Cited By
View all- Jois TAlmogbil AKostick LStephenson BStone JBattestilli LRebelsky SShoop L(2024)Root the (Ballot) Box: Designing Security Engineering Courses with E-VotingProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 210.1145/3626253.3635518(1696-1697)Online publication date: 14-Mar-2024
- Petullo W(2022)Courses as Code: The Aquinas Learning SystemProceedings of the 15th Workshop on Cyber Security Experimentation and Test10.1145/3546096.3546099(30-38)Online publication date: 8-Aug-2022
- Wang JBrylow DPerouli DMerkle LDoyle MSheard JSoh LDorn B(2022)Reversing Our Ways from x86 VM Configurations onto ARM-Based Raspberry PisProceedings of the 53rd ACM Technical Symposium on Computer Science Education V. 210.1145/3478432.3499124(1139-1139)Online publication date: 3-Mar-2022
- Show More Cited By