Cited By
View all- Fulton SDickerman MGillan MSu-uthai KThompson AYe P(2023)Like a Bee to a Honeypot: A Bug Bounty Capstone ProjectJournal of Computing Sciences in Colleges10.5555/3636971.363697439:2(28-37)Online publication date: 1-Oct-2023
- Armstrong HBishop MArmstrong C(2013)Virtual Penetration Testing: A Joint Education Exercise across Geographic BordersInformation Assurance and Security Education and Training10.1007/978-3-642-39377-8_2(11-19)Online publication date: 2013
- Catuogno LDe Santis A(2008)An internet role-game for the laboratory of network security courseACM SIGCSE Bulletin10.1145/1597849.138433640:3(240-244)Online publication date: 30-Jun-2008
- Show More Cited By