CN113627723B - Data layer system of information security attack and defense platform - Google Patents

Data layer system of information security attack and defense platform Download PDF

Info

Publication number
CN113627723B
CN113627723B CN202110754484.9A CN202110754484A CN113627723B CN 113627723 B CN113627723 B CN 113627723B CN 202110754484 A CN202110754484 A CN 202110754484A CN 113627723 B CN113627723 B CN 113627723B
Authority
CN
China
Prior art keywords
module
questions
score
competition
participants
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110754484.9A
Other languages
Chinese (zh)
Other versions
CN113627723A (en
Inventor
彭铭
李克坤
冯金龙
许大辰
朱琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunzhi Xin'an Security Technology Co ltd
Original Assignee
Zhengzhou Yunzhi Xin'an Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunzhi Xin'an Security Technology Co ltd filed Critical Zhengzhou Yunzhi Xin'an Security Technology Co ltd
Priority to CN202110754484.9A priority Critical patent/CN113627723B/en
Publication of CN113627723A publication Critical patent/CN113627723A/en
Application granted granted Critical
Publication of CN113627723B publication Critical patent/CN113627723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis

Abstract

The invention discloses a data layer system of an information security attack and defense platform, which comprises a common sense score competition module, a man-machine competition module, a competition module and a simulation competition module, wherein the common sense score competition module is firstly entered for common sense score competition, then the man-machine competition module is entered for man-machine competition, then the competition module is entered for competition, and finally the simulation competition module is entered for simulation competition, and the common sense score competition module is entered for simulation competition: the database of the common sense integrating module is used for setting up common sense selection questions, then the selection questions are sequentially arranged, then the first selection questions are sequentially popped up, after the first selection questions are selected and determined, the next selection questions are entered until all the selection questions are completed or the appointed time is reached, and then the correct options are converted into two scores and recorded into the database of the common sense integrating module. The invention relates to the technical field of information security attack and defense, which improves learning fun of users and better meets use requirements.

Description

Data layer system of information security attack and defense platform
Technical Field
The invention relates to the technical field of information security attack and defense, in particular to a data layer system of an information security attack and defense platform.
Background
The common information security attack and defense is boring, and is difficult to arouse the fun of the participants, so that the learning atmosphere of the dead back is caused, and the information security consciousness is not improved by the user, so that a scheme capable of relieving the problems is urgently needed.
Disclosure of Invention
The invention aims to provide a data layer system of an information security attack and defense platform so as to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions: the data layer system of the information security attack and defense platform comprises a common sense integration competition module, a man-machine robbery competition module, a mutual challenge module and a simulation challenge module; firstly, entering a common sense score competition module to carry out common sense score competition, then entering a man-machine score competition module to carry out man-machine score competition, then entering a mutual challenge competition module to carry out mutual challenge competition, and finally entering a simulation challenge competition module to carry out simulation challenge competition; common sense integration module: the database of the common sense integrating module is used for setting up common sense selection questions, sequentially arranging the selection questions, sequentially popping up first selection questions, entering the next selection questions after the first selection questions are selected and determined until all the selection questions are completed or the appointed time is reached, converting the correct options into two scores and recording the two scores into the database of the common sense integrating module; the highest scoring person is defined as common sense score match score, and the highest speed is calculated as score after a plurality of persons obtain the same score; a man-machine robbery and separation module: the method comprises the steps of calling out selection questions in a database of a man-machine robbery and match module, randomly assigning the selection questions to computers of participants in a triplet mode to display, enabling the participants to select one of the questions to enter, enabling the participants to have a discard option, automatically returning to the options of the remaining two questions after selecting and confirming, clicking the replacement questions when a user decides to replace the question group, enabling the system to remove the answered questions and the current questions, reserving the questions discarded by other participants, assigning the questions again to pop up until the questions are selected, or reaching a designated time, and enabling the power and the protection to be exchanged again; when one question is abandoned by the owner, the correct question is judged to be three, the wrong question is deducted by one, and the abandoning option is not deducted; the highest scoring person is defined as the name of the man-machine robotically-distributed racing man, when multiple people get the same score, and (5) calculating the highest speed as the name of the man-machine robotically-distributed racing man.
Preferably, the challenge module: the method comprises the steps of calling a question library of a mutual-query countermeasure module, assigning the question library to a participant computer for display, and popping up a participant code number after participant choosing questions are confirmed, assigning the chosen questions to computers of corresponding participants for display after the participant choosing questions are confirmed, deducting two points from an opponent after answering one question, obtaining three points from the opponent, deducting three points from the opponent after answering the wrong question; the highest scoring person obtains the name of the opponent.
Preferably, the analog countermeasure module: the attack party selects a computer of a sample virus attack defending party, the defending party adopts a corresponding script to check and kill, and five points are acquired after the defending party checks and kills successfully, and five points are deducted from defending failure; the work and protection exchange is carried out again; the highest scoring person obtains the analogue counterman scale number; the total score is calculated, ranked, and pushed to the participants' computers.
Preferably, after the participants complete the questions of other people, the inter-question countermeasure entering module jumps out of the questions dispatched by the participants when free time exists, and the questions dispatched by the participants are added with a score, and the questions are not added with a score or subtracted from each other.
Preferably, the inter-query countermeasure module pops up a investigation opponent field score bar graph at present, prompts to deduct a score for investigation after clicking, deducts a score after clicking, and increases consumption to deduct two scores when a second opponent needs to be detected, and the deduction score is equal to the superposition of the number of the detected opponents.
Preferably, the simulated countering module pops up a detection button after entering the interface, pops up two options of continuous detection and single detection after clicking by the participant, deducts a score for the single detection, displays the score states of all opponents when clicking, and converts the button into a button without deduction after selecting the continuous detection, and deducts ten minutes.
Preferably, after the simulated countermeasure module enters the investigation state, the two participant scores closest to the self score are displayed in a protruding manner.
Compared with the prior art, the invention has the following beneficial effects:
the knowledge level of the participants to the common knowledge is inspected through a common sense score competition module, the judgment and selection capability of the participants is trained through a man-machine score competition module, the interests of the participants and opponents are trained through a mutual challenge competition module, the immersive training effect is achieved through a simulation competition module, the information safety consciousness of the participants and audiences is improved while enjoying through a game mode, the boring study is avoided, and the consciousness and the interest of people to the information safety protection are also improved; the method has the advantages that the method for classifying the self questions by answering provides choices for the user to select defending or attack, the defending picks the questions of the user to answer, and the attack picks high difficulty to drop the opponents, so that the game fun is further improved; the adoption of the deduction type detection is convenient for the user to select and use according to the situation of the user, and the stimulation of the game is increased; the investigation playing method of the countermeasure module is simulated, so that the operability and the playing fun of the countermeasure content are improved; by displaying opponents with scores similar to that of the opponents, the user can observe and formulate strategies conveniently.
Drawings
Fig. 1 is a schematic flow structure of the present invention.
In the figure: 1. a common sense integration module; 2. a man-machine robbery and competition module; 3. a challenge-challenge module; 4. and simulating a countermeasure module.
Detailed Description
The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments.
In the description of the present invention, it should be understood that the terms "upper," "lower," "front," "rear," "left," "right," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships in which the present invention is expressed or positional relationships, merely for convenience in describing and simplifying the description, and do not indicate or imply that the apparatus or elements being referred to must have a particular orientation, be configured and operated in a particular orientation, and thus should not be construed as limiting the present invention.
Referring to fig. 1, an embodiment of the present invention is provided: the data layer system of the information security attack and defense platform comprises a common sense integration competition module 1, a man-machine robbery competition module 2, a mutual challenge countermeasure module 3 and a simulation countermeasure module 4; firstly, entering a common sense score competition module 1 to carry out common sense score competition, then entering a man-machine score competition module 2 to carry out man-machine score competition, then entering a challenge module 3 to carry out challenge competition, and finally entering a simulation challenge module 4 to carry out simulation challenge competition; common sense integration module 1: the database of the common sense integrating module 1 is used for setting up common sense selection questions, then the selection questions are sequentially arranged, then a first selection question is popped up in sequence, after the first selection question is selected and determined, the next selection question is entered until all the selection questions are completed or the appointed time is reached, and then the correct options are converted into two scores and recorded into the database of the common sense integrating module 1; the highest scoring person is defined as common sense score match score, and the highest speed is calculated as score after a plurality of persons obtain the same score; and a man-machine robbery and match module 2: the method comprises the steps of calling out selection questions in a database of a man-machine robbery and match module 2, randomly assigning the selection questions to computers of participants in a triplet mode to display, enabling the participants to select one of the questions to enter, enabling the participants to have a discard option, automatically returning to the options of the remaining two questions after selecting and confirming, clicking the replacement questions when a user decides to replace the question group, enabling a system to remove the answered questions and the current questions, reserving the questions discarded by other participants, assigning the questions again to pop up until the questions are selected, or reaching a designated time, and enabling the power and the protection to be exchanged again; when one question is abandoned by the owner, the correct question is judged to be three, the wrong question is deducted by one, and the abandoning option is not deducted; the highest scoring person is defined as the name of the man-machine robotically-distributed racing man, when multiple people get the same score, and (5) calculating the highest speed as the name of the man-machine robotically-distributed racing man.
Inter-challenge countermeasure module 3: the question bank of the mutual challenge module 3 is called and allocated to a participant computer for display, the participant selects the questions to be confirmed, then the participant code number is popped up, when the participant selects the participants and confirms, the selected questions are allocated to the computers of the corresponding participants for display, when the opponent answers one question, the opponent deducts two points, the opponent obtains three points, when the opponent answers the wrong, the opponent deducts three points; the highest scoring person obtains the name of the opponent.
Analog countermeasure module 4: the attack party selects a computer of a sample virus attack defending party, the defending party adopts a corresponding script to check and kill, and five points are acquired after the defending party checks and kills successfully, and five points are deducted from defending failure; the work and protection exchange is carried out again; the highest scoring person obtains the analogue counterman scale number; calculating total scores, ranking the total scores of the participants, and pushing the total scores to the computers of the participants; the knowledge level of the participants to the common knowledge is inspected through the common sense score competition module 1, the judgment and selection capability of the participants is trained through the man-machine score competition module 2, the fun of the participants and the opponents is trained through the mutual challenge competition module 3, the immersive training effect is achieved through the simulation competition module 4, the information safety consciousness of the participants and the audience is improved while enjoying through a game mode, the boring study is avoided, and the consciousness and the interest of the people to the information safety protection are also improved.
After the participants complete the questions of other people, the inter-question countermeasure module 3 is entered, when free time exists, the questions dispatched by the participants are jumped out, the questions dispatched by the participants are added with a score, and the questions are not answered without adding a score or subtracting a score; the method has the advantages that the method for classifying the self questions by answering provides choices for the user to select defending or attacking, the defending picks the questions of the user to answer, the attacking picks high difficulty and lets opponents drop the scores, and the game fun is further improved.
The mutual challenge module 3 pops up a scoring bar chart of the field of the investigation opponent at present, prompts deducting a score for investigation after clicking, deducts a score after clicking, increases the consumption to deduct two scores when the second opponent needs to be detected, and promotes the overlapping of opponents with the deduction score equal to the investigation; the adoption of the deduction type detection facilitates the selection and use of users according to the self situation, and the stimulation of the game is increased.
The simulated countermeasure module 4 pops up a detection button after entering an interface, pops up two options of continuous detection and single detection after clicking by a participant, deducts a score for the single detection, displays the score states of all opponents when clicking, and converts the button into a button without deduction after selecting the continuous detection, and deducts ten minutes; by simulating the investigation playing method of the countermeasure module 4, the operability and the playing fun of the countermeasure content are improved.
After the simulated countermeasure module 4 enters a investigation state, two participant scores closest to the self score are convexly displayed; by displaying opponents with scores similar to that of the opponents, the user can observe and formulate strategies conveniently.
Working principle: the knowledge level of the participants to the common knowledge is inspected through the common sense score competition module 1, the judgment and selection capability of the participants is trained through the man-machine score competition module 2, the fun of the participants and the opponents is trained through the mutual challenge competition module 3, the immersive training effect is achieved through the simulation competition module 4, the information safety consciousness of the participants and the audience is improved while enjoying through a game mode, the boring study is avoided, and the consciousness and the interest of the people to the information safety protection are also improved; the method has the advantages that the method for classifying the self questions by answering provides choices for the user to select defending or attack, the defending picks the questions of the user to answer, and the attack picks high difficulty to drop the opponents, so that the game fun is further improved; the adoption of the deduction type detection is convenient for the user to select and use according to the situation of the user, and the stimulation of the game is increased; by simulating the investigation playing method of the countermeasure module 4, the operability and the playing fun of the countermeasure content are improved; by displaying opponents with scores similar to that of the opponents, the user can observe and formulate strategies conveniently.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (1)

1. The utility model provides an information security attacks data layer system of defending platform which characterized in that: the system comprises a common sense integrating and competing module (1), a man-machine robbing and competing module (2), a mutual challenge module (3) and a simulation challenge module (4); firstly, entering a common sense score competition module (1) to carry out common sense score competition, then entering a man-machine score competition module (2) to carry out man-machine score competition, then entering a mutual challenge competition module (3) to carry out mutual challenge competition, and finally entering a simulation challenge competition module (4) to carry out simulation challenge competition; common sense integration match module (1): the database of the common sense integrating module (1) is used for calling out common sense selection questions, then the selection questions are sequentially arranged, then a first selection question is popped up in sequence, after the first selection question is selected and determined, the next selection question is entered until all the selection questions are completed or the appointed time is reached, and then the correct options are converted into two scores and recorded into the database of the common sense integrating module (1); the highest scoring person is defined as common sense score match score, and the highest speed is calculated as score after a plurality of persons obtain the same score; man-machine robbery and match module (2): the method comprises the steps of calling out selection questions in a database of a man-machine robbery and match module (2), randomly assigning the selection questions to computers of participants in a triplet mode to display, enabling the participants to select one of the questions to enter, enabling the participants to have a discard option, automatically returning to the options of the remaining two topics after selecting and confirming, clicking the replacement questions when a user decides to replace a question group, enabling a system to remove the answered questions and the current questions, reserving the questions discarded by other participants, assigning the questions again to pop up until the questions are selected, or reaching a designated time, and enabling the work and the prevention to be exchanged again; when one question is abandoned by the owner, the correct question is judged to be three, the wrong question is deducted by one, and the abandoning option is not deducted; the highest scoring person is defined as the name of the man-machine robotically-divided racing man, and after multiple persons obtain the same integral, the highest speed is calculated as the name of the man-machine robotically-divided racing man, and the method is characterized in that: inter-query challenge module (3): the question library of the inter-question countermeasure module (3) is called and allocated to the computers of the participants for display, the participant marks the questions after the participant marks the questions, the participant marks the questions after the participant marks the participant and determines the questions, the marked questions are allocated to the computers of the corresponding participants for display, the opponent deducts two points after answering one question, the opponent obtains three points after answering the wrong opponent,
deducting three points from the opponent; the highest scoring person obtains the name of the opponent of the interaction, which is characterized in that: analog countermeasure module (4): the attack party selects a computer of a sample virus attack defending party, the defending party adopts a corresponding script to search and kill, and the defending party searches and kills the virus attack defending partyAcquiring five points after work, deducting five points from defense failure; the work and protection exchange is carried out again; the highest scoring person obtains the analogue counterman scale number; calculating total scores, ranking the total scores of participants, pushing the total scores to a participant computer, entering a mutual challenge module (3), after the participants finish answering questions of other people, jumping out of questions dispatched by the participants when free time exists, answering to add a score to the questions dispatched by the participants, answering neither the score nor the score, the mutual challenge module (3) enters the current dispatching questions, pops up a investigation opponent field score bar graph, prompts to deduct a score for investigation after clicking, deducts a score after clicking, when a second opponent needs to be detected, the consumption is increased to deduct two scores, the deduction score is increased to be equal to the superposition of the opponent scores of the investigation, the simulation challenge module (4) enters an interface, pops up a investigation button after clicking, pops up two options of continuous investigation and single investigation after clicking, deducts a score of all opponents once, changes into a deduction-free button after selecting the continuous investigation, deducts the score, and the score of the opponent, the simulation opponent module (4) enters a state and displays two latest scores of the participants after clicking
CN202110754484.9A 2021-07-05 2021-07-05 Data layer system of information security attack and defense platform Active CN113627723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110754484.9A CN113627723B (en) 2021-07-05 2021-07-05 Data layer system of information security attack and defense platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110754484.9A CN113627723B (en) 2021-07-05 2021-07-05 Data layer system of information security attack and defense platform

Publications (2)

Publication Number Publication Date
CN113627723A CN113627723A (en) 2021-11-09
CN113627723B true CN113627723B (en) 2023-08-15

Family

ID=78379200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110754484.9A Active CN113627723B (en) 2021-07-05 2021-07-05 Data layer system of information security attack and defense platform

Country Status (1)

Country Link
CN (1) CN113627723B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050087681A (en) * 2004-02-27 2005-08-31 김진성 Paticipant stagy competitive quiz management system and the method using wireless communications and communication by wire
WO2017210738A1 (en) * 2016-06-07 2017-12-14 Hosking Graeme Cyber security system and method
CN107730140A (en) * 2017-10-31 2018-02-23 广东电网有限责任公司电力科学研究院 A kind of network security Practice Curriculum evaluation method and system
US9992219B1 (en) * 2014-11-13 2018-06-05 National Technology & Engineering Solutions Of Sandia, Llc Framework and methodology for supply chain lifecycle analytics
KR101918547B1 (en) * 2017-11-28 2018-11-14 주식회사 시큐센 Hacking Defense Contest System That Can Verify Vulnerability Patch
US10410158B1 (en) * 2016-07-29 2019-09-10 Symantec Corporation Systems and methods for evaluating cybersecurity risk
CN111190433A (en) * 2019-12-16 2020-05-22 北京泊松技术有限公司 Unmanned aerial vehicle cluster confrontation competition judging method
CN111639231A (en) * 2020-05-26 2020-09-08 广州锦行网络科技有限公司 Attack and defense confrontation platform automatic scoring method and device based on video identification
CN112381511A (en) * 2020-11-14 2021-02-19 西安热工研究院有限公司 Network security competition dynamic integration method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050087681A (en) * 2004-02-27 2005-08-31 김진성 Paticipant stagy competitive quiz management system and the method using wireless communications and communication by wire
US9992219B1 (en) * 2014-11-13 2018-06-05 National Technology & Engineering Solutions Of Sandia, Llc Framework and methodology for supply chain lifecycle analytics
WO2017210738A1 (en) * 2016-06-07 2017-12-14 Hosking Graeme Cyber security system and method
US10410158B1 (en) * 2016-07-29 2019-09-10 Symantec Corporation Systems and methods for evaluating cybersecurity risk
CN107730140A (en) * 2017-10-31 2018-02-23 广东电网有限责任公司电力科学研究院 A kind of network security Practice Curriculum evaluation method and system
KR101918547B1 (en) * 2017-11-28 2018-11-14 주식회사 시큐센 Hacking Defense Contest System That Can Verify Vulnerability Patch
CN111190433A (en) * 2019-12-16 2020-05-22 北京泊松技术有限公司 Unmanned aerial vehicle cluster confrontation competition judging method
CN111639231A (en) * 2020-05-26 2020-09-08 广州锦行网络科技有限公司 Attack and defense confrontation platform automatic scoring method and device based on video identification
CN112381511A (en) * 2020-11-14 2021-02-19 西安热工研究院有限公司 Network security competition dynamic integration method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
信息安全与对抗竞赛中个人挑战赛的设计方法;潘丽敏;罗森林;张笈;;实验技术与管理(第12期);第209-212页 *

Also Published As

Publication number Publication date
CN113627723A (en) 2021-11-09

Similar Documents

Publication Publication Date Title
Collins et al. The shape of actions: What humans and machines can do
Rosyid et al. Deploying learning materials to game content for serious education game development: A case study
Ash Technologies of captivation: Videogames and the attunement of affect
Witkowski On the digital playing field: How we “do sport” with networked computer games
Calvert et al. Impact of virtual reality on young adults' physiological arousal and aggressive thoughts: Interaction versus observation
O'Donovan Gamification of the games course
US20070281285A1 (en) Educational Interactive Video Game and Method for Enhancing Gaming Experience Beyond a Mobile Gaming Device Platform
Parel et al. Escape from Oblivion: A 3D Hack and Slash Survival Horror Video Game for Promoting Awareness of Persistent Depressive Disorder
Wendel et al. Designing collaborative multiplayer serious games for collaborative learning-escape from wilson island-a multiplayer 3d serious game for collaborative learning in teams
van der Spek Experiments in serious game design: a cognitive approach
CN111260513B (en) Interconnected management system for teaching of children's go
Whalen Cyberathletes’ lived experience of video game tournaments
CN101675460A (en) Card type learning tool, learning device, program for the learning device, and storage medium containing the program
Takaoka et al. A framework of educational control in game-based learning environment
CN113627723B (en) Data layer system of information security attack and defense platform
Van der Spek et al. Attentional cueing in serious games
CN107812382B (en) Method for helping people to learn language
Bizzocchi The role of narrative in educational games and simulations
US20050090303A1 (en) Card game for learning
Morris A survey of methods and issues in ESP research
JPH08276047A (en) Game playing method and game tool
Jindal et al. A Multiplayer Shooting Game Based Simulation For Defence Training
Lertlapnon et al. Protobot: An Educational Game for Algorithmic Thinking
Tan et al. Adaptive game AI for Gomoku
KR102597886B1 (en) Board game tools for promoting awareness using method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant