NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Deloris Y. McBride – ProQuest LLC, 2021
As the global need for unfilled cybersecurity positions is projected to reach nearly 3.5 million by 2021, cybercrime proliferates. Talent shortage in cybersecurity continues to reach widespread magnitudes and individuals are inadequately prepared to assume positions requiring significant responsibilities. The challenge of filling the cybersecurity…
Descriptors: Computer Security, Curriculum Design, Career Readiness, Job Skills
Gersch, Joseph E. – ProQuest LLC, 2013
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…
Descriptors: Computer Security, Internet, Information Technology, Simulation
Bao, Fenye – ProQuest LLC, 2013
Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…
Descriptors: Telecommunications, Networks, Trust (Psychology), Social Networks
Mancuso, Vincent Francis – ProQuest LLC, 2012
In the modern workplace, collaboration is no longer only a face-to-face process. When working together, it is common for teams to rely on technology and operate across geographic, temporal and cultural boundaries. Most research, when looking at distributed teams, takes a uni-disciplinary perspective and fails to address the entire problem space.…
Descriptors: Interdisciplinary Approach, Teamwork, Cooperation, Group Dynamics
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference