메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2-6

A laboratory based capstone course in computer security for undergraduates

Author keywords

Curriculum; Cybersecurity; Exercise; Laboratory; Security

Indexed keywords

CYBERSECURITY; DEFENSIVE TOOLS; STUDENT TEAMS;

EID: 37849007192     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1121341.1121346     Document Type: Conference Paper
Times cited : (20)

References (24)
  • 1
    • 84904299134 scopus 로고    scopus 로고
    • A dedicated undergraduate track in computer security education
    • C. Irvine and H. Armstrong, editors, Kluwer Academic Publishers
    • S. Azadegan, M. Lavine, M. O'Leary, A. Wijesinha, and M. Zimand. A dedicated undergraduate track in computer security education. In C. Irvine and H. Armstrong, editors, Security education and critical infrastructures, pages 319-331. Kluwer Academic Publishers, 2003.
    • (2003) Security education and critical infrastructures , pp. 319-331
    • Azadegan, S.1    Lavine, M.2    O'Leary, M.3    Wijesinha, A.4    Zimand, M.5
  • 4
    • 33645782269 scopus 로고    scopus 로고
    • Teaching computer security
    • D. Carlson. Teaching computer security. SIGCSE Bull., 36(2):64-67, 2004.
    • (2004) SIGCSE Bull , vol.36 , Issue.2 , pp. 64-67
    • Carlson, D.1
  • 6
    • 84942442825 scopus 로고    scopus 로고
    • Capture the flag: Learning computer security under fire
    • C. Irvine and M. Rose, editors, Center for Information Systems Security Studies and Research, Naval Postgraduate School
    • C. Eagle and J. L. Clark. Capture the flag: Learning computer security under fire. In C. Irvine and M. Rose, editors, Avoiding Fear, Uncertainty and Doubt Through Effective Security Education, pages 17-21. Center for Information Systems Security Studies and Research, Naval Postgraduate School, 2004.
    • (2004) Avoiding Fear, Uncertainty and Doubt Through Effective Security Education , pp. 17-21
    • Eagle, C.1    Clark, J.L.2
  • 9
    • 84967466804 scopus 로고
    • Laboratory projects for promoting hands-on learning in a computer security course
    • J. E. Huss. Laboratory projects for promoting hands-on learning in a computer security course. SIGCSE Bull., 27(2):2-6, 1995.
    • (1995) SIGCSE Bull , vol.27 , Issue.2 , pp. 2-6
    • Huss, J.E.1
  • 18
    • 33645762267 scopus 로고    scopus 로고
    • The challenges of designing lab exercises for a curriculum in computer security
    • R. Tikekar and T. Bacon. The challenges of designing lab exercises for a curriculum in computer security. J. Comput. Small Coll., 18(5):175-183, 2003.
    • (2003) J. Comput. Small Coll , vol.18 , Issue.5 , pp. 175-183
    • Tikekar, R.1    Bacon, T.2
  • 19
    • 37849011359 scopus 로고    scopus 로고
    • Teaching computer security to undergraduates
    • C. Irvine and M. Rose, editors, Center for Information Systems Security Studies and Research, Naval Postgraduate School
    • R. V. Tikekar. Teaching computer security to undergraduates. In C. Irvine and M. Rose, editors, Avoiding Fear, Uncertainty and Doubt Through Effective Security Education, pages 5-10. Center for Information Systems Security Studies and Research, Naval Postgraduate School, 2004.
    • (2004) Avoiding Fear, Uncertainty and Doubt Through Effective Security Education , pp. 5-10
    • Tikekar, R.V.1
  • 21
    • 20444487371 scopus 로고    scopus 로고
    • Teaching Hands-On Network Security: Testbeds and Live Exercises
    • G. Vigna. Teaching Hands-On Network Security: Testbeds and Live Exercises. Journal of Information Warfare, 3(2):8-25, 2003.
    • (2003) Journal of Information Warfare , vol.3 , Issue.2 , pp. 8-25
    • Vigna, G.1
  • 22
    • 84904308086 scopus 로고    scopus 로고
    • Teaching Network Security Through Live Exercises
    • C. Irvine and H. Armstrong, editors, Monterey, CA, June, Kluwer Academic Publishers
    • G. Vigna. Teaching Network Security Through Live Exercises. In C. Irvine and H. Armstrong, editors, Proceedings of the Third Annual World Conference on Information Security Education (WISE 3), pages 3-18, Monterey, CA, June 2003. Kluwer Academic Publishers.
    • (2003) Proceedings of the Third Annual World Conference on Information Security Education (WISE 3) , pp. 3-18
    • Vigna, G.1
  • 23
    • 2642579299 scopus 로고    scopus 로고
    • Designing and implementing a cyberwar laboratory exercise for a computer security course
    • P. J. Wagner and J. M. Wudi. Designing and implementing a cyberwar laboratory exercise for a computer security course. SIGCSE Bull., 36(1):402-406, 2004.
    • (2004) SIGCSE Bull , vol.36 , Issue.1 , pp. 402-406
    • Wagner, P.J.1    Wudi, J.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.