Information Security Education Journal (ISEJ)最新文献

筛选
英文 中文
A Virtual and On-site Hackathon to Recruit High School Students within Cybersecurity Major 网络安全专业高中生网络黑客马拉松
Information Security Education Journal (ISEJ) Pub Date : 2021-12-01 DOI: 10.6025/isej/2022/8/2/31-38
Yunkai Liu
{"title":"A Virtual and On-site Hackathon to Recruit High School Students within Cybersecurity Major","authors":"Yunkai Liu","doi":"10.6025/isej/2022/8/2/31-38","DOIUrl":"https://doi.org/10.6025/isej/2022/8/2/31-38","url":null,"abstract":"","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mind, Unity and Software Security - Analysis of Functional Unity in Cases of Dataonly Attack 思想、统一与软件安全——纯数据攻击下的功能统一分析
Information Security Education Journal (ISEJ) Pub Date : 2021-12-01 DOI: 10.6025/isej/2022/8/2/65-74
Ziyuan Meng
{"title":"Mind, Unity and Software Security - Analysis of Functional Unity in Cases of Dataonly Attack","authors":"Ziyuan Meng","doi":"10.6025/isej/2022/8/2/65-74","DOIUrl":"https://doi.org/10.6025/isej/2022/8/2/65-74","url":null,"abstract":"","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129453916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
First Laboratory Experience for Cyber Engineering and Cybersecurity Students 网络工程和网络安全学生的第一次实验室体验
Information Security Education Journal (ISEJ) Pub Date : 2021-12-01 DOI: 10.6025/isej/2022/8/2/39-64
F. Mak
{"title":"First Laboratory Experience for Cyber Engineering and Cybersecurity Students","authors":"F. Mak","doi":"10.6025/isej/2022/8/2/39-64","DOIUrl":"https://doi.org/10.6025/isej/2022/8/2/39-64","url":null,"abstract":"","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124160839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensibility of Classification Trees–Survey Design 分类树的可理解性——调查设计
Information Security Education Journal (ISEJ) Pub Date : 2019-06-01 DOI: 10.6025/ISEJ/2019/6/1/15-20
Rok Piltaver, M. Luštrek, M. Gams, S. M. Ipšić
{"title":"Comprehensibility of Classification Trees–Survey Design","authors":"Rok Piltaver, M. Luštrek, M. Gams, S. M. Ipšić","doi":"10.6025/ISEJ/2019/6/1/15-20","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/15-20","url":null,"abstract":": Comprehensibility is the decisive factor for application of classifiers in practice. However, most algorithms that learn comprehensible classifiers use classification model size as a metric that guides the search in the space of all possible classifiers instead of comprehensibility - which is ill-defined. Several surveys have shown that such simple complexity metrics do not correspond well to the comprehensibility of classification trees. This paper therefore suggests a classification tree comprehensibility survey in order to derive an exhaustive comprehensibility metrics better reflecting the human sense of classifier comprehensibility and obtain new insights about comprehensibility of classification trees.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Approximating DEX Utility Functions with Methods UTA and ACUTA 用UTA和ACUTA方法逼近DEX效用函数
Information Security Education Journal (ISEJ) Pub Date : 2019-06-01 DOI: 10.6025/ISEJ/2019/6/1/1-8
M. Mihelčić, M. Bohanec
{"title":"Approximating DEX Utility Functions with Methods UTA and ACUTA","authors":"M. Mihelčić, M. Bohanec","doi":"10.6025/ISEJ/2019/6/1/1-8","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/1-8","url":null,"abstract":"DEX is a qualitative multi-criteria decision analysis (MCDA) method, aimed at supporting decision makers in evaluating and choosing decision alternatives. We present results of a preliminary study in which we experimentally assessed the performance of two wellknown MCDA methods UTA and ACUTA to approximate qualitative DEX utility functions with piecewise-linear marginal utility functions. This is seen as a way to improve the sensitivity of qualitative models and provide a better insight in DEX utility functions. The results indicate that the approach is in principle feasible, but at this stage suffers from problems of convergence, insufficient sensitivity and inappropriate handling of symmetric functions.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Random Forest and Gaussian Process Modeling in the Gp-demo Algorithm Gp-demo算法中随机森林与高斯过程建模的比较
Information Security Education Journal (ISEJ) Pub Date : 2019-06-01 DOI: 10.6025/ISEJ/2019/6/1/9-14
Miha Mlakar, Tea Tušar, B. Filipič
{"title":"Comparing Random Forest and Gaussian Process Modeling in the Gp-demo Algorithm","authors":"Miha Mlakar, Tea Tušar, B. Filipič","doi":"10.6025/ISEJ/2019/6/1/9-14","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/9-14","url":null,"abstract":"In surrogate-model-based optimization, the selection of an appropriate surrogate model is very important. If solution approximations returned by a surrogate model are accurate and with narrow confidence intervals, an algorithm using this surrogate model needs less exact solution evaluations to obtain results comparable to an algorithm without surrogate models. In this paper we compare two well known modeling techniques, random forest (RF) and Gaussian process (GP) modeling. The comparison includes the approximation accuracy and confidence in the approximations (expressed as the confidence interval width). The results show that GP outperforms RF and that it is more suitable for use in a surrogate-model-based multiobjective evolutionary algorithm.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133095802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Determination of Classification Parameters of Barley Seeds Mixed with wheat Seeds by using ANN 用人工神经网络确定大麦与小麦混合种子的分类参数
Information Security Education Journal (ISEJ) Pub Date : 2019-06-01 DOI: 10.6025/ISEJ/2019/6/1/21-25
K. Sabanci, C. Aydın
{"title":"Determination of Classification Parameters of Barley Seeds Mixed with wheat Seeds by using ANN","authors":"K. Sabanci, C. Aydın","doi":"10.6025/ISEJ/2019/6/1/21-25","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/21-25","url":null,"abstract":"","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133294624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion Detection Prevention Systems and Performance Analysis via Internet Protocol Television (IPTV) using Snort Rule 基于Snort规则的IPTV入侵检测防御系统及其性能分析
Information Security Education Journal (ISEJ) Pub Date : 2018-12-01 DOI: 10.6025/ISEJ/2018/5/2/49-63
Narit Hnoohom, M. Ketcham
{"title":"Intrusion Detection Prevention Systems and Performance Analysis via Internet Protocol Television (IPTV) using Snort Rule","authors":"Narit Hnoohom, M. Ketcham","doi":"10.6025/ISEJ/2018/5/2/49-63","DOIUrl":"https://doi.org/10.6025/ISEJ/2018/5/2/49-63","url":null,"abstract":"This paper proposed the use of the Intrusion Prevention Systems (IPS) technique to prohibit network intrusion as well as test its performance in internal attacks. The performance analysis of the network intrusion prevention system via Internet Protocol Television (IPTV) focused on the prevention of Denial of Service (DoS) attacks, which aim to destroy the host computer that is available to users. Snort was also applied for use in IPTV. From the experimental results, the IPS of TCP protocol attacked over a wired network by using Multicast IP Address displayed the most effective results by detecting up to 39,389 attack packets. Therefore, the IPS can be applied effectively to reduce, delay and prevent network intrusions.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126163757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systems Theory and Information Security: Foundations for a New Educational Approach 系统理论与信息安全:一种新的教育方法的基础
Information Security Education Journal (ISEJ) Pub Date : 2018-12-01 DOI: 10.6025/ISEJ/2018/5/2/35-48
Joseph R. Laracy, T. Marlowe
{"title":"Systems Theory and Information Security: Foundations for a New Educational Approach","authors":"Joseph R. Laracy, T. Marlowe","doi":"10.6025/ISEJ/2018/5/2/35-48","DOIUrl":"https://doi.org/10.6025/ISEJ/2018/5/2/35-48","url":null,"abstract":"Information security education has traditionally been approached with a variety of tools. Models such as BellLaPadula and Clark-Wilson, cryptography, and formal methods seek to design systems without certain classes of vulnerabilities. Red teaming seeks to find vulnerabilities that were missed and security software often removes the vulnerabilities. To a lesser extent, probabilistic risk assessment and game theory have also been applied to assess threats. However, on their own, in isolation, these approaches have not “solved” the information security crisis. Internet security in particular is an area of great concern given the plethora of vulnerabilities that enable threats to confidentiality, integrity, availability, non-repudiation, authorization, authentication, and auditability. A new approach to information security engineering education is necessary that views the Internet as a complex, socio-technical system. A systems perspective acknowledges that security can only be achieved through a holistic model that addresses technological architecture and software processes, organizational behavior, and human factors. This paper suggests a novel method for information security education to identify and characterize current deficiencies in a network security control structure, elucidate the relationship between software/systems engineering and security risks, and inform an architectural description of a secure information system architecture.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130648421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nested Tunnel: Information Security in Hybrid Cloud Computing 嵌套隧道:混合云计算中的信息安全
Information Security Education Journal (ISEJ) Pub Date : 2018-06-01 DOI: 10.6025/isej/2018/5/1/24-28
D. Taneja, S. Tyagi
{"title":"Nested Tunnel: Information Security in Hybrid Cloud Computing","authors":"D. Taneja, S. Tyagi","doi":"10.6025/isej/2018/5/1/24-28","DOIUrl":"https://doi.org/10.6025/isej/2018/5/1/24-28","url":null,"abstract":"","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124306929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信