Corruption is a primary development challenge in Indonesia's economic and social field. In order to overcome these threats, Indonesia's government has been established the Corruption Eradication Commission (Ko...
详细信息
The continuously increasing gap in cybersecurity workforce in numbers and in skill level, demands a fundamental shift in how we approach cybersecurity education and training. The complex and ever-evolving cybersecurit...
详细信息
ISBN:
(纸本)9798350336429
The continuously increasing gap in cybersecurity workforce in numbers and in skill level, demands a fundamental shift in how we approach cybersecurity education and training. The complex and ever-evolving cybersecurity industry and threat landscape underscores the need for cybersecurity professionals with versatile skillset, growth mindset and resilient character to support organizations' cyber capabilities, preparedness and resilience. This makes it more challenging to develop and operate educational programs that effectively train cybersecurity talent, which is able to take on and perform in multiple roles and responsibilities, without tailoring the program to be very specific to such roles. Hence, cybersecurity educational programs must train professionals that can stand the test of time, in a fast-paced and quickly changing career. In this paper, we expand on innovative approaches we developed to support experiential learning and expertise acquisition for future cybersecurity professionals. The described approach is implemented and is continuously improved and enhanced as part of the educational framework for students in the Cybersecurity Bachelors offered at the Texas A&M University System - RELLIS Campus11Work performed while at Texas A&M University - Commerce. We developed a technology platform (virtual and hands-on) that extends the capabilities of existing similar frameworks (cyber-range) to enable higher levels of experiential learning. A cyber-range is a technology solution, used in industry and academia that provides a dedicated environment to enable several cybersecurity use-cases. The core capability of a cyber-range is to provide users with access to safe, isolated, monitored and secured sandbox environment. We propose and continue to develop an integrated cyber-range platform, CyberExpert cyber-range, that is designed and built using open-source and accessible tools. The CyberExpert cyber-range is equipped with data collection and analysis platforms
This study explores the factors influencing student engagement in e-learning and proposes strategies for improvement. It incorporates a mixed-method approach, combining quantitative data from a learner survey with qua...
详细信息
ISBN:
(数字)9798350367492
ISBN:
(纸本)9798350367508
This study explores the factors influencing student engagement in e-learning and proposes strategies for improvement. It incorporates a mixed-method approach, combining quantitative data from a learner survey with qualitative insights from interviews and focus groups involving educators and students. The survey investigates technological, pedagogical, and personal factors that impact engagement, while qualitative data provide deeper insights into experiences and perceptions. The findings underscore that student engagement in e-learning is shaped by the quality of digital content, opportunities for interaction, feedback mechanisms, and individual learner characteristics. Personalized learning experiences and robust support systems emerge as crucial for enhancing engagement. The study recommends practical strategies to strengthen e-learning engagement, including adopting adaptive learning technologies, promoting collaborative learning communities, and providing targeted support for diverse learner needs. These insights contribute to optimizing engagement within digital learning environments.
Fog computing is an extension of cloud computing and presents additional devices called fog devices near IoT devices providing services on behalf of cloud servers. Although fog computing brings several advantages, rap...
Fog computing is an extension of cloud computing and presents additional devices called fog devices near IoT devices providing services on behalf of cloud servers. Although fog computing brings several advantages, rapid growth in the data generated by IoT devices increases communication and computational costs. As data sensed by IoT devices may correlate, there is a high possibility of duplicate copies in the sensed data. Data deduplication is a compression technique that reduces communication and storage overhead by skipping the upload and storage of duplicate copies of data. However, deduplication for a fog-enabled IoT system introduces new security issues. In this paper, we propose a novel secure deduplication approach with dynamic key management in a fog-enabled IoT system. We introduce a multilayer encryption scheme with dynamic key management to prevent the access of revoked users to the data. We implement the proposed scheme in a realistic scenario using Raspberry Pi and Firebase cloud services. The performance analysis shows that our approach achieves confidentiality and forward secrecy along with lower storage, computational, and communication costs.
Recent work has shown that Machine Learning (ML) programs are error-prone and called for contracts for ML code. Contracts, as in the design by contract methodology, help document APIs and aid API users in writing corr...
详细信息
The testing phase is one of the most important phases of the software life cycle, which ensures the efficiency and quality of the software product. Many tests are conducted on the software, not only to detect errors, ...
The testing phase is one of the most important phases of the software life cycle, which ensures the efficiency and quality of the software product. Many tests are conducted on the software, not only to detect errors, but also to provide a complete picture of the quality of the outputs provided by the program and to increase confidence in all of the functions. Due to the difficulty in estimating most of the test data and the time spent in this process, many techniques are used in the automatic generation of test cases. The genetic algorithm is one of the most important used methods in this process, and it has achieved great success in generating limited and appropriate test cases to give a complete conceptualization of the function under test. The Junit testing framework is used in automated testing processes within test-based development methodologies, but it lacks of a mechanism to specify and generate a specific test data that put the program under test in the required scenario. In order for the programmer to be able to perform the test automatically in an integrated way within JUnit testing framework, the genetic algorithm has been improved in this research and emerged into the JUnit testing framework to fully automatic testing and generate various numeric test cases at the unit-test stage. Based on testing of the proposed algorithm within the Junit testing framework, it has proven its effectiveness and facilitation of generating perfect specific numeric test cases.
This article discusses the possibilities of measuring Particulate Matter using optical low-cost sensors. Depending on the sensor used, not only can there be problems with the positioning of the sensor with respect to ...
详细信息
There is a growing consensus in research and practice that value-creating networks and ecosystems are supplementing the traditional distinction between the internal firm and market perspectives. To achieve joint value...
详细信息
Maritime cyber-terrorist attacks have become a major concern to the entire world in recent decades. Everyone should be more aware of marine strategies to prevent cyberterrorist attacks, both locally and globally. This...
Maritime cyber-terrorist attacks have become a major concern to the entire world in recent decades. Everyone should be more aware of marine strategies to prevent cyberterrorist attacks, both locally and globally. This study investigates how Sri Lanka and the Sri Lanka Navy (SLN) may successfully address maritime security concerns by utilizing current resources and developing a marine strategy to counter such maritime cyber-terrorism assaults. The literature review in this thesis primarily evaluates the level of understanding in Sri Lanka concerning when marine cyber terrorism strikes may occur. Furthermore, this thesis investigates if Sri Lanka has any maritime rules and regulations. The use of such laws and regulations will concentrate on how they can increase their expertise.
Exploration and manipulation of physical objects are essential for early childhood learning. Previous investigations found several TUI uses in other fields. Less research has been done on tangible learning for youngst...
详细信息
暂无评论