Gamification in cybersecurity education; a state of the art review and research agenda

D Pramod - Journal of Applied Research in Higher Education, 2024 - emerald.com
Purpose The growth of the internet, access to technology and rapid digital transformations
have paved the way for developing attack surfaces for individuals and organizations. There …

Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments

V Švábenský, K Tkáčik, A Birdwell, R Weiss… - arXiv preprint arXiv …, 2024 - arxiv.org
This full paper in the research track evaluates the usage of data logged from cybersecurity
exercises in order to predict students who are potentially at risk of performing poorly. Hands …

A novel autonomous container-based platform for cybersecurity training and research

N Chouliaras, I Kantzavelou, L Maglaras… - PeerJ Computer …, 2023 - peerj.com
Cyberattacks, particularly those targeting systems that store or handle sensitive data, have
become more sophisticated in recent years. To face increasing threats, continuous capacity …

Using data clustering to reveal trainees' behavior in cybersecurity education

K Dočkalová Burská, JR Mlynárik… - Education and Information …, 2024 - Springer
In cyber security education, hands-on training is a common type of exercise to help raise
awareness and competence, and improve students' cybersecurity skills. To be able to …

Turning logs into lumber: preprocessing tasks in process mining

Y Liu, V Stein Dani, I Beerepoot, X Lu - International Conference on …, 2023 - Springer
Event logs are invaluable for conducting process mining projects, offering insights into
process improvement and data-driven decision-making. However, data quality issues affect …

Using process mining to leverage the development of a family of mobile applications

LA Rezunik, AI Perevoznikova, DV Eremina… - Труды института …, 2023 - mathnet.ru
Enterprises often provide their services via a family of applications based on various
platforms. Applications in such a family can behave differently. Their development processes …

[HTML][HTML] Hands-on cybersecurity training behavior data for process mining

R Ošlejšek, M Macák, KD Burská - Data in Brief, 2024 - Elsevier
The research on using process mining in learning analytics of cybersecurity exercises relies
on datasets that reflect the real behavior of trainees. Although modern cyber ranges, in …

Detecting Masquerading Traitors from Process Visualization of Computer Usage

M Macak, R Ošlejšek, B Buhnova - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Insider attacks in organizations are currently one of the most crucial cybersecurity
challenges. Traitors are one of the most dangerous types of insider attackers. They are …

A taxonomy of log preprocessing techniques in process mining

Y Liu - 2024 - studenttheses.uu.nl
Context-Process Mining is a discipline that intersects business process management and
data science. Event logs are extracted from information systems and analyzed through …

Применение методов интеллектуального анализа процессов в ходе разработки семейства мобильных приложений

ЛА РЕЗУНИК… - Труды Института …, 2023 - ispranproceedings.elpub.ru
Аннотация Коммерческие предприятия часто предоставляют свои услуги с помощью
семейства приложений, разработанных для работы на различных платформах …