Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Descriptor
Computer Security | 3 |
Metadata | 3 |
Computer Networks | 2 |
Computer Software | 2 |
Data Analysis | 2 |
Identification | 2 |
Information Security | 2 |
Armed Forces | 1 |
Assignments | 1 |
Barriers | 1 |
College Entrance Examinations | 1 |
More ▼ |
Author
Edwards, John | 1 |
Handorf, C. Russell | 1 |
Hart, Kaden | 1 |
Hayden, Trey | 1 |
Johnson, Andy | 1 |
Shrestha, Raj | 1 |
Smith, Brent | 1 |
Tolk, Florian | 1 |
Publication Type
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
High Schools | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Utah | 1 |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness