NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Robert Beveridge – ProQuest LLC, 2021
With the increase in cybercrime costing organizations financial loss and loss to their reputation, the need to hire qualified and experienced employees is paramount. As the gap in the workforce shortage widens, cybersecurity education and training institutions are struggling to produce a capable workforce with enough experience and skills that…
Descriptors: Crime Prevention, Computer Security, Computer Simulation, Computer Science Education
Keith A. Jordan – ProQuest LLC, 2022
Despite significant cybersecurity policy, a prioritization of funding, and increased cybersecurity workforce training, DoD operational testers continue to find critical cyber vulnerabilities in its Weapon and Control Systems that result in the warfighter's lack of ability to "fight through" when faced with a cyber-contested environment…
Descriptors: Training, Computer Security, Government (Administrative Body), Government Employees
Armstead, Stanley K. – ProQuest LLC, 2017
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Descriptors: Military Personnel, Foreign Countries, Computer Security, Information Security
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Srinivasan, Deepa – ProQuest LLC, 2013
Recent rapid malware growth has exposed the limitations of traditional in-host malware-defense systems and motivated the development of secure virtualization-based solutions. By running vulnerable systems as virtual machines (VMs) and moving security software from inside VMs to the outside, the out-of-VM solutions securely isolate the anti-malware…
Descriptors: Computer Security, Computer Software, Semantics, Computer Simulation
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security