메뉴 건너뛰기




Volumn 9, Issue , 2006, Pages

Design and implementation of a multi-use attack-defend computer security lab

Author keywords

[No Author keywords available]

Indexed keywords

RATIONALE DESIGN; RECONFIGURABLE ATTACK-DEFEND INSTRUCTIONAL COMPUTING LABORATORY (RADICL);

EID: 33749630090     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2006.115     Document Type: Conference Paper
Times cited : (18)

References (12)
  • 1
    • 33749630914 scopus 로고
    • United States court of appeals for the second circuit
    • ser. Federal Reporter
    • United States v. Robert Morris, ser. Federal Reporter. United States Court of Appeals for the Second Circuit, 1991, vol. 928.
    • (1991) United States V. Robert Morris , vol.928
  • 2
    • 0029705855 scopus 로고    scopus 로고
    • Computer security training and education: A needs analysis
    • Oakland, CA
    • S. F. Barnett, "Computer security training and education: A needs analysis," in 1996 IEEE Symposium on Security and Privacy, Oakland, CA, 1996, pp. 26-29.
    • (1996) 1996 IEEE Symposium on Security and Privacy , pp. 26-29
    • Barnett, S.F.1
  • 4
    • 0004824868 scopus 로고    scopus 로고
    • The state of infosec education in academia: Present and future directions
    • _, "The state of infosec education in academia: Present and future directions," in National Colloquium on Information System Security Education, 1997, pp. 19-33.
    • (1997) National Colloquium on Information System Security Education , pp. 19-33
  • 5
    • 0037002226 scopus 로고    scopus 로고
    • Computer security education: Training, scholarship, and research
    • April
    • _, "Computer security education: Training, scholarship, and research," IEEE Computer, vol. 35, no. 4, pp. 30-32, April 2002.
    • (2002) IEEE Computer , vol.35 , Issue.4 , pp. 30-32
  • 6
    • 3042785170 scopus 로고    scopus 로고
    • Who watches the security educators?
    • M. Bishop and D. Frincke, "Who watches the security educators?" IEEE Security and Privacy, vol. 1, no. 3, pp. 56-58, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 56-58
    • Bishop, M.1    Frincke, D.2
  • 11
    • 33745433187 scopus 로고    scopus 로고
    • Are computer hacker break-ins ethical?
    • D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall
    • E. Spafford, "Are computer hacker break-ins ethical?" in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344.
    • (2001) Computers and Ethics in the Cyberage , pp. 332-344
    • Spafford, E.1
  • 12
    • 2342584806 scopus 로고    scopus 로고
    • Different approaches in the teaching of information systems security
    • Cincinnati OH. USA, November
    • W. Yurcik and D. Doss, "Different approaches in the teaching of information systems security," in Information Systems Education Conference (ISECON), Cincinnati OH. USA, November 2001.
    • (2001) Information Systems Education Conference (ISECON)
    • Yurcik, W.1    Doss, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.