Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 1 |
Descriptor
Algorithms | 2 |
Artificial Intelligence | 2 |
Computer Software | 2 |
Training Methods | 2 |
Authoring Aids (Programming) | 1 |
Behavior Patterns | 1 |
Computer Assisted Instruction | 1 |
Computer Graphics | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
Computer Simulation | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods

Towne, Douglas M.; And Others – Interactive Learning Environments, 1990
Explains the Intelligent Maintenance Training System that allows a nonprogramming subject matter expert to produce an interactive graphical model of a complex device for computer simulation. Previous simulation-based training systems are reviewed; simulation algorithms are described; and the student interface is discussed. (Contains 24…
Descriptors: Algorithms, Artificial Intelligence, Authoring Aids (Programming), Computer Assisted Instruction