Abstract is missing.
- A Case Study in Helping Students to Covertly Eat Their ClassmatesRoya Ensafi, Mike Jacobi, Jedidiah R. Crandall. [doi]
- Ten Years of iCTF: The Good, The Bad, and The UglyGiovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, Yan Shoshitaishvili. [doi]
- Elevation of Privilege: Drawing Developers into Threat ModelingAdam Shostack. [doi]
- An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner ReadinessPortia Pusey, David Tobey, Ralph Soule. [doi]
- Class Capture-the-Flag ExercisesJelena Mirkovic, Peter Peterson. [doi]
- Learning Obstacles in the Capture The Flag ModelKevin Chung, Julian Cohen. [doi]
- Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and ResearchTamara Denning, Adam Shostack, Tadayoshi Kohno. [doi]
- SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity EducationMarc Olano, Alan T. Sherman, Linda Oliva, Ryan Cox, Deborah Firestone, Oliver Kubik, Milind Patil, John Seymour, Isaac S. Kohane, Donna Thomas. [doi]
- The Fun and Future of CTFAndy Davis, Tim Leek, Michael Zhivich, Kyle Gwinnup, William Leonard. [doi]
- CyberCIEGE Scenario Design and ImplementationMichael F. Thompson, Cynthia E. Irvine. [doi]
- PicoCTF: A Game-Based Computer Security Competition for High School StudentsPeter Chapman, Jonathan Burket, David Brumley. [doi]