Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Accuracy | 4 |
Computer Security | 4 |
Artificial Intelligence | 2 |
Computer Assisted Testing | 2 |
Computer Software | 2 |
Deception | 2 |
Identification | 2 |
Measurement Techniques | 2 |
Benchmarking | 1 |
COVID-19 | 1 |
Classification | 1 |
More ▼ |
Author
Aruta, John A. | 1 |
Bryson R. Payne | 1 |
Cathryn Allen | 1 |
Choi, Ikkyu | 1 |
Chuck Robertson | 1 |
Deane, Paul | 1 |
Hao, Jiangang | 1 |
Huaibo Wang | 1 |
Qianta Zhu | 1 |
Qinhua Zheng | 1 |
Schembari, N. Paul | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Education Level
Adult Education | 1 |
High School Equivalency… | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Yishen Song; Qianta Zhu; Huaibo Wang; Qinhua Zheng – IEEE Transactions on Learning Technologies, 2024
Manually scoring and revising student essays has long been a time-consuming task for educators. With the rise of natural language processing techniques, automated essay scoring (AES) and automated essay revising (AER) have emerged to alleviate this burden. However, current AES and AER models require large amounts of training data and lack…
Descriptors: Scoring, Essays, Writing Evaluation, Computer Software
Aruta, John A.; Schembari, N. Paul – Journal of Cybersecurity Education, Research and Practice, 2020
We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. As part of the thesis, we studied obfuscation of malware, conversion of files into images, image processing, and machine learning, a process of benefit to both the student and faculty. Malware detection becomes…
Descriptors: Computer Software, Computer Security, Identification, Deception
Choi, Ikkyu; Hao, Jiangang; Deane, Paul; Zhang, Mo – ETS Research Report Series, 2021
"Biometrics" are physical or behavioral human characteristics that can be used to identify a person. It is widely known that keystroke or typing dynamics for short, fixed texts (e.g., passwords) could serve as a behavioral biometric. In this study, we investigate whether keystroke data from essay responses can lead to a reliable…
Descriptors: Accuracy, High Stakes Tests, Writing Tests, Benchmarking