Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3668
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakçı, Süleyman | - |
dc.date.accessioned | 2023-06-16T15:01:55Z | - |
dc.date.available | 2023-06-16T15:01:55Z | - |
dc.date.issued | 2011 | - |
dc.identifier.isbn | 9.78145E+12 | - |
dc.identifier.uri | https://doi.org/10.1145/2070425.2070462 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3668 | - |
dc.description | The Air Force Office of Scientific Research (AFOSR);The Office of Naval Research-Global (ONRG);The Asian Office of Aerospace Research and Development (AOARD);U.S. Army RDECOM | en_US |
dc.description | 4th International Conference on Security of Information and Networks, SIN 2011 -- 14 November 2011 through 19 November 2011 -- Sydney, NSW -- 87676 | en_US |
dc.description.abstract | Information security courses have become an important part of Computer Science curricula over the past decade, however, related course syllabi are becoming distorted with the enormity of ad hoc topics. Talking about the buffer overflow, which when technically considered, complies with the information overflow and obscurity pushed onto young minds. Many of us try to train young dogs using old tricks that are mostly based on badly formed and cryptic specifications. There exist a variety of curricula being used for cryptography courses, however, topic areas covering information security in general seem to be rather indistinct and theoretically focused. Due to lack of appropriate prerequisite knowledge and instructional approaches active involvement of multidisciplinary students is much harder to realize. This article presents a generic framework for designing and assessing a curriculum that results in a prerequisite course set and a course syllabus needed for a modern Information Security course. © 2011 ACM. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | ACM International Conference Proceeding Series | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | course syllabus | en_US |
dc.subject | nformation security | en_US |
dc.subject | student evaluation | en_US |
dc.subject | Buffer overflows | en_US |
dc.subject | Computer science curricula | en_US |
dc.subject | course syllabus | en_US |
dc.subject | Generic frameworks | en_US |
dc.subject | nformation security | en_US |
dc.subject | student evaluation | en_US |
dc.subject | Topic areas | en_US |
dc.subject | Curricula | en_US |
dc.subject | Frequency hopping | en_US |
dc.subject | Network security | en_US |
dc.title | Obscurity of network security course curriculum | en_US |
dc.type | Conference Object | en_US |
dc.identifier.doi | 10.1145/2070425.2070462 | - |
dc.identifier.scopus | 2-s2.0-83455218362 | en_US |
dc.authorscopusid | 15061511300 | - |
dc.identifier.startpage | 219 | en_US |
dc.identifier.endpage | 222 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2754.pdf Restricted Access | 419.74 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
Page view(s)
62
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.