A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study
暂无分享,去创建一个
[1] Felix C. Freiling,et al. An offensive approach to teaching information security : 'Aachen summer school applied IT security , 2005 .
[2] Sushil K. Sharma,et al. Teaching information systems security courses: A hands-onapproach , 2007, Comput. Secur..
[3] Felix C. Freiling,et al. Is attack better than defense?: teaching information security the right way , 2006, InfoSecCD '06.
[4] Deborah A. Frincke,et al. Who Watches the Security Educators? , 2003, IEEE Secur. Priv..
[5] Michael Fry,et al. Panel on integrating security concepts into existing computer courses , 2002, SIGCSE '02.
[6] Udo W. Pooch,et al. Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.
[7] Sergey Bratus,et al. Teaching the principles of the hacker curriculum to undergraduates , 2010, SIGCSE.
[8] Dongqing Yuan,et al. A lab implementation of SYN flood attack and defense , 2008, SIGITE '08.
[9] James Harris,et al. Maintaining ethical standards for a computer security curriculum , 2004, InfoSecCD '04.
[10] Zouheir Trabelsi. Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning , 2011, InfoSecCD.
[11] George Ledin. The growing harm of not teaching malware , 2011, CACM.
[12] Kyle King,et al. Design and Implementation of a Multi-Use Attack-Defend Computer Security Lab , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[13] Patricia Y. Logan,et al. Teaching students to hack: curriculum issues in information security , 2005 .
[14] Mark B. Schmidt,et al. Busting the ghost in the machine , 2005, CACM.
[15] Gary McGraw,et al. Guest Editors' Introduction: Why Attacking Systems Is a Good Idea , 2004, IEEE Secur. Priv..
[16] Matt Bishop,et al. The state of infosec education in academia: present and future directions , 1997 .
[17] G. Conti,et al. When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat , 2012 .