Cited By
View all- Prümmer Jvan Steen Tvan den Berg B(2024)A systematic review of current cybersecurity training methodsComputers and Security10.1016/j.cose.2023.103585136:COnline publication date: 1-Feb-2024
- Panga RMarwa JNdibwile J(2022)A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers’ Phishing Knowledge, Case of TanzaniaJournal of Cybersecurity and Privacy10.3390/jcp20300242:3(466-489)Online publication date: 22-Jun-2022
- Chowdhury NGkioulos V(2021)Cyber security training for critical infrastructure protectionComputer Science Review10.1016/j.cosrev.2021.10036140:COnline publication date: 1-May-2021
- Show More Cited By