NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Roble, Amanda Jean – ProQuest LLC, 2015
The use of formative assessment can increase student achievement (Black & Wiliam, 1998a). However, some of the challenges of incorporating formative assessment into instruction include the length of time needed to collect, assess and provide feedback to all students and dealing with students misunderstandings and incorrect answers that are…
Descriptors: Formative Evaluation, Evaluation Methods, Secondary School Teachers, Mathematics Teachers
Wang, Wei – ProQuest LLC, 2010
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Descriptors: Computer Networks, Computer Security, Graphs, Evaluation Methods
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security