Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Internet | 5 |
Simulation | 5 |
Information Technology | 3 |
Benchmarking | 2 |
Computer Networks | 2 |
Computer Oriented Programs | 2 |
Computer Software | 2 |
Data Processing | 2 |
Design | 2 |
Genetics | 2 |
More ▼ |
Source
Association Supporting… | 1 |
Interactive Technology and… | 1 |
International Association for… | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Author
Ashford, Tina | 1 |
Dixit, R. K. | 1 |
Gersch, Joseph E. | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
Kabir, Md. H. | 1 |
Kommers, Piet, Ed. | 1 |
Manning, Eric G. | 1 |
McKay, Elspeth, Ed. | 1 |
Rogers, Gary | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
Florida | 1 |
India | 1 |
Poland | 1 |
Russia | 1 |
Saudi Arabia | 1 |
South Africa | 1 |
Ukraine | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Gersch, Joseph E. – ProQuest LLC, 2013
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…
Descriptors: Computer Security, Internet, Information Technology, Simulation
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
A Scalable Multimedia Streaming Scheme with CBR-Transmission of VBR-Encoded Videos over the Internet
Kabir, Md. H.; Shoja, Gholamali C.; Manning, Eric G. – Interactive Technology and Smart Education, 2006
Streaming audio/video contents over the Internet requires large network bandwidth and timely delivery of media data. A streaming session is generally long and also needs a large I/O bandwidth at the streaming server. A streaming server, however, has limited network and I/O bandwidth. For this reason, a streaming server alone cannot scale a…
Descriptors: Computer System Design, Intellectual Property, Internet, Simulation
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology