Security Projects for Systems and Networking Professionals
暂无分享,去创建一个
Hamid R. Arabnia | Mira Yun | Charlie Wiseman | Leonidas Deligiannidis | L. Deligiannidis | H. Arabnia | Mira Yun | Charlie Wiseman
[1] E. Seymour,et al. Talking About Leaving: Why Undergraduates Leave The Sciences , 1997 .
[2] J.K. Yates,et al. Creating awareness about engineering careers: innovative recruitment and retention initiatives , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.
[3] Yair Linn. An Ultra Low Cost Wireless Communications Laboratory for Education and Research , 2012, IEEE Transactions on Education.
[4] J.T. Tester,et al. Developing recruitment and retention strategies through "Design4Practice" curriculum enhancements , 2004, 34th Annual Frontiers in Education, 2004. FIE 2004..
[5] Hal Berghel,et al. WiFi attack vectors , 2005, CACM.
[6] S. Blaisdell,et al. A comprehensive programmatic approach to recruitment and retention in the College of Engineering and Applied Sciences , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.
[7] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[10] L. Gladney,et al. Teaching biophysics. Strategies for recruiting and retaining minorities in physics and biophysics. , 1993, Biophysical journal.
[11] Sandra Courter,et al. From the Students' Point of View: Experiences in a Freshman Engineering Design Course , 1998 .
[12] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[13] John T. Tester,et al. The design4practice sophomore design course: Adapting to a changing academic environment , 2005 .
[14] Gene Tsudik,et al. Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.
[15] M. Drenth. San Juan, Puerto Rico , 2001 .
[16] Gregory Kipper,et al. Investigator's Guide to Steganography , 2003 .
[17] Nurul I. Sarkar,et al. Teaching wireless communication and networking fundamentals using Wi-Fi projects , 2006, IEEE Transactions on Education.
[18] Sonja M Glumich,et al. DefEX: Hands-On Cyber Defense Exercise for Undergraduate Students , 2011 .
[19] Hong Wang,et al. From C to Python: Impact on Retention and Student Performance , 2009, FECS.
[20] Sneha Kumar Kasera,et al. Emergency service in Wi-Fi networks without access point association , 2011, ACWR '11.
[21] Xiaohong Yuan,et al. Laboratory design for wireless network attacks , 2008, InfoSecCD2008 2008.
[22] Francisco Alfredo Márquez,et al. WiFiSiM: An Educational Tool for the Study and Design of Wireless Networks , 2013, IEEE Trans. Educ..
[23] S Vinjosh Reddy,et al. Wireless hacking - a WiFi hack by cracking WEP , 2010, 2010 2nd International Conference on Education Technology and Computer.
[24] Hüseyin Arslan,et al. A Wireless Communications Systems Laboratory Course , 2010, IEEE Transactions on Education.
[25] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[26] Zeljko Zilic,et al. A Laboratory Setup and Teaching Methodology for Wireless and Mobile Embedded Systems , 2008, IEEE Transactions on Education.
[27] Richard H. McCuen,et al. Discovery approach to teaching engineering design , 1995 .
[28] Ross Anderson,et al. Information hiding terminology , 1996 .
[29] H. Boland,et al. Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).