Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Švábenský, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.08531  [pdf, other

    cs.LG cs.AI cs.CR cs.CY

    Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments

    Authors: Valdemar Švábenský, Kristián Tkáčik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Čeleda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay

    Abstract: This full paper in the research track evaluates the usage of data logged from cybersecurity exercises in order to predict students who are potentially at risk of performing poorly. Hands-on exercises are essential for learning since they enable students to practice their skills. In cybersecurity, hands-on exercises are often complex and require knowledge of many topics. Therefore, students may mis… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

    Comments: To appear for publication in the FIE 2024 conference proceedings

    ACM Class: K.3

  2. arXiv:2407.20578  [pdf, ps, other

    cs.CL cs.AI cs.CY

    Comparison of Large Language Models for Generating Contextually Relevant Questions

    Authors: Ivo Lodovico Molina, Valdemar Švábenský, Tsubasa Minematsu, Li Chen, Fumiya Okubo, Atsushi Shimada

    Abstract: This study explores the effectiveness of Large Language Models (LLMs) for Automatic Question Generation in educational settings. Three LLMs are compared in their ability to create questions from university slide text without fine-tuning. Questions were obtained in a two-step pipeline: first, answer phrases were extracted from slides using Llama 2-Chat 13B; then, the three models generated question… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

    Comments: Published in Springer ECTEL 2024 conference proceedings

    ACM Class: K.3

  3. arXiv:2407.13053  [pdf, other

    cs.CY cs.AI cs.CL cs.LG

    E2Vec: Feature Embedding with Temporal Information for Analyzing Student Actions in E-Book Systems

    Authors: Yuma Miyazaki, Valdemar Švábenský, Yuta Taniguchi, Fumiya Okubo, Tsubasa Minematsu, Atsushi Shimada

    Abstract: Digital textbook (e-book) systems record student interactions with textbooks as a sequence of events called EventStream data. In the past, researchers extracted meaningful features from EventStream, and utilized them as inputs for downstream tasks such as grade prediction and modeling of student behavior. Previous research evaluated models that mainly used statistical-based features derived from E… ▽ More

    Submitted 24 May, 2024; originally announced July 2024.

    Comments: Published in proceedings of the 17th Educational Data Mining Conference (EDM 2024)

  4. Evaluating Algorithmic Bias in Models for Predicting Academic Performance of Filipino Students

    Authors: Valdemar Švábenský, Mélina Verger, Maria Mercedes T. Rodrigo, Clarence James G. Monterozo, Ryan S. Baker, Miguel Zenon Nicanor Lerias Saavedra, Sébastien Lallé, Atsushi Shimada

    Abstract: Algorithmic bias is a major issue in machine learning models in educational contexts. However, it has not yet been studied thoroughly in Asian learning contexts, and only limited work has considered algorithmic bias based on regional (sub-national) background. As a step towards addressing this gap, this paper examines the population of 5,986 students at a large university in the Philippines, inves… ▽ More

    Submitted 15 July, 2024; v1 submitted 16 May, 2024; originally announced May 2024.

    Comments: Published in proceedings of the 17th Educational Data Mining Conference (EDM 2024)

    ACM Class: K.3

  5. From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises

    Authors: Valdemar Švábenský, Jan Vykopal, Martin Horák, Martin Hofbauer, Pavel Čeleda

    Abstract: For undergraduate students of computing, learning to solve complex practical problems in a team is an essential skill for their future careers. This skill is needed in various fields, such as in cybersecurity and IT governance. Tabletop exercises are an innovative teaching method used in practice for training teams in incident response and evaluation of contingency plans. However, tabletop exercis… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: Published in ACM ITiCSE 2024 conference proceedings, see https://doi.org/10.1145/3649217.3653639

    ACM Class: K.3

  6. Research and Practice of Delivering Tabletop Exercises

    Authors: Jan Vykopal, Pavel Čeleda, Valdemar Švábenský, Martin Hofbauer, Martin Horák

    Abstract: Tabletop exercises are used to train personnel in the efficient mitigation and resolution of incidents. They are applied in practice to support the preparedness of organizations and to highlight inefficient processes. Since tabletop exercises train competencies required in the workplace, they have been introduced into computing courses at universities as an innovation, especially within cybersecur… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Published in ACM ITiCSE 2024 conference proceedings, see https://doi.org/10.1145/3649217.3653642

    ACM Class: K.3

  7. Comparison of Three Programming Error Measures for Explaining Variability in CS1 Grades

    Authors: Valdemar Švábenský, Maciej Pankiewicz, Jiayi Zhang, Elizabeth B. Cloude, Ryan S. Baker, Eric Fouh

    Abstract: Programming courses can be challenging for first year university students, especially for those without prior coding experience. Students initially struggle with code syntax, but as more advanced topics are introduced across a semester, the difficulty in learning to program shifts to learning computational thinking (e.g., debugging strategies). This study examined the relationships between student… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: Published in ACM ITiCSE 2024 conference proceedings, see https://doi.org/10.1145/3649217.3653563

    ACM Class: K.3

  8. Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering

    Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Kristián Tkáčik, Daniel Popovič

    Abstract: Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows collecting data about trainees' interactions with the… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: Published in Springer Education and Information Technologies, see https://link.springer.com/article/10.1007/s10639-022-10954-4

    ACM Class: K.3

    Journal ref: Education and Information Technologies, volume 27, pages 9231-9262 (2022)

  9. Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training

    Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Lydia Kraus

    Abstract: Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating over the network, and engaging with the training e… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: Published in Springer Education and Information Technologies, see https://link.springer.com/article/10.1007/s10639-022-11093-6

    ACM Class: K.3

    Journal ref: Education and Information Technologies, volume 27, pages 12179-12212 (2022)

  10. Towards Generalizable Detection of Urgency of Discussion Forum Posts

    Authors: Valdemar Švábenský, Ryan S. Baker, Andrés Zambrano, Yishan Zou, Stefan Slater

    Abstract: Students who take an online course, such as a MOOC, use the course's discussion forum to ask questions or reach out to instructors when encountering an issue. However, reading and responding to students' questions is difficult to scale because of the time needed to consider each message. As a result, critical issues may be left unresolved, and students may lose the motivation to continue in the co… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

    Comments: Published in EDM 2023 conference proceedings, see https://educationaldatamining.org/EDM2023/proceedings/2023.EDM-short-papers.29/2023.EDM-short-papers.29.pdf

  11. Want to Raise Cybersecurity Awareness? Start with Future IT Professionals

    Authors: Lydia Kraus, Valdemar Švábenský, Martin Horák, Vashek Matyáš, Jan Vykopal, Pavel Čeleda

    Abstract: As cyber threats endanger everyone, from regular users to computing professionals, spreading cybersecurity awareness becomes increasingly critical. Therefore, our university designed an innovative cybersecurity awareness course that is freely available online for students, employees, and the general public. The course offers simple, actionable steps that anyone can use to implement defensive count… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

    Comments: Published in ACM ITiCSE 2023 conference proceedings, see https://dl.acm.org/doi/10.1145/3587102.3588862

    ACM Class: K.3

  12. Smart Environment for Adaptive Learning of Cybersecurity Skills

    Authors: Jan Vykopal, Pavel Seda, Valdemar Švábenský, Pavel Čeleda

    Abstract: Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical labs, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and background. We designed a unique and novel smart environment f… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: Published in IEEE Transactions on Learning Technologies, see https://ieeexplore.ieee.org/document/9926178

    ACM Class: K.3

    Journal ref: IEEE Transactions on Learning Technologies, Vol. 16, No. 3, June 2023

  13. Reinforcing Cybersecurity Hands-on Training With Adaptive Learning

    Authors: Pavel Seda, Jan Vykopal, Valdemar Švábenský, Pavel Čeleda

    Abstract: This paper presents how learning experience influences students' capability to learn and their motivation for learning. Although each student is different, standard instruction methods do not adapt to individuals. Adaptive learning reverses this practice and attempts to improve the student experience. While adaptive learning is well-established in programming, it is rarely used in cybersecurity ed… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

    Comments: IEEE FIE 2021 conference, 9 pages, 6 figures, 4 tables

    ACM Class: K.3.2

  14. Preventing Cheating in Hands-on Lab Assignments

    Authors: Jan Vykopal, Valdemar Švábenský, Pavel Seda, Pavel Čeleda

    Abstract: Networking, operating systems, and cybersecurity skills are exercised best in an authentic environment. Students work with real systems and tools in a lab environment and complete assigned tasks. Since all students typically receive the same assignment, they can consult their approach and progress with an instructor, a tutoring system, or their peers. They may also search for information on the In… ▽ More

    Submitted 4 January, 2022; originally announced January 2022.

    Comments: ACM SIGCSE 2022 conference, 7 pages, 3 figures, 1 table

    ACM Class: K.3.2

  15. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training

    Authors: Valdemar Švábenský, Jan Vykopal, Daniel Tovarňák, Pavel Čeleda

    Abstract: When learning cybersecurity, operating systems, or networking, students perform practical tasks using a broad range of command-line tools. Collecting and analyzing data about the command usage can reveal valuable insights into how students progress and where they make mistakes. However, few learning environments support recording and inspecting command-line inputs, and setting up an efficient infr… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: IEEE FIE 2021 conference, 9 pages, 5 figure, 3 tables

    ACM Class: K.3.2

  16. Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises

    Authors: Valdemar Švábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Čeleda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay

    Abstract: Cybersecurity students need to develop practical skills such as using command-line tools. Hands-on exercises are the most direct way to assess these skills, but assessing students' mastery is a challenging task for instructors. We aim to alleviate this issue by modeling and visualizing student progress automatically throughout the exercise. The progress is summarized by graph models based on the s… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: ACM SIGCSE 2022 conference, 7 pages, 3 figures

    ACM Class: K.3.2

  17. Scalable Learning Environments for Teaching Cybersecurity Hands-on

    Authors: Jan Vykopal, Pavel Čeleda, Pavel Seda, Valdemar Švábenský, Daniel Tovarňák

    Abstract: This Innovative Practice full paper describes a technical innovation for scalable teaching of cybersecurity hands-on classes using interactive learning environments. Hands-on experience significantly improves the practical skills of learners. However, the preparation and delivery of hands-on classes usually do not scale. Teaching even small groups of students requires a substantial effort to prepa… ▽ More

    Submitted 5 January, 2022; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: IEEE FIE 2021 conference, 9 pages, 6 figures, 1 table

    ACM Class: K.3.2

  18. Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges

    Authors: Valdemar Švábenský, Pavel Čeleda, Jan Vykopal, Silvia Brišáková

    Abstract: Capture the Flag challenges are a popular form of cybersecurity education, where students solve hands-on tasks in an informal, game-like setting. The tasks feature diverse assignments, such as exploiting websites, cracking passwords, and breaching unsecured networks. However, it is unclear how the skills practiced by these challenges match formal cybersecurity curricula defined by security experts… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

    Comments: Published in Elsevier Computers & Security, see https://www.sciencedirect.com/science/article/pii/S0167404820304272 (first available online on December 27, 2020). The article has 32 pages (in the preprint template), 9 figures, and 4 tables

  19. How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run?

    Authors: Renate Motschnig, Michael Silber, Valdemar Švábenský

    Abstract: This Full Paper in the Research-To-Practice Category presents a long-term study about the effects of a student-centered course on communication and professional skills on students' thoughts, attitudes, and behavior. The course is offered at a European university as part of a computer science master's program. This paper shares the design and challenges of a longitudinal study that reaches ten year… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: IEEE FIE 2020 conference, 9 pages, 1 figure, 2 tables

  20. KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems

    Authors: Pavel Čeleda, Jan Vykopal, Valdemar Švábenský, Karel Slavíček

    Abstract: There are different requirements on cybersecurity of industrial control systems and information technology systems. This fact exacerbates the global issue of hiring cybersecurity employees with relevant skills. In this paper, we present KYPO4INDUSTRY training facility and a course syllabus for beginner and intermediate computer science students to learn cybersecurity in a simulated industrial envi… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: ACM SIGCSE 2020 conference, 7 pages, 5 figures, 1 table

    ACM Class: K.3.2

  21. Benefits and Pitfalls of Using Capture the Flag Games in University Courses

    Authors: Jan Vykopal, Valdemar Švábenský, Ee-Chien Chang

    Abstract: The concept of Capture the Flag (CTF) games for practicing cybersecurity skills is widespread in informal educational settings and leisure-time competitions. However, it is not much used in university courses. This paper summarizes our experience from using jeopardy CTF games as homework assignments in an introductory undergraduate course. Our analysis of data describing students' in-game actions… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: ACM SIGCSE 2020 conference, 7 pages, 5 figures, 2 tables

    ACM Class: K.3.2

  22. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training

    Authors: Radek Ošlejšek, Vít Rusňák, Karolína Burská, Valdemar Švábenský, Jan Vykopal, Jakub Čegan

    Abstract: Hands-on training is an effective way to practice theoretical cybersecurity concepts and increase participants' skills. In this paper, we discuss the application of visual analytics principles to the design, execution, and evaluation of training sessions. We propose a conceptual model employing visual analytics that supports the sensemaking activities of users involved in various phases of the tra… ▽ More

    Submitted 7 March, 2020; originally announced March 2020.

  23. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study

    Authors: Radek Ošlejšek, Vít Rusňák, Karolína Burská, Valdemar Švábenský, Jan Vykopal

    Abstract: Capture the Flag games represent a popular method of cybersecurity training. Providing meaningful insight into the training progress is essential for increasing learning impact and supporting participants' motivation, especially in advanced hands-on courses. In this paper, we investigate how to provide valuable post-game feedback to players of serious cybersecurity games through interactive visual… ▽ More

    Submitted 27 August, 2020; v1 submitted 23 December, 2019; originally announced December 2019.

    Comments: 11 pages

  24. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences

    Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda

    Abstract: Cybersecurity is now more important than ever, and so is education in this field. However, the cybersecurity domain encompasses an extensive set of concepts, which can be taught in different ways and contexts. To understand the state of the art of cybersecurity education and related research, we examine papers from the ACM SIGCSE and ACM ITiCSE conferences. From 2010 to 2019, a total of 1,748 pape… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

    Comments: ACM SIGCSE 2020 conference, 7 pages, 3 figures, 1 table

    ACM Class: K.3.2

  25. Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools

    Authors: Valdemar Švábenský, Jan Vykopal

    Abstract: This Work-In-Progress Paper for the Innovative Practice Category presents a novel experiment in active learning of cybersecurity. We introduced a new workshop on hacking for an existing science-popularizing program at our university. The workshop participants, 28 teenagers, played a cybersecurity game designed for training undergraduates and professionals in penetration testing. Unlike in learning… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

    Comments: IEEE FIE 2018 conference, 4 pages, 1 figure, 1 table

    ACM Class: K.3.2

  26. Reflective Diary for Professional Development of Novice Teachers

    Authors: Martin Ukrop, Valdemar Švábenský, Jan Nehyba

    Abstract: Many starting teachers of computer science have great professional skill but often lack pedagogical training. Since providing expert mentorship directly during their lessons would be quite costly, institutions usually offer separate teacher training sessions for novice instructors. However, the reflection on teaching performed with a significant delay after the taught lesson limits the possible im… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

    Comments: ACM SIGCSE 2019 conference, 7 pages, 2 figures

    ACM Class: K.3.2

  27. Enhancing Cybersecurity Skills by Creating Serious Games

    Authors: Valdemar Švábenský, Jan Vykopal, Milan Cermak, Martin Laštovička

    Abstract: Adversary thinking is an essential skill for cybersecurity experts, enabling them to understand cyber attacks and set up effective defenses. While this skill is commonly exercised by Capture the Flag games and hands-on activities, we complement these approaches with a key innovation: undergraduate students learn methods of network attack and defense by creating educational games in a cyber range.… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

    Comments: ACM ITiCSE 2018 conference, 6 pages, 1 figure, 2 tables

    ACM Class: K.3.2

  28. arXiv:1712.03163  [pdf, other

    cs.CY cs.CR cs.HC

    Challenges Arising from Prerequisite Testing in Cybersecurity Games

    Authors: Valdemar Švábenský, Jan Vykopal

    Abstract: Cybersecurity games are an attractive and popular method of active learning. However, the majority of current games are created for advanced players, which often leads to frustration in less experienced learners. Therefore, we decided to focus on a diagnostic assessment of participants entering the games. We assume that information about the players' knowledge, skills, and experience enables tutor… ▽ More

    Submitted 8 December, 2017; originally announced December 2017.

    Comments: ACM SIGCSE 2018 conference, 6 pages, 4 figures, 4 tables