accepted-16

Studying Naive Users and the Insider Threat with SimpleFlow

The Use of Cyber-Defense Exercises in Undergraduate Computing Education