NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Towne, Douglas M.; And Others – Interactive Learning Environments, 1990
Explains the Intelligent Maintenance Training System that allows a nonprogramming subject matter expert to produce an interactive graphical model of a complex device for computer simulation. Previous simulation-based training systems are reviewed; simulation algorithms are described; and the student interface is discussed. (Contains 24…
Descriptors: Algorithms, Artificial Intelligence, Authoring Aids (Programming), Computer Assisted Instruction