Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Networks | 6 |
Computer Security | 6 |
Statistical Analysis | 6 |
Data Analysis | 3 |
Information Technology | 3 |
Information Security | 2 |
Metadata | 2 |
Online Surveys | 2 |
Program Effectiveness | 2 |
Access to Information | 1 |
Accountability | 1 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Annessi, Robert | 1 |
Bernhardt, Valentin | 1 |
Frkat, Davor | 1 |
Handorf, C. Russell | 1 |
Ibrahim, Sara | 1 |
Islam, Muhammad Faysal | 1 |
Lederer, Karen | 1 |
Vázquez, Félix Iglesias | 1 |
Zseby, Tanja | 1 |
Publication Type
Dissertations/Theses -… | 5 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Austria (Vienna) | 1 |
Florida | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Islam, Muhammad Faysal – ProQuest LLC, 2013
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or downsize their services as needed. In a cloud environment,…
Descriptors: Risk Assessment, Statistical Analysis, Reliability, Computer Networks
Lederer, Karen – ProQuest LLC, 2012
The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…
Descriptors: Small Businesses, Technology Integration, Computer Networks, Information Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis