How Secure are our Computer Systems Courses?
Majed AlmansooriJessica LamElias FangKieran MulliganAdalbert Gerald Soosai RajRahul ChatterjeePublished in: ICER (2020)
Keyphrases
- computer systems
- data processing
- operating system
- hardware and software
- computing systems
- communication systems
- high end
- software developers
- higher education
- human beings
- computer technology
- computer networks
- computer architecture
- security mechanisms
- e learning
- information systems
- learning objects
- security requirements
- computer security
- database
- information processing systems
- computer science
- lightweight
- query processing
- mobile devices
- machine learning
- computer hardware
- real world