Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities.
Muhammad Rizwan AsgharAndrew Luxton-ReillyPublished in: SIGCSE (2018)
Keyphrases
- intrusion detection system
- reverse engineering
- cyber security
- intrusion detection
- software maintenance
- program understanding
- computer systems
- software engineers
- software engineering
- network security
- legacy systems
- cyber attacks
- dynamic analysis
- reverse engineer
- software systems
- critical infrastructure
- software development
- object oriented
- program slicing
- gene regulatory networks
- legacy software systems
- activity recognition
- learning analytics
- database
- distributed databases
- test cases
- source code
- low cost
- artificial intelligence
- data mining