[[abstract]]In recent years, with the rapid growth of the Internet applications and services, how to construct a secure network environment to cope with the various threats becomes a very important issue. Recently, the KDELab of Asia University has developed the iMonsters card game. In this thesis, we propose an Internet security knowledge building algorithm to build up Internet security knowledge base by collecting and analyzing real Internet security incidents. This knowledge base is then used to help designing the rules and roles of the iMonsters card game. Therefore, students can learn the basic concepts of attacks and defenses via the game playing, where they can play different roles during the game immersive learning. Besides, the kno...
The purpose of this document is to highlight the background, aims and technologies that will be impl...
This paper describes the design process for the cybersecurity serious game “PeriHack” and, in doing ...
With the widespread commercial use of the Internet, secure data communications over the Internet has...
With the continuous development and growth of technology, the number of new internet user is increas...
[[abstract]]Internet phishing attack is increasing and causing enormous economic loss in recent year...
Many universities have started to educate students on how to develop secure software and systems. On...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...
This paper presents the rationale for the design of a card deck game sustaining information security...
In this day and age, the field of information security is becoming more and more important. Develope...
Information security attacks targeting human nature, such as phishing, are rising rapidly. Informati...
Serious games are becoming more popular because they provide an opportunity for learning in a natura...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Over the last few years, many universities and educational institutions have introduced computer sec...
Cyber attacks have been increasing, and there have been many media reports of attacks against large ...
The ability to anticipate the strategic actions of hackers, including where, when, and how they migh...
The purpose of this document is to highlight the background, aims and technologies that will be impl...
This paper describes the design process for the cybersecurity serious game “PeriHack” and, in doing ...
With the widespread commercial use of the Internet, secure data communications over the Internet has...
With the continuous development and growth of technology, the number of new internet user is increas...
[[abstract]]Internet phishing attack is increasing and causing enormous economic loss in recent year...
Many universities have started to educate students on how to develop secure software and systems. On...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...
This paper presents the rationale for the design of a card deck game sustaining information security...
In this day and age, the field of information security is becoming more and more important. Develope...
Information security attacks targeting human nature, such as phishing, are rising rapidly. Informati...
Serious games are becoming more popular because they provide an opportunity for learning in a natura...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Over the last few years, many universities and educational institutions have introduced computer sec...
Cyber attacks have been increasing, and there have been many media reports of attacks against large ...
The ability to anticipate the strategic actions of hackers, including where, when, and how they migh...
The purpose of this document is to highlight the background, aims and technologies that will be impl...
This paper describes the design process for the cybersecurity serious game “PeriHack” and, in doing ...
With the widespread commercial use of the Internet, secure data communications over the Internet has...