawski - Computers & Security, 2021 - Elsevier
Technology is evolving rapidly; this poses a problem for security specialists and average
citizens as their technological skill sets are quickly made obsolete. This makes the …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

[HTML][HTML] Cybersecurity Enhancement through Blockchain Training (CEBT)–A serious game approach

A Mittal, MP Gupta, M Chaturvedi… - International Journal of …, 2021 - Elsevier
Blockchain technology is increasingly finding traction in diverse areas such as finance,
supply-chain management, and cloud services because of its ability to provide robust …

Successful gamification of cybersecurity training

T van Steen, JRA Deeleman - Cyberpsychology, Behavior, and …, 2021 - liebertpub.com
The behavioral aspect of cybersecurity has gained more attention in recent years. By their
actions, people can improve the security of their devices and organizations, but also hinder …

Exploring cybersecurity education and training techniques: a comprehensive review of traditional, virtual reality, and augmented reality approaches

AM Alnajim, S Habib, M Islam, HS AlRawashdeh… - Symmetry, 2023 - mdpi.com
Considering the alarming increase in cyberattacks and their potential financial implications,
the importance of cybersecurity education and training cannot be overstated. This paper …

A comprehensive cybersecurity learning platform for elementary education

F Giannakas, A Papasalouros… - … Security Journal: A …, 2019 - Taylor & Francis
For elementary students, security and privacy education is anticipated to be more joyful
when the knowledge is delivered in the form of a digital game-based learning activity. This …