Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 5 |
| Computer Software | 5 |
| Synchronous Communication | 5 |
| Client Server Architecture | 2 |
| Foreign Countries | 2 |
| Information Security | 2 |
| Internet | 2 |
| Networks | 2 |
| Privacy | 2 |
| Programming | 2 |
| Accuracy | 1 |
| More ▼ | |
Author
| Liu, Anyi | 1 |
| Massengale, Ricky L., Sr. | 1 |
| Mbaziira, Alex Vincent | 1 |
| Mengkorn Pum | 1 |
| Sarin Sok | 1 |
| Sextos, Anastasios G. | 1 |
Publication Type
| Dissertations/Theses -… | 3 |
| Journal Articles | 2 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mengkorn Pum; Sarin Sok – Asian Journal of Distance Education, 2024
With current state-of-the-art advances in artificial intelligence (AI), especially large language models, such as Google's Gemini, Microsoft's Copilot, and ChatGPT, among others, a plethora of research on this phenomenon has been conducted worldwide aiming to examine its limitations, benefits and ethical implications. Nonetheless, such a…
Descriptors: Foreign Countries, Artificial Intelligence, Technology Uses in Education, Computer Software
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention

Peer reviewed
Direct link
