Table of Contents
|
Information Security Education - Adapting to the Fourth Industrial Revolution Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Suné von Solms |
Front Matter |
Securing the Fourth Industrial Revolution Through Programming
|
Analyzing Error Rates in Cryptological Programming Assignments Konstantin Knorr |
3-16 |
SecTutor: An Intelligent Tutoring System for Secure Programming Ida Ngambeki, Matt Bishop, Jun Dai, Phillip Nico, Shiven Mian, Ong Thao, Tran Huynh, Zed Chance, Isslam Alhasan, Motunrola Afolabi |
17-28 |
Cybersecurity in the Fourth Industrial Revolution: Charting the Way Forward in Education
|
How to Overcome Staff Shortage in Professionals for SOCs and NSICs Natalia Miloslavskaya, Alexander Tolstoy |
31-45 |
Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements Steven Furnell, Gregor Langner, Teemu Tokola, Jerry Andriessen, Gerald Quirchmayr, Carmela Luciano |
46-59 |
A Maturity Assessment Model for Cyber Security Education in Europe Silvia Vidor, Carlos E. Budde |
60-74 |
Real-World Cybersecurity-Inspired Capacity Building
|
ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics Sabrina Friedl, Magdalena Glas, Ludwig Englbrecht, Fabian Böhm, Günther Pernul |
77-91 |
South Africa’s Taxi Industry as a Cybersecurity-Awareness Game Changer: Why and How? Petrus Duvenage, Victor Jaquire, Basie Von Solms |
92-106 |
Maritime Cyber Threats Detection Framework: Building Capabilities Georgios Potamos, Savvas Theodoulou, Eliana Stavrou, Stavros Stavrou |
107-129 |
Designed by Inria-IES Team : Hosted by HAL : 
|