Skip to main content
Conferences
Students
Sign in
Overview
Summit Organizers
Registration Information
Registration Discounts
Venue, Hotel, and Travel
At a Glance
Summit Program
Co-Located Workshops
Activities
Birds-of-a-Feather Sessions
Sponsorship
Students and Grants
Questions?
Help Promote!
For Participants
Call for Participation
Platinum Sponsor
Tweets by @usenix
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
Tweet
connect with us
Twitter
Facebook
LinkedIn
Google+
YouTube
Presentations:
Ten Years of iCTF: The Good, The Bad, and The Ugly
PicoCTF: A Game-Based Computer Security Competition for High School Students
microCorruption: Security Games to Qualify and Hire Job Candidates
The Fun and Future of CTF
Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research
SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education
Class Capture-the-Flag Exercises
An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner Readiness
A Case Study in Helping Students to Covertly Eat Their Classmates
CyberCIEGE Scenario Design and Implementation
connect with us