Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Computer Networks | 3 |
Computer Science Education | 3 |
College Students | 2 |
Engineering Education | 2 |
Experiential Learning | 2 |
Internet | 2 |
Laboratories | 2 |
Student Surveys | 2 |
Active Learning | 1 |
Cheating | 1 |
More ▼ |
Source
IEEE Transactions on Education | 5 |
Author
Annessi, Robert | 1 |
Bernhardt, Valentin | 1 |
Copeland, J. A. | 1 |
Fairbanks, K. D. | 1 |
Frkat, Davor | 1 |
Huang, Dijiang | 1 |
Jacobson, Doug | 1 |
Jung, I. Y. | 1 |
Lee, C. P. | 1 |
Luse, Andy | 1 |
Rursch, Julie A. | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 4 |
High Schools | 2 |
Elementary Secondary Education | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Austria (Vienna) | 1 |
Iowa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Rursch, Julie A.; Luse, Andy; Jacobson, Doug – IEEE Transactions on Education, 2010
The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…
Descriptors: Inquiry, Service Learning, Active Learning, High School Students
Jung, I. Y.; Yeom, H. Y. – IEEE Transactions on Education, 2009
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Descriptors: Virtual Classrooms, Internet, Computer Security, Computer Uses in Education