Open Access. Powered by Scholars. Published by Universities.®

Engineering Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering Education

The Afit Engineer, Volume 5, Issue 4, Graduate School Of Engineering And Management, Air Force Institute Of Technology Dec 2023

The Afit Engineer, Volume 5, Issue 4, Graduate School Of Engineering And Management, Air Force Institute Of Technology

AFIT Documents

This issue has a special research feature section by the Autonomy and Navigation Technology Center (ANT) on Demonstration of Alternative Navigation Technologies for Autonomous Aircraft.

Also in this issue:

  • ANT Center lowers DOD dependence on GPS
  • Record number of female Doctorates awarded at AFIT's Fall Commencement
  • D'Azzo Research Library recognized by Library of Congress.
  • Hypersonic vehicle flying qualities assessment
  • Retirement of Dean Badiru

.... and more.


Cyberspace Odyssey: A Competitive Team-Oriented Serious Game In Computer Networking, Kendra Graham [I], James Anderson [I], Conrad Rife [I], Bryce Heitmeyer [I], Pranav R. Patel [*], Scott L. Nykl, Alan C. Lin, Laurence D. Merkle Jul 2020

Cyberspace Odyssey: A Competitive Team-Oriented Serious Game In Computer Networking, Kendra Graham [I], James Anderson [I], Conrad Rife [I], Bryce Heitmeyer [I], Pranav R. Patel [*], Scott L. Nykl, Alan C. Lin, Laurence D. Merkle

Faculty Publications

Cyber Space Odyssey (CSO) is a novel serious game supporting computer networking education by engaging students in a race to successfully perform various cybersecurity tasks in order to collect clues and solve a puzzle in virtual near-Earth 3D space. Each team interacts with the game server through a dedicated client presenting a multimodal interface, using a game controller for navigation and various desktop computer networking tools of the trade for cybersecurity tasks on the game's physical network. Specifically, teams connect to wireless access points, use packet monitors to intercept network traffic, decrypt and reverse engineer that traffic, craft well-formed and …