Jan Vykopal

Orcid: 0000-0002-3425-0951

According to our database1, Jan Vykopal authored at least 40 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Smart Environment for Adaptive Learning of Cybersecurity Skills.
IEEE Trans. Learn. Technol., June, 2023

Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms.
Comput. Secur., May, 2023

Want to Raise Cybersecurity Awareness? Start with Future IT Professionals.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

2022
Student assessment in cybersecurity training automated by pattern mining and clustering.
Educ. Inf. Technol., 2022

Applications of educational data mining and learning analytics on data from cybersecurity training.
Educ. Inf. Technol., 2022

Preventing Cheating in Hands-on Lab Assignments.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Designing Adaptive Cybersecurity Hands-on Training.
Proceedings of the IEEE Frontiers in Education Conference, 2022

Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications.
Proceedings of the ACE '22: Australasian Computing Education Conference, Virtual Event, Australia, February 14, 2022

2021
Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training.
IEEE Trans. Vis. Comput. Graph., 2021

Cybersecurity knowledge and skills taught in capture the flag challenges.
Comput. Secur., 2021

Toward Guidelines for Designing Cybersecurity Serious Games.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Scalable Learning Environments for Teaching Cybersecurity Hands-on.
Proceedings of the IEEE Frontiers in Education Conference, 2021

Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training.
Proceedings of the IEEE Frontiers in Education Conference, 2021

Reinforcing Cybersecurity Hands-on Training With Adaptive Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2021

2020
Benefits and Pitfalls of Using Capture the Flag Games in University Courses.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

What Are Cybersecurity Education Papers About?: A Systematic Literature Review of SIGCSE and ITiCSE Conferences.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

2019
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study.
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019

Towards Learning Analytics in Cybersecurity Capture the Flag Games.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2018
Timely Feedback in Unstructured Cybersecurity Exercises.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Challenges Arising from Prerequisite Testing in Cybersecurity Games.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Enhancing cybersecurity skills by creating serious games.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Evaluation of Cyber Defense Exercises Using Visual Analytics Process.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning? (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Exchanging security events: Which and how many alerts can we aggregate?
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

KYPO Cyber Range: Design and Use Cases.
Proceedings of the 12th International Conference on Software Technologies, 2017

Lessons learned from complex hands-on defence exercises in a cyber range.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
On the Design of Security Games: From Frustrating to Engaging Learning.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

2015
Security Monitoring of HTTP Traffic Using Extended Flows.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Similarity as a central approach to flow-based anomaly detection.
Int. J. Netw. Manag., 2014

Cloud-based testbed for simulation of cyber attacks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Detection of DNS Traffic Anomalies in Large Networks.
Proceedings of the Advances in Communication Networking, 2014

Future of DDoS Attacks Mitigation in Software Defined Networks.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2011
NetFlow Based Network Protection.
Proceedings of the Security and Privacy in Communication Networks, 2011

A Flow-Level Taxonomy and Prevalence of Brute Force Attacks.
Proceedings of the Advances in Computing and Communications, 2011

2010
Aspect-Based Attack Detection in Large-Scale Networks.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Improving Host Profiling with Bidirectional Flows.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Netflow based system for NAT detection.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009


  Loading...