Use of Honeynets in Computer Security Education.
Shiva AzadeganVanessa McKennaPublished in: ACIS-ICIS (2005)
Keyphrases
- computer security
- computer systems
- intrusion detection
- anomaly detection
- network intrusion detection
- information security
- distance learning
- network security
- information and communication technologies
- e learning
- educational technology
- intrusion detection system
- higher education
- mobile learning
- online learning
- data model
- query processing
- object recognition
- case study