Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Metadata | 3 |
| Computer Networks | 2 |
| Computer Software | 2 |
| Data Analysis | 2 |
| Identification | 2 |
| Information Security | 2 |
| Armed Forces | 1 |
| Assignments | 1 |
| Barriers | 1 |
| College Entrance Examinations | 1 |
| More ▼ | |
Author
| Edwards, John | 1 |
| Handorf, C. Russell | 1 |
| Hart, Kaden | 1 |
| Hayden, Trey | 1 |
| Johnson, Andy | 1 |
| Shrestha, Raj | 1 |
| Smith, Brent | 1 |
| Tolk, Florian | 1 |
Publication Type
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| High Schools | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Utah | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
What Works Clearinghouse Rating
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness

Peer reviewed
Direct link
