Design and evaluation of a learning environment to effectively provide network security skills
暂无分享,去创建一个
Ivan Marsá-Maestre | Miguel A. López-Carmona | Enrique de la Hoz | José Manuel Giménez-Guzmán | Ivan Marsá-Maestre | J. M. Giménez-Guzmán
[1] Ping Chen,et al. Design of a distributed computer security lab , 2004 .
[2] Jack Koziol. Intrusion Detection with Snort , 2003 .
[3] John A. Copeland,et al. The Design of NetSecLab: A Small Competition-Based Network Security Lab , 2011, IEEE Transactions on Education.
[4] Thomas Wilhelm,et al. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research , 2007 .
[5] Juan C. Burguillo,et al. Using game theory and Competition-based Learning to stimulate student motivation and performance , 2010, Comput. Educ..
[6] James N. Morgan,et al. Security Practices of Students , 2007 .
[7] Alan J. Hu,et al. Fixing Races for Fun and Profit: How to Use access(2) , 2004, USENIX Security Symposium.
[8] Sushil K. Sharma,et al. Teaching information systems security courses: A hands-onapproach , 2007, Comput. Secur..
[9] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[10] S. Shankar Sastry,et al. Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems , 2009, Ad Hoc Networks.
[11] William Yurcik,et al. Different Approaches in the Teaching of Information Systems Security , 2001 .
[12] Ke Ci,et al. Hacking Exposed : Network Security Secrets and Solutions , 2013 .
[13] Mike Erlinger,et al. TinkerNet: a low-cost and ready-to-deploy networking laboratory platform , 2006 .
[14] Albert L. Harris,et al. The impact of information richness on information security awareness training effectiveness , 2009, Comput. Educ..
[15] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.
[16] James E. Smith,et al. The architecture of virtual machines , 2005, Computer.
[17] Henry L. Owen,et al. Georgia tech information security center hands-on network security laboratory , 2006, IEEE Transactions on Education.
[18] Norman E. Wallen,et al. How to Design and Evaluate Research in Education , 1990 .
[19] Henry L. Owen,et al. Using Honeynets to Protect Large Enterprise Networks , 2004, IEEE Secur. Priv..
[20] Marc Dacier,et al. Intrusion detection , 1999, Comput. Networks.
[21] David Carlson,et al. Teaching computer security , 2004, SGCS.
[22] James E. Smith,et al. Virtual machines - versatile platforms for systems and processes , 2005 .
[23] Xuxian Jiang,et al. Multi-aspect profiling of kernel rootkit behavior , 2009, EuroSys '09.
[24] Carlos Delgado Kloos,et al. Monitoring student progress using virtual appliances: A case study , 2012, Comput. Educ..
[25] Udo W. Pooch,et al. Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.
[26] Mohd Najwan Md Khambari,et al. A novel approach on teaching network security for ICT courses , 2009, 2009 International Conference on Engineering Education (ICEED).
[27] Yannis A. Dimitriadis,et al. Semantic search of tools for collaborative learning with the Ontoolsearch system , 2010, Comput. Educ..
[28] Sohail Akhtar,et al. Supply chain simulator: A scenario-based educational tool to enhance student learning , 2008, Comput. Educ..