Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Artificial Intelligence | 8 |
Computer Networks | 8 |
Computer Security | 8 |
Information Technology | 4 |
Computer Simulation | 3 |
Computer Software | 3 |
Computer Assisted Instruction | 2 |
Computer Oriented Programs | 2 |
Computer Science | 2 |
Computer Science Education | 2 |
Computers | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Computers & Education | 1 |
Education and Information… | 1 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
Learning & Leading with… | 1 |
Author
Brown, Joan Marie | 1 |
Bui Thanh Hung | 1 |
Crane, Earl Newell | 1 |
Frank Xavier Gearhart | 1 |
Gayatri Parasa | 1 |
Lidong Wang | 1 |
Prasun Chakrabarti | 1 |
Ray, Loye Lynn | 1 |
Rowe, Neil C. | 1 |
S. Siva Shankar | 1 |
Schiavo, Sandra | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Teacher | 1 |
Reports - Descriptive | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Ray, Loye Lynn – ProQuest LLC, 2014
The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…
Descriptors: Computer Networks, Computer Security, Safety, Artificial Intelligence
Crane, Earl Newell – ProQuest LLC, 2013
The research problem that inspired this effort is the challenge of managing the security of systems in large-scale heterogeneous networked environments. Human intervention is slow and limited: humans operate at much slower speeds than networked computer communications and there are few humans associated with each network. Enabling each node in the…
Descriptors: Computer Security, Computer Networks, Artificial Intelligence, Decision Making
Brown, Joan Marie – Learning & Leading with Technology, 1997
Describes four open-ended activities for students in grades 4-12 designed to encourage thought, discussion, and decision making in classes dealing with issues in ethics and technology. Provides teacher directions, describes activities, and outlines debriefing sessions for lessons in copyright infringement, network security, artificial…
Descriptors: Artificial Intelligence, Class Activities, Computer Networks, Computer Security

Rowe, Neil C.; Schiavo, Sandra – Computers & Education, 1998
Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…
Descriptors: Alarm Systems, Artificial Intelligence, Computer Assisted Instruction, Computer Networks
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers