Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Science Education | 4 |
| Computer Security | 4 |
| Laboratory Experiments | 4 |
| Computer Networks | 3 |
| Information Security | 3 |
| Teaching Methods | 3 |
| Computer Software | 2 |
| Experiential Learning | 2 |
| Undergraduate Students | 2 |
| Computer Peripherals | 1 |
| Computer Simulation | 1 |
| More ▼ | |
Source
| Advances in Engineering… | 1 |
| IEEE Transactions on Education | 1 |
| Journal of Cybersecurity… | 1 |
| ProQuest LLC | 1 |
Author
| Bhunia, Swarup | 1 |
| Chou, Te-Shun | 1 |
| Copeland, J. A. | 1 |
| Fairbanks, K. D. | 1 |
| Hempenius, Nicholas | 1 |
| Lee, C. P. | 1 |
| Paul, Shubhra Deb | 1 |
| Uluagac, A. S. | 1 |
| Yang, Shuo | 1 |
| Yuli Deng | 1 |
Publication Type
| Journal Articles | 3 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 3 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education

Direct link
Peer reviewed
