Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Networks | 4 |
| Computer Security | 4 |
| Technology | 4 |
| Computer Science | 2 |
| Elementary Secondary Education | 2 |
| Mathematics | 2 |
| Models | 2 |
| Networks | 2 |
| Accountability | 1 |
| Artificial Intelligence | 1 |
| Benchmarking | 1 |
| More ▼ | |
Publication Type
| Collected Works - Serial | 1 |
| Dissertations/Theses -… | 1 |
| Guides - Classroom - Teacher | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Elementary Secondary Education | 1 |
| High Schools | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Brown, Joan Marie – Learning & Leading with Technology, 1997
Describes four open-ended activities for students in grades 4-12 designed to encourage thought, discussion, and decision making in classes dealing with issues in ethics and technology. Provides teacher directions, describes activities, and outlines debriefing sessions for lessons in copyright infringement, network security, artificial…
Descriptors: Artificial Intelligence, Class Activities, Computer Networks, Computer Security

Direct link
