CN113627723B - Data layer system of information security attack and defense platform - Google Patents
Data layer system of information security attack and defense platform Download PDFInfo
- Publication number
- CN113627723B CN113627723B CN202110754484.9A CN202110754484A CN113627723B CN 113627723 B CN113627723 B CN 113627723B CN 202110754484 A CN202110754484 A CN 202110754484A CN 113627723 B CN113627723 B CN 113627723B
- Authority
- CN
- China
- Prior art keywords
- module
- questions
- score
- competition
- participants
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
Abstract
The invention discloses a data layer system of an information security attack and defense platform, which comprises a common sense score competition module, a man-machine competition module, a competition module and a simulation competition module, wherein the common sense score competition module is firstly entered for common sense score competition, then the man-machine competition module is entered for man-machine competition, then the competition module is entered for competition, and finally the simulation competition module is entered for simulation competition, and the common sense score competition module is entered for simulation competition: the database of the common sense integrating module is used for setting up common sense selection questions, then the selection questions are sequentially arranged, then the first selection questions are sequentially popped up, after the first selection questions are selected and determined, the next selection questions are entered until all the selection questions are completed or the appointed time is reached, and then the correct options are converted into two scores and recorded into the database of the common sense integrating module. The invention relates to the technical field of information security attack and defense, which improves learning fun of users and better meets use requirements.
Description
Technical Field
The invention relates to the technical field of information security attack and defense, in particular to a data layer system of an information security attack and defense platform.
Background
The common information security attack and defense is boring, and is difficult to arouse the fun of the participants, so that the learning atmosphere of the dead back is caused, and the information security consciousness is not improved by the user, so that a scheme capable of relieving the problems is urgently needed.
Disclosure of Invention
The invention aims to provide a data layer system of an information security attack and defense platform so as to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions: the data layer system of the information security attack and defense platform comprises a common sense integration competition module, a man-machine robbery competition module, a mutual challenge module and a simulation challenge module; firstly, entering a common sense score competition module to carry out common sense score competition, then entering a man-machine score competition module to carry out man-machine score competition, then entering a mutual challenge competition module to carry out mutual challenge competition, and finally entering a simulation challenge competition module to carry out simulation challenge competition; common sense integration module: the database of the common sense integrating module is used for setting up common sense selection questions, sequentially arranging the selection questions, sequentially popping up first selection questions, entering the next selection questions after the first selection questions are selected and determined until all the selection questions are completed or the appointed time is reached, converting the correct options into two scores and recording the two scores into the database of the common sense integrating module; the highest scoring person is defined as common sense score match score, and the highest speed is calculated as score after a plurality of persons obtain the same score; a man-machine robbery and separation module: the method comprises the steps of calling out selection questions in a database of a man-machine robbery and match module, randomly assigning the selection questions to computers of participants in a triplet mode to display, enabling the participants to select one of the questions to enter, enabling the participants to have a discard option, automatically returning to the options of the remaining two questions after selecting and confirming, clicking the replacement questions when a user decides to replace the question group, enabling the system to remove the answered questions and the current questions, reserving the questions discarded by other participants, assigning the questions again to pop up until the questions are selected, or reaching a designated time, and enabling the power and the protection to be exchanged again; when one question is abandoned by the owner, the correct question is judged to be three, the wrong question is deducted by one, and the abandoning option is not deducted; the highest scoring person is defined as the name of the man-machine robotically-distributed racing man, when multiple people get the same score, and (5) calculating the highest speed as the name of the man-machine robotically-distributed racing man.
Preferably, the challenge module: the method comprises the steps of calling a question library of a mutual-query countermeasure module, assigning the question library to a participant computer for display, and popping up a participant code number after participant choosing questions are confirmed, assigning the chosen questions to computers of corresponding participants for display after the participant choosing questions are confirmed, deducting two points from an opponent after answering one question, obtaining three points from the opponent, deducting three points from the opponent after answering the wrong question; the highest scoring person obtains the name of the opponent.
Preferably, the analog countermeasure module: the attack party selects a computer of a sample virus attack defending party, the defending party adopts a corresponding script to check and kill, and five points are acquired after the defending party checks and kills successfully, and five points are deducted from defending failure; the work and protection exchange is carried out again; the highest scoring person obtains the analogue counterman scale number; the total score is calculated, ranked, and pushed to the participants' computers.
Preferably, after the participants complete the questions of other people, the inter-question countermeasure entering module jumps out of the questions dispatched by the participants when free time exists, and the questions dispatched by the participants are added with a score, and the questions are not added with a score or subtracted from each other.
Preferably, the inter-query countermeasure module pops up a investigation opponent field score bar graph at present, prompts to deduct a score for investigation after clicking, deducts a score after clicking, and increases consumption to deduct two scores when a second opponent needs to be detected, and the deduction score is equal to the superposition of the number of the detected opponents.
Preferably, the simulated countering module pops up a detection button after entering the interface, pops up two options of continuous detection and single detection after clicking by the participant, deducts a score for the single detection, displays the score states of all opponents when clicking, and converts the button into a button without deduction after selecting the continuous detection, and deducts ten minutes.
Preferably, after the simulated countermeasure module enters the investigation state, the two participant scores closest to the self score are displayed in a protruding manner.
Compared with the prior art, the invention has the following beneficial effects:
the knowledge level of the participants to the common knowledge is inspected through a common sense score competition module, the judgment and selection capability of the participants is trained through a man-machine score competition module, the interests of the participants and opponents are trained through a mutual challenge competition module, the immersive training effect is achieved through a simulation competition module, the information safety consciousness of the participants and audiences is improved while enjoying through a game mode, the boring study is avoided, and the consciousness and the interest of people to the information safety protection are also improved; the method has the advantages that the method for classifying the self questions by answering provides choices for the user to select defending or attack, the defending picks the questions of the user to answer, and the attack picks high difficulty to drop the opponents, so that the game fun is further improved; the adoption of the deduction type detection is convenient for the user to select and use according to the situation of the user, and the stimulation of the game is increased; the investigation playing method of the countermeasure module is simulated, so that the operability and the playing fun of the countermeasure content are improved; by displaying opponents with scores similar to that of the opponents, the user can observe and formulate strategies conveniently.
Drawings
Fig. 1 is a schematic flow structure of the present invention.
In the figure: 1. a common sense integration module; 2. a man-machine robbery and competition module; 3. a challenge-challenge module; 4. and simulating a countermeasure module.
Detailed Description
The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments.
In the description of the present invention, it should be understood that the terms "upper," "lower," "front," "rear," "left," "right," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships in which the present invention is expressed or positional relationships, merely for convenience in describing and simplifying the description, and do not indicate or imply that the apparatus or elements being referred to must have a particular orientation, be configured and operated in a particular orientation, and thus should not be construed as limiting the present invention.
Referring to fig. 1, an embodiment of the present invention is provided: the data layer system of the information security attack and defense platform comprises a common sense integration competition module 1, a man-machine robbery competition module 2, a mutual challenge countermeasure module 3 and a simulation countermeasure module 4; firstly, entering a common sense score competition module 1 to carry out common sense score competition, then entering a man-machine score competition module 2 to carry out man-machine score competition, then entering a challenge module 3 to carry out challenge competition, and finally entering a simulation challenge module 4 to carry out simulation challenge competition; common sense integration module 1: the database of the common sense integrating module 1 is used for setting up common sense selection questions, then the selection questions are sequentially arranged, then a first selection question is popped up in sequence, after the first selection question is selected and determined, the next selection question is entered until all the selection questions are completed or the appointed time is reached, and then the correct options are converted into two scores and recorded into the database of the common sense integrating module 1; the highest scoring person is defined as common sense score match score, and the highest speed is calculated as score after a plurality of persons obtain the same score; and a man-machine robbery and match module 2: the method comprises the steps of calling out selection questions in a database of a man-machine robbery and match module 2, randomly assigning the selection questions to computers of participants in a triplet mode to display, enabling the participants to select one of the questions to enter, enabling the participants to have a discard option, automatically returning to the options of the remaining two questions after selecting and confirming, clicking the replacement questions when a user decides to replace the question group, enabling a system to remove the answered questions and the current questions, reserving the questions discarded by other participants, assigning the questions again to pop up until the questions are selected, or reaching a designated time, and enabling the power and the protection to be exchanged again; when one question is abandoned by the owner, the correct question is judged to be three, the wrong question is deducted by one, and the abandoning option is not deducted; the highest scoring person is defined as the name of the man-machine robotically-distributed racing man, when multiple people get the same score, and (5) calculating the highest speed as the name of the man-machine robotically-distributed racing man.
Inter-challenge countermeasure module 3: the question bank of the mutual challenge module 3 is called and allocated to a participant computer for display, the participant selects the questions to be confirmed, then the participant code number is popped up, when the participant selects the participants and confirms, the selected questions are allocated to the computers of the corresponding participants for display, when the opponent answers one question, the opponent deducts two points, the opponent obtains three points, when the opponent answers the wrong, the opponent deducts three points; the highest scoring person obtains the name of the opponent.
Analog countermeasure module 4: the attack party selects a computer of a sample virus attack defending party, the defending party adopts a corresponding script to check and kill, and five points are acquired after the defending party checks and kills successfully, and five points are deducted from defending failure; the work and protection exchange is carried out again; the highest scoring person obtains the analogue counterman scale number; calculating total scores, ranking the total scores of the participants, and pushing the total scores to the computers of the participants; the knowledge level of the participants to the common knowledge is inspected through the common sense score competition module 1, the judgment and selection capability of the participants is trained through the man-machine score competition module 2, the fun of the participants and the opponents is trained through the mutual challenge competition module 3, the immersive training effect is achieved through the simulation competition module 4, the information safety consciousness of the participants and the audience is improved while enjoying through a game mode, the boring study is avoided, and the consciousness and the interest of the people to the information safety protection are also improved.
After the participants complete the questions of other people, the inter-question countermeasure module 3 is entered, when free time exists, the questions dispatched by the participants are jumped out, the questions dispatched by the participants are added with a score, and the questions are not answered without adding a score or subtracting a score; the method has the advantages that the method for classifying the self questions by answering provides choices for the user to select defending or attacking, the defending picks the questions of the user to answer, the attacking picks high difficulty and lets opponents drop the scores, and the game fun is further improved.
The mutual challenge module 3 pops up a scoring bar chart of the field of the investigation opponent at present, prompts deducting a score for investigation after clicking, deducts a score after clicking, increases the consumption to deduct two scores when the second opponent needs to be detected, and promotes the overlapping of opponents with the deduction score equal to the investigation; the adoption of the deduction type detection facilitates the selection and use of users according to the self situation, and the stimulation of the game is increased.
The simulated countermeasure module 4 pops up a detection button after entering an interface, pops up two options of continuous detection and single detection after clicking by a participant, deducts a score for the single detection, displays the score states of all opponents when clicking, and converts the button into a button without deduction after selecting the continuous detection, and deducts ten minutes; by simulating the investigation playing method of the countermeasure module 4, the operability and the playing fun of the countermeasure content are improved.
After the simulated countermeasure module 4 enters a investigation state, two participant scores closest to the self score are convexly displayed; by displaying opponents with scores similar to that of the opponents, the user can observe and formulate strategies conveniently.
Working principle: the knowledge level of the participants to the common knowledge is inspected through the common sense score competition module 1, the judgment and selection capability of the participants is trained through the man-machine score competition module 2, the fun of the participants and the opponents is trained through the mutual challenge competition module 3, the immersive training effect is achieved through the simulation competition module 4, the information safety consciousness of the participants and the audience is improved while enjoying through a game mode, the boring study is avoided, and the consciousness and the interest of the people to the information safety protection are also improved; the method has the advantages that the method for classifying the self questions by answering provides choices for the user to select defending or attack, the defending picks the questions of the user to answer, and the attack picks high difficulty to drop the opponents, so that the game fun is further improved; the adoption of the deduction type detection is convenient for the user to select and use according to the situation of the user, and the stimulation of the game is increased; by simulating the investigation playing method of the countermeasure module 4, the operability and the playing fun of the countermeasure content are improved; by displaying opponents with scores similar to that of the opponents, the user can observe and formulate strategies conveniently.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (1)
1. The utility model provides an information security attacks data layer system of defending platform which characterized in that: the system comprises a common sense integrating and competing module (1), a man-machine robbing and competing module (2), a mutual challenge module (3) and a simulation challenge module (4); firstly, entering a common sense score competition module (1) to carry out common sense score competition, then entering a man-machine score competition module (2) to carry out man-machine score competition, then entering a mutual challenge competition module (3) to carry out mutual challenge competition, and finally entering a simulation challenge competition module (4) to carry out simulation challenge competition; common sense integration match module (1): the database of the common sense integrating module (1) is used for calling out common sense selection questions, then the selection questions are sequentially arranged, then a first selection question is popped up in sequence, after the first selection question is selected and determined, the next selection question is entered until all the selection questions are completed or the appointed time is reached, and then the correct options are converted into two scores and recorded into the database of the common sense integrating module (1); the highest scoring person is defined as common sense score match score, and the highest speed is calculated as score after a plurality of persons obtain the same score; man-machine robbery and match module (2): the method comprises the steps of calling out selection questions in a database of a man-machine robbery and match module (2), randomly assigning the selection questions to computers of participants in a triplet mode to display, enabling the participants to select one of the questions to enter, enabling the participants to have a discard option, automatically returning to the options of the remaining two topics after selecting and confirming, clicking the replacement questions when a user decides to replace a question group, enabling a system to remove the answered questions and the current questions, reserving the questions discarded by other participants, assigning the questions again to pop up until the questions are selected, or reaching a designated time, and enabling the work and the prevention to be exchanged again; when one question is abandoned by the owner, the correct question is judged to be three, the wrong question is deducted by one, and the abandoning option is not deducted; the highest scoring person is defined as the name of the man-machine robotically-divided racing man, and after multiple persons obtain the same integral, the highest speed is calculated as the name of the man-machine robotically-divided racing man, and the method is characterized in that: inter-query challenge module (3): the question library of the inter-question countermeasure module (3) is called and allocated to the computers of the participants for display, the participant marks the questions after the participant marks the questions, the participant marks the questions after the participant marks the participant and determines the questions, the marked questions are allocated to the computers of the corresponding participants for display, the opponent deducts two points after answering one question, the opponent obtains three points after answering the wrong opponent,
deducting three points from the opponent; the highest scoring person obtains the name of the opponent of the interaction, which is characterized in that: analog countermeasure module (4): the attack party selects a computer of a sample virus attack defending party, the defending party adopts a corresponding script to search and kill, and the defending party searches and kills the virus attack defending partyAcquiring five points after work, deducting five points from defense failure; the work and protection exchange is carried out again; the highest scoring person obtains the analogue counterman scale number; calculating total scores, ranking the total scores of participants, pushing the total scores to a participant computer, entering a mutual challenge module (3), after the participants finish answering questions of other people, jumping out of questions dispatched by the participants when free time exists, answering to add a score to the questions dispatched by the participants, answering neither the score nor the score, the mutual challenge module (3) enters the current dispatching questions, pops up a investigation opponent field score bar graph, prompts to deduct a score for investigation after clicking, deducts a score after clicking, when a second opponent needs to be detected, the consumption is increased to deduct two scores, the deduction score is increased to be equal to the superposition of the opponent scores of the investigation, the simulation challenge module (4) enters an interface, pops up a investigation button after clicking, pops up two options of continuous investigation and single investigation after clicking, deducts a score of all opponents once, changes into a deduction-free button after selecting the continuous investigation, deducts the score, and the score of the opponent, the simulation opponent module (4) enters a state and displays two latest scores of the participants after clicking 。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110754484.9A CN113627723B (en) | 2021-07-05 | 2021-07-05 | Data layer system of information security attack and defense platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110754484.9A CN113627723B (en) | 2021-07-05 | 2021-07-05 | Data layer system of information security attack and defense platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113627723A CN113627723A (en) | 2021-11-09 |
CN113627723B true CN113627723B (en) | 2023-08-15 |
Family
ID=78379200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110754484.9A Active CN113627723B (en) | 2021-07-05 | 2021-07-05 | Data layer system of information security attack and defense platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113627723B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050087681A (en) * | 2004-02-27 | 2005-08-31 | 김진성 | Paticipant stagy competitive quiz management system and the method using wireless communications and communication by wire |
WO2017210738A1 (en) * | 2016-06-07 | 2017-12-14 | Hosking Graeme | Cyber security system and method |
CN107730140A (en) * | 2017-10-31 | 2018-02-23 | 广东电网有限责任公司电力科学研究院 | A kind of network security Practice Curriculum evaluation method and system |
US9992219B1 (en) * | 2014-11-13 | 2018-06-05 | National Technology & Engineering Solutions Of Sandia, Llc | Framework and methodology for supply chain lifecycle analytics |
KR101918547B1 (en) * | 2017-11-28 | 2018-11-14 | 주식회사 시큐센 | Hacking Defense Contest System That Can Verify Vulnerability Patch |
US10410158B1 (en) * | 2016-07-29 | 2019-09-10 | Symantec Corporation | Systems and methods for evaluating cybersecurity risk |
CN111190433A (en) * | 2019-12-16 | 2020-05-22 | 北京泊松技术有限公司 | Unmanned aerial vehicle cluster confrontation competition judging method |
CN111639231A (en) * | 2020-05-26 | 2020-09-08 | 广州锦行网络科技有限公司 | Attack and defense confrontation platform automatic scoring method and device based on video identification |
CN112381511A (en) * | 2020-11-14 | 2021-02-19 | 西安热工研究院有限公司 | Network security competition dynamic integration method |
-
2021
- 2021-07-05 CN CN202110754484.9A patent/CN113627723B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050087681A (en) * | 2004-02-27 | 2005-08-31 | 김진성 | Paticipant stagy competitive quiz management system and the method using wireless communications and communication by wire |
US9992219B1 (en) * | 2014-11-13 | 2018-06-05 | National Technology & Engineering Solutions Of Sandia, Llc | Framework and methodology for supply chain lifecycle analytics |
WO2017210738A1 (en) * | 2016-06-07 | 2017-12-14 | Hosking Graeme | Cyber security system and method |
US10410158B1 (en) * | 2016-07-29 | 2019-09-10 | Symantec Corporation | Systems and methods for evaluating cybersecurity risk |
CN107730140A (en) * | 2017-10-31 | 2018-02-23 | 广东电网有限责任公司电力科学研究院 | A kind of network security Practice Curriculum evaluation method and system |
KR101918547B1 (en) * | 2017-11-28 | 2018-11-14 | 주식회사 시큐센 | Hacking Defense Contest System That Can Verify Vulnerability Patch |
CN111190433A (en) * | 2019-12-16 | 2020-05-22 | 北京泊松技术有限公司 | Unmanned aerial vehicle cluster confrontation competition judging method |
CN111639231A (en) * | 2020-05-26 | 2020-09-08 | 广州锦行网络科技有限公司 | Attack and defense confrontation platform automatic scoring method and device based on video identification |
CN112381511A (en) * | 2020-11-14 | 2021-02-19 | 西安热工研究院有限公司 | Network security competition dynamic integration method |
Non-Patent Citations (1)
Title |
---|
信息安全与对抗竞赛中个人挑战赛的设计方法;潘丽敏;罗森林;张笈;;实验技术与管理(第12期);第209-212页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113627723A (en) | 2021-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Collins et al. | The shape of actions: What humans and machines can do | |
Rosyid et al. | Deploying learning materials to game content for serious education game development: A case study | |
Ash | Technologies of captivation: Videogames and the attunement of affect | |
Witkowski | On the digital playing field: How we “do sport” with networked computer games | |
Calvert et al. | Impact of virtual reality on young adults' physiological arousal and aggressive thoughts: Interaction versus observation | |
O'Donovan | Gamification of the games course | |
US20070281285A1 (en) | Educational Interactive Video Game and Method for Enhancing Gaming Experience Beyond a Mobile Gaming Device Platform | |
Parel et al. | Escape from Oblivion: A 3D Hack and Slash Survival Horror Video Game for Promoting Awareness of Persistent Depressive Disorder | |
Wendel et al. | Designing collaborative multiplayer serious games for collaborative learning-escape from wilson island-a multiplayer 3d serious game for collaborative learning in teams | |
van der Spek | Experiments in serious game design: a cognitive approach | |
CN111260513B (en) | Interconnected management system for teaching of children's go | |
Whalen | Cyberathletes’ lived experience of video game tournaments | |
CN101675460A (en) | Card type learning tool, learning device, program for the learning device, and storage medium containing the program | |
Takaoka et al. | A framework of educational control in game-based learning environment | |
CN113627723B (en) | Data layer system of information security attack and defense platform | |
Van der Spek et al. | Attentional cueing in serious games | |
CN107812382B (en) | Method for helping people to learn language | |
Bizzocchi | The role of narrative in educational games and simulations | |
US20050090303A1 (en) | Card game for learning | |
Morris | A survey of methods and issues in ESP research | |
JPH08276047A (en) | Game playing method and game tool | |
Jindal et al. | A Multiplayer Shooting Game Based Simulation For Defence Training | |
Lertlapnon et al. | Protobot: An Educational Game for Algorithmic Thinking | |
Tan et al. | Adaptive game AI for Gomoku | |
KR102597886B1 (en) | Board game tools for promoting awareness using method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |