Sign in

A Tailored Model for Cyber Security Education Utilizing a Cyber Range.

Gregor LangnerFlorian SkopikSteven FurnellGerald Quirchmayr
Published in: ICISSP (2022)
Keyphrases
  • cyber security
  • intrusion detection
  • data mining
  • databases
  • artificial intelligence