2013 World Congress on Computer and Information Technology (WCCIT) 2013
DOI: 10.1109/wccit.2013.6618731
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating lab experience into computer security courses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Since unexpected outcomes are possible by design, the evaluation process includes a short lab review, similar to [7]. Reviews took approximately 30 minutes per team and consisted of asking students three to five questions, at least one of which was addressed to each student alone to evaluate the individual performance of both team members.…”
Section: H Correction and Assessment Of Student Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Since unexpected outcomes are possible by design, the evaluation process includes a short lab review, similar to [7]. Reviews took approximately 30 minutes per team and consisted of asking students three to five questions, at least one of which was addressed to each student alone to evaluate the individual performance of both team members.…”
Section: H Correction and Assessment Of Student Resultsmentioning
confidence: 99%
“…Others have developed security labs using virtual machines [6], [7], recognizing that students are more motivated to take a security class that includes a lab than they are with a pure conceptual class. Othmane et al [7] found that sometimes the answers students provided were unexpected but not wrong; in these cases they let students demonstrate their work to determine its correctness.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The classical approach in building IT Security laboratory is by providing a dedicated computer lab [1] [2]. Each machine is represented by a dedicated computer.…”
Section: Introductionmentioning
confidence: 99%