NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Šaric-Grgic, Ines; Grubišic, Ani; Šeric, Ljiljana; Robinson, Timothy J. – International Journal of Distance Education Technologies, 2020
The idea of clustering students according to their online learning behavior has the potential of providing more adaptive scaffolding by the intelligent tutoring system itself or by a human teacher. With the aim of identifying student groups who would benefit from the same intervention in AC-ware Tutor, this research examined online learning…
Descriptors: Learning Analytics, Intelligent Tutoring Systems, Grouping (Instructional Purposes), Undergraduate Students