Abstract is missing.
- Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education SystemsMarcus Knüpfer, Tore Bierwirth, Lars Stiemert, Matthias Schopp, Sebastian Seeber, Daniela Pöhn, Peter Hillmann. 3-21 [doi]
- Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation ModelsMichail Smyrlis, Konstantinos Fysarakis, George Spanoudakis, George Hatzivasilis. 22-37 [doi]
- A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing EducationRené Röpke, Klemens Koehler, Vincent Drury, Ulrik Schroeder, Martin R. Wolf, Ulrike Meyer. 41-60 [doi]
- Conceptualization of a CyberSecurity Awareness QuizSebastian Pape 0001, Ludger Goeke, Alejandro Quintanar, Kristian Beckers. 61-76 [doi]
- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber RangesChiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh. 79-91 [doi]
- Automatically Protecting Network Communities by Malware EpidemiologyXiao-Si Wang, Jessica Welding, Tek Kan Chung. 92-107 [doi]
- Chasing Botnets: A Real Security Incident InvestigationGeorge Hatzivasilis, Martin Kunc. 111-124 [doi]
- Software System Exploration Using Library Call AnalysisMarinos Tsantekidis, Vassilis Prevelakis. 125-139 [doi]
- A Pattern-Driven Adaptation in IoT Orchestrations to Guarantee SPDI PropertiesManos Papoutsakis, Konstantinos Fysarakis, Manolis Michalodimitrakis, Eftychia Lakka, Nikos Petroulakis, George Spanoudakis, Sotiris Ioannidis. 143-156 [doi]
- Password Management: How Secure Is Your Login Process?George Hatzivasilis. 157-177 [doi]