Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Networks | 6 |
Computer Security | 6 |
Program Effectiveness | 6 |
Information Security | 3 |
Computer Science Education | 2 |
Computer System Design | 2 |
Experiential Learning | 2 |
Information Technology | 2 |
Metadata | 2 |
Statistical Analysis | 2 |
Access to Information | 1 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Handorf, C. Russell | 1 |
Ibrahim, Walid | 1 |
Massengale, Ricky L., Sr. | 1 |
Nielson, Seth James | 1 |
Trabelsi, Zouheir | 1 |
Wang, Jianjun | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Reports - Research | 3 |
Journal Articles | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
California | 1 |
Maryland (Baltimore) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis