Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 20 |
Descriptor
Computer Security | 20 |
Simulation | 20 |
Computer Networks | 5 |
Computer Software | 5 |
Information Security | 5 |
Information Technology | 5 |
Internet | 5 |
Prevention | 5 |
Telecommunications | 5 |
Data Processing | 4 |
Design | 4 |
More ▼ |
Source
Author
Harry May | 2 |
Travis Atkison | 2 |
Abu Alam | 1 |
Alex Cameron | 1 |
Ashford, Tina | 1 |
Baijian Yang | 1 |
Bao, Fenye | 1 |
Becker, Benjamin | 1 |
Burnham, Joy J. | 1 |
Cai, Chaoli | 1 |
Chang, Hua-Hua | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Research | 8 |
Dissertations/Theses -… | 6 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 2 |
Collected Works - Serial | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Middle Schools | 2 |
Elementary Education | 1 |
Grade 6 | 1 |
Grade 7 | 1 |
Grade 8 | 1 |
Intermediate Grades | 1 |
Junior High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
Finland | 1 |
Florida | 1 |
France | 1 |
India | 1 |
Maryland (Baltimore) | 1 |
Poland | 1 |
Russia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Workman, Michael D.; Luevanos, J. Anthony; Mai, Bin – IEEE Transactions on Education, 2022
Contribution: Based on a previous exploratory study, this research further investigated learning mode contributions from simulations and live competitive activities compared to a traditional classroom, laboratory, and testing approach to instruction in order to assess the applied behavioral contributions of each. Background: Cybersecurity…
Descriptors: Computer Security, Information Security, Computer Science Education, Simulation
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Item Order and Speededness: Implications for Test Fairness in Higher Educational High-Stakes Testing
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Deloris Y. McBride – ProQuest LLC, 2021
As the global need for unfilled cybersecurity positions is projected to reach nearly 3.5 million by 2021, cybercrime proliferates. Talent shortage in cybersecurity continues to reach widespread magnitudes and individuals are inadequately prepared to assume positions requiring significant responsibilities. The challenge of filling the cybersecurity…
Descriptors: Computer Security, Curriculum Design, Career Readiness, Job Skills
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Gersch, Joseph E. – ProQuest LLC, 2013
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…
Descriptors: Computer Security, Internet, Information Technology, Simulation
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Bao, Fenye – ProQuest LLC, 2013
Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…
Descriptors: Telecommunications, Networks, Trust (Psychology), Social Networks
Mancuso, Vincent Francis – ProQuest LLC, 2012
In the modern workplace, collaboration is no longer only a face-to-face process. When working together, it is common for teams to rely on technology and operate across geographic, temporal and cultural boundaries. Most research, when looking at distributed teams, takes a uni-disciplinary perspective and fails to address the entire problem space.…
Descriptors: Interdisciplinary Approach, Teamwork, Cooperation, Group Dynamics
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference
Wright, Vivian H.; Burnham, Joy J.; Inman, Christopher T.; Ogorchock, Heather N. – Journal of Computing in Teacher Education, 2009
This study examined cyberbullying in three distinct phases to facilitate a multifaceted understanding of cyberbullying. The phases included (a) a quantitative survey, (b) a qualitative focus group, and (c) development of educational scenarios/simulations (within the Second Life virtual environment). Phase III was based on adolescent feedback about…
Descriptors: Prevention, Focus Groups, Virtual Classrooms, Bullying
Previous Page | Next Page ยป
Pages: 1 | 2