What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences V Švábenský, J Vykopal, P Čeleda 🏆 Proceedings of the 51st ACM technical symposium on computer science education, 2020 | 134 | 2020 |
KYPO Cyber Range: Design and Use Cases J Vykopal, R Oslejsek, P Celeda, M Vizvary, D Tovarnak Proceedings of the 12th International Conference on Software Technologies …, 2017 | 133 | 2017 |
Lessons learned from complex hands-on defence exercises in a cyber range J Vykopal, M Vizvary, R Oslejsek, P Celeda, D Tovarnak 2017 IEEE Frontiers in education conference (FIE), 1-8, 2017 | 129 | 2017 |
Cybersecurity knowledge and skills taught in capture the flag challenges V Švábenský, P Čeleda, J Vykopal, S Brišáková Computers & Security 102, 102154, 2021 | 100 | 2021 |
Enhancing cybersecurity skills by creating serious games V Švábenský, J Vykopal, M Cermak, M Laštovička Proceedings of the 23rd Annual ACM Conference on Innovation and Technology …, 2018 | 96 | 2018 |
Kypo–a platform for cyber defence exercises P Čeleda, J Čegan, J Vykopal, D Tovarňák M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber …, 2015 | 69 | 2015 |
Benefits and pitfalls of using capture the flag games in university courses J Vykopal, V Švábenský, EC Chang Proceedings of the 51st ACM Technical symposium on computer science …, 2020 | 56 | 2020 |
Scalable learning environments for teaching cybersecurity hands-on J Vykopal, P Čeleda, P Seda, V Švábenský, D Tovarňák 2021 IEEE Frontiers in Education Conference (FIE), 1-9, 2021 | 54 | 2021 |
Network-based dictionary attack detection J Vykopal, T Plesnik, P Minarik 2009 international conference on future networks, 23-27, 2009 | 52 | 2009 |
Embedded malware-an analysis of the chuck norris botnet P Čeleda, R Krejčí, J Vykopal, M Drašar 2010 European Conference on Computer Network Defense, 3-10, 2010 | 48 | 2010 |
Cloud-based testbed for simulation of cyber attacks D Kouril, T Rebok, T Jirsik, J Cegan, M Drasar, M Vizváry, J Vykopal 2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014 | 41 | 2014 |
On the design of security games: From frustrating to engaging learning J Vykopal, M Barták 2016 USENIX workshop on advances in security education (ASE 16), 2016 | 39 | 2016 |
Netflow based system for NAT detection V Krmicek, J Vykopal, R Krejci Proceedings of the 5th international student workshop on Emerging networking …, 2009 | 39 | 2009 |
Future of ddos attacks mitigation in software defined networks M Vizváry, J Vykopal Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 35 | 2014 |
Kypo4industry: A testbed for teaching cybersecurity of industrial control systems P Čeleda, J Vykopal, V Švábenský, K Slavíček Proceedings of the 51st acm technical symposium on computer science …, 2020 | 32 | 2020 |
Security monitoring of http traffic using extended flows M Husák, P Velan, J Vykopal 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 32 | 2015 |
A flow-level taxonomy and prevalence of brute force attacks J Vykopal International Conference on Advances in Computing and Communications, 666-675, 2011 | 26 | 2011 |
Conceptual model of visual analytics for hands-on cybersecurity training R Ošlejšek, V Rusňák, K Burská, V Švábenský, J Vykopal, J Čegan IEEE transactions on visualization and computer graphics 27 (8), 3425-3437, 2020 | 25 | 2020 |
Exchanging security events: Which and how many alerts can we aggregate? M Husák, M Čermák, M Laštovička, J Vykopal 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017 | 25 | 2017 |
Dataset of shell commands used by participants of hands-on cybersecurity training V Švábenský, J Vykopal, P Seda, P Čeleda Data in Brief 38, 107398, 2021 | 23 | 2021 |