메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Active learning with the CyberCIEGE video game

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER GAMES; HUMAN COMPUTER INTERACTION; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 85084164471     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (37)

References (10)
  • 2
    • 20844440409 scopus 로고    scopus 로고
    • CyberCIEGE: Gaming for information assurance
    • IEEE, May-June
    • C.E. Irvine, M.F. Thompson, and K. Allen, "CyberCIEGE: gaming for information assurance", Security & Privacy Magazine, IEEE, May-June 2005, Volume: 3, Issue: 3, page(s): 61- 64, ISSN: 1540-7993
    • (2005) Security & Privacy Magazine , vol.3 , Issue.3 , pp. 61-64
    • Irvine, C.E.1    Thompson, M.F.2    Allen, K.3
  • 4
    • 79951651504 scopus 로고    scopus 로고
    • The Center for Information Systems Security Studies and Research Last accessed 17 April 2010
    • Naval Postgraduate School, The Center for Information Systems Security Studies and Research, “CyberCIEGE Scenario Development Tool User’s Guide”, http://cisr.nps.edu/cyberciege/downloads/sdt.pdf. Last accessed 17 April 2010.
    • CyberCIEGE Scenario Development Tool User’s Guide
  • 5
    • 33745255765 scopus 로고    scopus 로고
    • GameFlow: A model for evaluating player enjoyment in games
    • July Last accessed 8 April 2011
    • Sweetser, P. and Wyeth, P. GameFlow: A model for evaluating player enjoyment in games. Computers In Entertainment 3, 3 (July 2005), http://portal.acm.org/ft_gateway.cfm?id=1077253&type=pdf&CFID=15529450&CFTOKEN=70343664 Last accessed 8 April 2011.
    • (2005) Computers in Entertainment , vol.3 , pp. 3
    • Sweetser, P.1    Wyeth, P.2
  • 6
    • 20844444392 scopus 로고    scopus 로고
    • Expressing an information security policy within a security simulation game
    • Naval Postgraduate School, Monterey, California, July 12-16
    • C.E. Irvine, and M.F. Thompson, "Expressing an information security policy within a security simulation game", Proceedings of the Sixth Workshop on Education in Computer Security (WECS6), Naval Postgraduate School, Monterey, California, July 12-16 2004, pp. 43-49
    • (2004) Proceedings of the Sixth Workshop on Education in Computer Security (WECS6) , pp. 43-49
    • Irvine, C.E.1    Thompson, M.F.2
  • 7
    • 85080615697 scopus 로고    scopus 로고
    • Simulation of PKI-enabled communication for identity management using CyberCIEGE
    • C.E Irvine, and M.F. Thompson, “Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE”, The 2010 Military Communications Conference, pp. 1758-1763.
    • The 2010 Military Communications Conference , pp. 1758-1763
    • Irvine, C.E.1    Thompson, M.F.2
  • 8
    • 27544500148 scopus 로고    scopus 로고
    • Video games and the future of learning
    • K. R, October
    • D.W. Shaffer, K.R. Squire, K. R., R. Halverson, and J.P. Gee, Video Games and the Future of Learning, Phi Delta Kappan, Vol. 87, No. 02 (October 2005): pp. 104-111.
    • (2005) Phi Delta Kappan , vol.87 , Issue.2 , pp. 104-111
    • Shaffer, D.W.1    Squire, K.R.2    Halverson, R.3    Gee, J.P.4
  • 9
    • 77952681157 scopus 로고    scopus 로고
    • A comparative study of CyberCIEGE game and department of defense information assurance awareness video
    • 18-21 March
    • J. Jones., X. Yuan; E. Carr, H. Yu, "A comparative study of CyberCIEGE game and Department of Defense Information Assurance Awareness video," IEEE SoutheastCon 2010 (SoutheastCon), Proceedings of the, vol., no., pp.176-180, 18-21 March 2010
    • (2010) IEEE SoutheastCon 2010 (SoutheastCon), Proceedings of the , pp. 176-180
    • Jones, J.1    Yuan, X.2    Carr, E.3    Yu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.