Process Mining Analysis of Puzzle-Based Cybersecurity Training

Add code
Mar 29, 2022
Figure 1 for Process Mining Analysis of Puzzle-Based Cybersecurity Training
Figure 2 for Process Mining Analysis of Puzzle-Based Cybersecurity Training
Figure 3 for Process Mining Analysis of Puzzle-Based Cybersecurity Training
Figure 4 for Process Mining Analysis of Puzzle-Based Cybersecurity Training

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: