Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Networks | 4 |
| Computer Security | 4 |
| Engineering | 4 |
| Telecommunications | 3 |
| Classroom Environment | 2 |
| Competition | 2 |
| Computer Science | 2 |
| Computer Simulation | 2 |
| Computers | 2 |
| Cooperative Learning | 2 |
| Curriculum | 2 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 2 |
| Collected Works - Proceedings | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Elementary Secondary Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Italy | 2 |
| United States | 2 |
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Finland | 1 |
| Florida | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Direct link
Peer reviewed
