| dc.contributor.author | GHITA, Alexandru-Andrei | |
| dc.contributor.author | CHIROIU, Mihai-Daniel | |
| dc.contributor.author | ȚURCANU, Dinu | |
| dc.date.accessioned | 2026-02-28T10:50:24Z | |
| dc.date.available | 2026-02-28T10:50:24Z | |
| dc.date.issued | 2025 | |
| dc.identifier.citation | GHITA, Alexandru-Andrei; Mihai-Daniel CHIROIU and Dinu ȚURCANU. Evaluating students’ performance in cybersecurity scenarios using binary trees. UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science. 2025, vol. 87, nr. 3, pp. 75-94. ISSN 2286-3540. | en_US |
| dc.identifier.issn | 2286-3540 | |
| dc.identifier.uri | https://repository.utm.md/handle/5014/35514 | |
| dc.description.abstract | Cyber education has become a critical focus in universities worldwide, largely due to the growing shortage of experts that the cybersecurity domain is currently facing. To address this need, it is essential to provide efficient and practical training, with an emphasis on hands-on laboratories and real-world scenarios. This paper explores the process of designing and evaluating a cybersecurity scenario, in the context of Cybersecurity Basics course at UNST POLITEHNICA Bucharest, conducted over two student generations. The final aim of the evaluation is to gather and analyze live scenario statistics and integrate them in form of binary trees, as a term of novelty, consequently understanding the thought process and decisions of each student during the final assessment exam, ultimately maximizing the learning outcome for the next generations. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Politechnica University of Bucharest | en_US |
| dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
| dc.subject | cyber range | en_US |
| dc.subject | cybersecurity | en_US |
| dc.subject | cybersecurity exercise | en_US |
| dc.subject | education | en_US |
| dc.subject | evaluation | en_US |
| dc.title | Evaluating students’ performance in cybersecurity scenarios using binary trees | en_US |
| dc.type | Article | en_US |
The following license files are associated with this item: