Sciweavers

432 search results - page 46 / 87
» Education, Outreach, and Training
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 10 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 6 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
CSEE
2009
Springer
15 years 6 months ago
SWEBOK Refresh and Continuous Update: A Call for Feedback and Participation
Since publication of the 2004 version, the Software Engineering Body of Knowledge (SWEBOK) has notably served as a major input to the design of curricula at the undergraduate and ...
Pierre Bourque
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
15 years 6 months ago
Secure Software Engineering: A New Paradigm
Software defects lead to security vulnerabilities, which are costing businesses millions of dollars each year and threaten the security of individuals and the nation. It can be de...
Wm. Arthur Conklin, Glenn B. Dietrich
ECTEL
2006
Springer
15 years 3 months ago
New Media for Teaching Applied Cryptography and Network Security
Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and networ...
Ji Hu, Dirk Cordel, Christoph Meinel