Loading [a11y]/accessibility-menu.js
Richard E. Woods - IEEE Xplore Author Profile

Showing 1-3 of 3 results

Filter Results

Show

Results

Although advocates promote cybersecurity competitions as beneficial for participants, little research has methodically evaluated these competitions' outcomes and implications. Drawing primarily on Cybersecurity Competition Federation workshops, literature reviews, and outcomes of similar STEM competitions, the authors consider how cybersecurity competitions might increase student awareness of cybe...Show More

Security through play

Mark Gondree;Zachary N.J. Peterson;Tamara Denning

IEEE Security & Privacy
Year: 2013 | Volume: 11, Issue: 3 | Magazine Article |
Cited by: Papers (29)
The US Naval Postgraduate School and University of Washington each independently developed informal security-themed tabletop games. [d0x3d!] is a board game in which players collaborate as white-hat hackers, tasked to retrieve a set of valuable digital assets held by an adversarial network. Control-Alt-Hack is a card game in which three to six players act as white-hat hackers at a security consult...Show More
Access latency to secondary storage devices is frequently a limiting factor in computer system performance. New storage technologies promise to provide greater storage densities at lower latencies than is currently obtainable with hard disk drives. MEMS-based storage devices use orthogonal magnetic or physical recording techniques and thousands of simultaneously active MEMS-based read-write tips t...Show More