A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity
暂无分享,去创建一个
[1] Vincent Xu. Data Security Solutions , 2020 .
[2] Rodrigo de S. Ruiz,et al. Security Issue on Cloned TrueCrypt Containers and Backup Headers , 2014 .
[3] Lynn Lambert,et al. Computer Science in New Zealand high schools , 2010, ACE '10.
[4] Sangjin Lee,et al. Advanced evidence collection and analysis of web browser activity , 2011, Digit. Investig..
[5] Hamid Jahankhani,et al. Digital forensics education, training and awareness , 2014 .
[6] Simon L. Peyton Jones,et al. Bringing computer science back into schools: lessons from the UK , 2013, SIGCSE '13.
[7] Dan Boneh,et al. An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.
[8] Hamid Jahankhani,et al. Analyzing Human Factors for an Effective Information Security Management System , 2013, Int. J. Secur. Softw. Eng..
[9] Liwen Vaughan,et al. Webometrics , 2005, Annu. Rev. Inf. Sci. Technol..
[10] A V Barabanov,et al. Statistics of software vulnerability detection in certification testing , 2018 .
[11] Rodrigo de S. Ruiz. Overconfidence: Personal Behaviors Regarding Privacy that Allows the Leakage of Information in Private Browsing Mode , 2015 .
[12] Hamid Jahankhani,et al. Challenges of Cloud Forensics , 2015, ES.
[13] Hamid Jahankhani,et al. Cybercrime classification and characteristics , 2014 .
[14] Don Passey,et al. Computer science (CS) in the compulsory education curriculum: Implications for future research , 2017, Education and Information Technologies.
[15] Sue Sentance,et al. Grand challenges for the UK: upskilling teachers to teach computer science within the secondary curriculum , 2012, WiPSCE.
[16] Robert Ramirez. Making cyber security interdisciplinary : recommendations for a novel curriculum and terminology harmonization , 2017 .
[17] An Observational Study of Peer Learning for High School Students at a Cybersecurity Camp. , 2016 .
[18] NEIL C. C. BROWN,et al. Restart: The Resurgence of Computer Science in UK Schools , 2014, TOCE.
[19] Peter M. Bednar,et al. Understanding Security Practices Deficiencies: A Contextual Analysis , 2015, HAISA.
[20] B.M. McMillin,et al. Safe computing , 1989, IEEE Potentials.