{"title":"A Virtual and On-site Hackathon to Recruit High School Students within Cybersecurity Major","authors":"Yunkai Liu","doi":"10.6025/isej/2022/8/2/31-38","DOIUrl":"https://doi.org/10.6025/isej/2022/8/2/31-38","url":null,"abstract":"","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensibility of Classification Trees–Survey Design","authors":"Rok Piltaver, M. Luštrek, M. Gams, S. M. Ipšić","doi":"10.6025/ISEJ/2019/6/1/15-20","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/15-20","url":null,"abstract":": Comprehensibility is the decisive factor for application of classifiers in practice. However, most algorithms that learn comprehensible classifiers use classification model size as a metric that guides the search in the space of all possible classifiers instead of comprehensibility - which is ill-defined. Several surveys have shown that such simple complexity metrics do not correspond well to the comprehensibility of classification trees. This paper therefore suggests a classification tree comprehensibility survey in order to derive an exhaustive comprehensibility metrics better reflecting the human sense of classifier comprehensibility and obtain new insights about comprehensibility of classification trees.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximating DEX Utility Functions with Methods UTA and ACUTA","authors":"M. Mihelčić, M. Bohanec","doi":"10.6025/ISEJ/2019/6/1/1-8","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/1-8","url":null,"abstract":"DEX is a qualitative multi-criteria decision analysis (MCDA) method, aimed at supporting decision makers in evaluating and choosing decision alternatives. We present results of a preliminary study in which we experimentally assessed the performance of two wellknown MCDA methods UTA and ACUTA to approximate qualitative DEX utility functions with piecewise-linear marginal utility functions. This is seen as a way to improve the sensitivity of qualitative models and provide a better insight in DEX utility functions. The results indicate that the approach is in principle feasible, but at this stage suffers from problems of convergence, insufficient sensitivity and inappropriate handling of symmetric functions.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing Random Forest and Gaussian Process Modeling in the Gp-demo Algorithm","authors":"Miha Mlakar, Tea Tušar, B. Filipič","doi":"10.6025/ISEJ/2019/6/1/9-14","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/9-14","url":null,"abstract":"In surrogate-model-based optimization, the selection of an appropriate surrogate model is very important. If solution approximations returned by a surrogate model are accurate and with narrow confidence intervals, an algorithm using this surrogate model needs less exact solution evaluations to obtain results comparable to an algorithm without surrogate models. In this paper we compare two well known modeling techniques, random forest (RF) and Gaussian process (GP) modeling. The comparison includes the approximation accuracy and confidence in the approximations (expressed as the confidence interval width). The results show that GP outperforms RF and that it is more suitable for use in a surrogate-model-based multiobjective evolutionary algorithm.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133095802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of Classification Parameters of Barley Seeds Mixed with wheat Seeds by using ANN","authors":"K. Sabanci, C. Aydın","doi":"10.6025/ISEJ/2019/6/1/21-25","DOIUrl":"https://doi.org/10.6025/ISEJ/2019/6/1/21-25","url":null,"abstract":"","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133294624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection Prevention Systems and Performance Analysis via Internet Protocol Television (IPTV) using Snort Rule","authors":"Narit Hnoohom, M. Ketcham","doi":"10.6025/ISEJ/2018/5/2/49-63","DOIUrl":"https://doi.org/10.6025/ISEJ/2018/5/2/49-63","url":null,"abstract":"This paper proposed the use of the Intrusion Prevention Systems (IPS) technique to prohibit network intrusion as well as test its performance in internal attacks. The performance analysis of the network intrusion prevention system via Internet Protocol Television (IPTV) focused on the prevention of Denial of Service (DoS) attacks, which aim to destroy the host computer that is available to users. Snort was also applied for use in IPTV. From the experimental results, the IPS of TCP protocol attacked over a wired network by using Multicast IP Address displayed the most effective results by detecting up to 39,389 attack packets. Therefore, the IPS can be applied effectively to reduce, delay and prevent network intrusions.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126163757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systems Theory and Information Security: Foundations for a New Educational Approach","authors":"Joseph R. Laracy, T. Marlowe","doi":"10.6025/ISEJ/2018/5/2/35-48","DOIUrl":"https://doi.org/10.6025/ISEJ/2018/5/2/35-48","url":null,"abstract":"Information security education has traditionally been approached with a variety of tools. Models such as BellLaPadula and Clark-Wilson, cryptography, and formal methods seek to design systems without certain classes of vulnerabilities. Red teaming seeks to find vulnerabilities that were missed and security software often removes the vulnerabilities. To a lesser extent, probabilistic risk assessment and game theory have also been applied to assess threats. However, on their own, in isolation, these approaches have not “solved” the information security crisis. Internet security in particular is an area of great concern given the plethora of vulnerabilities that enable threats to confidentiality, integrity, availability, non-repudiation, authorization, authentication, and auditability. A new approach to information security engineering education is necessary that views the Internet as a complex, socio-technical system. A systems perspective acknowledges that security can only be achieved through a holistic model that addresses technological architecture and software processes, organizational behavior, and human factors. This paper suggests a novel method for information security education to identify and characterize current deficiencies in a network security control structure, elucidate the relationship between software/systems engineering and security risks, and inform an architectural description of a secure information system architecture.","PeriodicalId":140458,"journal":{"name":"Information Security Education Journal (ISEJ)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130648421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}