Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 3 |
| Computer Security | 3 |
| Law Enforcement | 3 |
| Crime Prevention | 2 |
| Internet | 2 |
| Agency Cooperation | 1 |
| Clinical Diagnosis | 1 |
| Comparative Analysis | 1 |
| Computer Science | 1 |
| Computers | 1 |
| Convergent Thinking | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
| Collected Works - Serial | 1 |
Education Level
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security

Direct link
Peer reviewed
