NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Melkonyan, Arsen – ProQuest LLC, 2013
Location technologies constitute an essential component of systems design for autonomous operations and control. The Global Positioning System (GPS) works well in outdoor areas, but the satellite signals are not strong enough to penetrate inside most indoor environments. As a result, a new strain of indoor positioning technologies that make use of…
Descriptors: Computer Networks, Telecommunications, Educational Technology, Handheld Devices
Sundresh, Sameer – ProQuest LLC, 2009
How do you dynamically customize the programming language available in a context within an existing system, without changing the underlying system? This dissertation introduces a language design approach that addresses this problem. The basic idea is to structure programs as systems of multiple interacting levels of abstraction, where all of the…
Descriptors: Programming Languages, Programming, Internet, Computer System Design
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Mayrath, Michael Charles – ProQuest LLC, 2009
This study examined the effects of manipulating the modality (text-only, voice-only, voice+text) of a tutorial and restriction (restricted vs. unrestricted) of a simulation's interface on retention and transfer of tutorial content. The tutorial prepared novice students to use Packet Tracer, a simulation developed by Cisco that teaches network…
Descriptors: Multiple Choice Tests, Interaction, Educational Technology, Computer Networks