Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
ProQuest LLC | 3 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Journal of Technology Studies | 1 |
Author
Amin, Rohan Mahesh | 1 |
Arling, Priscilla A. | 1 |
Cesarini, Lisa McHugh | 1 |
Cesarini, Paul | 1 |
Kamal, Ahmed Tashrif | 1 |
Lori L. Sussman | 1 |
Mark Monnin | 1 |
Paul, Utpal Kumar | 1 |
Schoedel, Eric | 1 |
Villano, Matt | 1 |
Publication Type
Journal Articles | 5 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Opinion Papers | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Copyright Law 1976 | 1 |
Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Kamal, Ahmed Tashrif – ProQuest LLC, 2013
Due to their high fault-tolerance, ease of installation and scalability to large networks, distributed algorithms have recently gained immense popularity in the sensor networks community, especially in computer vision. Multi-target tracking in a camera network is one of the fundamental problems in this domain. Distributed estimation algorithms…
Descriptors: Computer Networks, Mathematics, Computation, Information Transfer
Paul, Utpal Kumar – ProQuest LLC, 2012
Since the days Internet traffic proliferated, measurement, monitoring and analysis of network traffic have been critical to not only the basic understanding of large networks, but also to seek improvements in resource management, traffic engineering and security. At the current times traffic in wireless local and wide area networks are facing…
Descriptors: Computer Networks, Telecommunications, Information Networks, Handheld Devices
Arling, Priscilla A. – Journal of Information Systems Education, 2009
One way to bring concepts to life in an introductory data networks course is for students to physically build a network that addresses a real business problem. However it can be challenging to find a suitable business problem, particularly if the network can exist only during the class period. This case presents a realistic business scenario and…
Descriptors: Information Technology, Internet, Computer Networks, Teamwork
Schoedel, Eric – EDUCAUSE Quarterly, 2009
Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…
Descriptors: Computer Networks, Telecommunications, Statewide Planning, Technology Planning
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering