Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Science Education | 2 |
Computer Security | 2 |
Game Theory | 2 |
Computer Networks | 1 |
Computer Simulation | 1 |
Computer System Design | 1 |
Control Groups | 1 |
Educational Strategies | 1 |
Experimental Groups | 1 |
Information Security | 1 |
Internet | 1 |
More ▼ |
Author
Chaplik, Andrew M. | 1 |
Copeland, J. A. | 1 |
Fairbanks, K. D. | 1 |
Hamman, Seth T. | 1 |
Hopkinson, Kenneth M. | 1 |
Lee, C. P. | 1 |
Markham, Ruth L. | 1 |
Metzler, Gabrielle E. | 1 |
Uluagac, A. S. | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education