Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 104
21.
  • Engineer of 2020 outcomes a... Engineer of 2020 outcomes and the student experience
    Rover, Diane; Mickelson, Steve; Hartmann, Beth ... 2013 IEEE Frontiers in Education Conference (FIE), 2013-Oct.
    Conference Proceeding
    Odprti dostop

    An NSF Scholarships in STEM (S-STEM) program has provided scholarships for cohorts of undergraduate engineering students since 2009, giving specific attention to the National Academy of Engineering's ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
22.
  • Using Cyber Defense Competi... Using Cyber Defense Competitions to build bridges between community colleges and four year institutions: A footbridge for students into an IT program
    Rursch, J.A.; Jacobson, D. 2009 39th IEEE Frontiers in Education Conference, 2009-Oct.
    Conference Proceeding

    The Community College Cyber Defense Competition (CCCDC) was created as a bridge between Iowa State University and the 15 community college districts in the state of Iowa. It grew out of an ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
23.
  • BitemporalDB: A Bitemporal Database in the Cloud for Financial Services Data
    Sedighi, Art; D'Mello, Sujit; Isaacs, Gil ... 2020 IEEE International Conference on Smart Cloud (SmartCloud), 2020-Nov.
    Conference Proceeding

    There is tremendous pressure on financial services organizations to ensure the highest quality of data on which to base their risk and capital adequacy calculations. The widely used method to persist ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
24.
  • A security capstone course:... A security capstone course: An innovative practical approach to distance education
    Evans, N.; Blakely, B.; Jacobson, D. 2009 39th IEEE Frontiers in Education Conference, 2009-Oct.
    Conference Proceeding

    Information assurance is a growing field in the information technology world. While many individuals seek further education in this field, it is currently difficult to complete an entire program of ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
25.
  • A Design Methodology and Im... A Design Methodology and Implementation for Corporate Network Security Visualization: A Modular-Based Approach
    Luse, Andy; Mennecke, Brian; Triplett, Janea ... Association for Information Systems transactions on human-computer interaction, 06/2011, Letnik: 3, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a ...
Celotno besedilo
Dostopno za: CEKLJ, NUK, UL, UM, UPUK

PDF
26.
  • Training non-IT teachers to... Training non-IT teachers to advise and facilitate inquiry-based learning in IT: A pilot study
    Rursch, J.A.; Burkhardt, B.; Jacobson, D. 2009 39th IEEE Frontiers in Education Conference, 2009-Oct.
    Conference Proceeding

    As the IT-Adventures program was being developed, we discovered teachers of all disciplines needed a way to improve their knowledge and skills in IT to facilitate student learning as part of their ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
27.
  • ARA ARA
    Zhang, Hongwei; Guan, Yong; Kamal, Ahmed ... Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, Experimental evaluation & CHaracterization, 01/2022
    Conference Proceeding
    Odprti dostop

    The rural US includes 72% of the nation's land and 46 million people, and it serves as major sources of food and energy for the nation. Thus rural prosperity is essential to US wellbeing. As a ...
Celotno besedilo
Dostopno za: NUK, UL
28.
  • Attribution of Fraudulent R... Attribution of Fraudulent Resource Consumption in the Cloud
    Idziorek, J.; Tannian, M.; Jacobson, D. 2012 IEEE Fifth International Conference on Cloud Computing, 2012-June
    Conference Proceeding

    Obligated by a utility pricing model, Internet-facing web resources hosted in the public cloud are vulnerable to Fraudulent Resource Consumption (FRC) attacks. Unlike an application-layer DDoS attack ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
29.
  • To steal today's computerized cars, thieves go high-tech
    Jacobson, Doug The Conversation : Science + Technology, 08/2023
    Newspaper Article
    Odprti dostop

    ...if an attacker can access one computer, they can easily access other computers in the car. The engine control unit stores a copy of the wireless key code, and thieves can clone this to a blank key ...
Celotno besedilo
30.
  • Should the US ban TikTok? Can it? A cybersecurity expert explains the risks the app poses and the challenges to blocking it
    Jacobson, Doug The Conversation : Science + Technology, 03/2023
    Newspaper Article
    Odprti dostop

    TikTok CEO Shou Zi Chew testified before the House Energy and Commerce Committee on March 23, 2023, amid a chorus of calls from members of Congress for the federal government to ban the Chinese-owned ...
Celotno besedilo
1 2 3 4 5
zadetkov: 104

Nalaganje filtrov