Teaching human-centered security using nontraditional techniques.
Karen RenaudQuintin I. CuttsPublished in: ACM Trans. Comput. Educ. (2013)
Keyphrases
- human centered
- ambient intelligence
- human robot interaction
- security issues
- security policies
- information security
- learning environment
- intrusion detection
- e learning
- learning process
- statistical databases
- multimedia databases
- hong kong
- neural network
- computer programming
- security requirements
- higher education
- access control
- fuzzy logic
- data sets
- human centric
- multi modal
- online learning
- nearest neighbor
- music composition