Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Foreign Countries | 5 |
Engineering Education | 3 |
Information Technology | 3 |
Computer Networks | 2 |
Engineering | 2 |
Industry | 2 |
Information Security | 2 |
Telecommunications | 2 |
Artificial Intelligence | 1 |
Barriers | 1 |
More ▼ |
Source
IEEE Transactions on Education | 5 |
Author
Abu Alam | 1 |
Aditya Narayan Hati | 1 |
Alex Cameron | 1 |
Annessi, Robert | 1 |
Anwesa Das | 1 |
Argyro Chatzopoulou | 1 |
Battisti, F. | 1 |
Bernhardt, Valentin | 1 |
Boato, G. | 1 |
Carli, M. | 1 |
Frkat, Davor | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Audience
Location
Austria (Vienna) | 1 |
Europe | 1 |
Finland | 1 |
France | 1 |
India | 1 |
Italy | 1 |
Romania | 1 |
United Kingdom (England) | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Anwesa Das; Vinay Kumar; Aditya Narayan Hati; Sharda Bharti – IEEE Transactions on Education, 2024
Machine learning (ML) is increasingly utilized in the development and assurance of safety-critical systems (SCSs) nowadays, much like other complex problems. Safety is the topmost priority in SCS, hence, developers who are working in this area must possess extensive knowledge of both ML and SCS. This article presents a methodical investigation…
Descriptors: Artificial Intelligence, Computer Security, Engineering Education, Engineering
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications