Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Information Retrieval | 3 |
Information Security | 3 |
Access to Information | 1 |
Artificial Intelligence | 1 |
Coding | 1 |
Color | 1 |
Data Analysis | 1 |
Data Collection | 1 |
Educational Technology | 1 |
Information Storage | 1 |
More ▼ |
Author
Banik, Barnali Gupta | 1 |
Celeda, Pavel | 1 |
Debnath, Diptasree | 1 |
Ghosh, Emlon | 1 |
Lehrfeld, Michael R. | 1 |
Popovic, Daniel | 1 |
Tkácik, Kristián | 1 |
Vykopal, Jan | 1 |
Švábenský, Valdemar | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk