Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/3668
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondakçı, Süleyman-
dc.date.accessioned2023-06-16T15:01:55Z-
dc.date.available2023-06-16T15:01:55Z-
dc.date.issued2011-
dc.identifier.isbn9.78145E+12-
dc.identifier.urihttps://doi.org/10.1145/2070425.2070462-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/3668-
dc.descriptionThe Air Force Office of Scientific Research (AFOSR);The Office of Naval Research-Global (ONRG);The Asian Office of Aerospace Research and Development (AOARD);U.S. Army RDECOMen_US
dc.description4th International Conference on Security of Information and Networks, SIN 2011 -- 14 November 2011 through 19 November 2011 -- Sydney, NSW -- 87676en_US
dc.description.abstractInformation security courses have become an important part of Computer Science curricula over the past decade, however, related course syllabi are becoming distorted with the enormity of ad hoc topics. Talking about the buffer overflow, which when technically considered, complies with the information overflow and obscurity pushed onto young minds. Many of us try to train young dogs using old tricks that are mostly based on badly formed and cryptic specifications. There exist a variety of curricula being used for cryptography courses, however, topic areas covering information security in general seem to be rather indistinct and theoretically focused. Due to lack of appropriate prerequisite knowledge and instructional approaches active involvement of multidisciplinary students is much harder to realize. This article presents a generic framework for designing and assessing a curriculum that results in a prerequisite course set and a course syllabus needed for a modern Information Security course. © 2011 ACM.en_US
dc.language.isoenen_US
dc.relation.ispartofACM International Conference Proceeding Seriesen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectcourse syllabusen_US
dc.subjectnformation securityen_US
dc.subjectstudent evaluationen_US
dc.subjectBuffer overflowsen_US
dc.subjectComputer science curriculaen_US
dc.subjectcourse syllabusen_US
dc.subjectGeneric frameworksen_US
dc.subjectnformation securityen_US
dc.subjectstudent evaluationen_US
dc.subjectTopic areasen_US
dc.subjectCurriculaen_US
dc.subjectFrequency hoppingen_US
dc.subjectNetwork securityen_US
dc.titleObscurity of network security course curriculumen_US
dc.typeConference Objecten_US
dc.identifier.doi10.1145/2070425.2070462-
dc.identifier.scopus2-s2.0-83455218362en_US
dc.authorscopusid15061511300-
dc.identifier.startpage219en_US
dc.identifier.endpage222en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.grantfulltextreserved-
item.openairetypeConference Object-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.cerifentitytypePublications-
crisitem.author.dept05.05. Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Files in This Item:
File SizeFormat 
2754.pdf
  Restricted Access
419.74 kBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

Page view(s)

62
checked on Nov 18, 2024

Download(s)

6
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.