Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Descriptor
Computer Security | 5 |
Telecommunications | 5 |
Handheld Devices | 3 |
Computer Networks | 2 |
Foreign Countries | 2 |
Identification | 2 |
Information Security | 2 |
Prevention | 2 |
Privacy | 2 |
Simulation | 2 |
Technological Literacy | 2 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
Asian Journal of Distance… | 1 |
Education and Information… | 1 |
International Association for… | 1 |
Author
Harry May | 2 |
Travis Atkison | 2 |
Ankur Chattopadhyay | 1 |
Inmaculada Arnedillo Sánchez,… | 1 |
Kaikho Ashuni | 1 |
Pedro Isaías, Editor | 1 |
Piet Kommers, Editor | 1 |
Tyler Poe | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Books | 1 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Brazil | 1 |
Estonia | 1 |
European Union | 1 |
Greece | 1 |
India | 1 |
Indonesia | 1 |
Italy | 1 |
Mexico | 1 |
Philippines | 1 |
Portugal | 1 |
United Kingdom | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Kaikho Ashuni – Asian Journal of Distance Education, 2024
The digital age has opened up new and exciting opportunities for Open and Distance Learning (ODL) in universities. But, is going digital reinforcing the existing social inequalities? This qualitative research examines the three levels of digital divide and digital inequality among learners at India's National Open University, IGNOU. The findings…
Descriptors: Distance Education, Open Education, Open Universities, Social Justice
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services