Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 5 |
Descriptor
Active Learning | 5 |
Computer Security | 5 |
Educational Technology | 5 |
Information Security | 5 |
Computer Science Education | 3 |
Artificial Intelligence | 2 |
Blended Learning | 2 |
Conferences (Gatherings) | 2 |
Electronic Learning | 2 |
Faculty Development | 2 |
Information Technology | 2 |
More ▼ |
Source
Association Supporting… | 1 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
ProQuest LLC | 1 |
TechTrends: Linking Research… | 1 |
Author
Bhuyan, Jay | 1 |
Ford, Vitaly | 1 |
Hur, Jung Won | 1 |
Ibrahim, Ahmed | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
Kishor Datta Gupta | 1 |
Kommers, Piet, Ed. | 1 |
Koong, Kai | 1 |
McKay, Elspeth, Ed. | 1 |
More ▼ |
Publication Type
Collected Works - Proceedings | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Adult Education | 1 |
Grade 10 | 1 |
Grade 11 | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Ibrahim, Ahmed; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2021
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for…
Descriptors: Information Security, Computer Security, Educational Resources, Active Learning
Kishor Datta Gupta – ProQuest LLC, 2021
Defenses against adversarial attacks are essential to ensure the reliability of machine learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use. I proposed a trustworthy framework that employs an adaptive strategy to inspect both inputs and decisions. In…
Descriptors: Artificial Intelligence, Cybernetics, Information Processing, Information Security
Bhuyan, Jay; Wu, Fan; Thomas, Cassandra; Koong, Kai; Hur, Jung Won; Wang, Chih-hsuan – TechTrends: Linking Research and Practice to Improve Learning, 2020
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the…
Descriptors: Teaching Methods, Grade 10, Grade 11, High School Students
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology