Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Int J Netw Secur Appl ; 12(1): 1-18, 2020 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-34290487

RESUMO

In the present world, it is difficult to realize any computing application working on a standalone computing device without connecting it to the network. A large amount of data is transferred over the network from one device to another. As networking is expanding, security is becoming a major concern. Therefore, it has become important to maintain a high level of security to ensure that a safe and secure connection is established among the devices. An intrusion detection system (IDS) is therefore used to differentiate between the legitimate and illegitimate activities on the system. There are different techniques are used for detecting intrusions in the intrusion detection system. This paper presents the different clustering techniques that have been implemented by different researchers in their relevant articles. This survey was carried out on 30 papers and it presents what different datasets were used by different researchers and what evaluation metrics were used to evaluate the performance of IDS. This paper also highlights the pros and cons of each clustering technique used for IDS, which can be used as a basis for future work.

2.
TechTrends ; 64(6): 899-910, 2020 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-34396368

RESUMO

This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the impact that technology can have on improving communities by immersing students in the exploration of one such device that is a growing phenomenon, the "aerial drone." In this Academy, the students learned various operations of the drone through Python programming language, and some cybersecurity issues and solutions. The student teams, under the guidance of diverse mentors, comprehensively fortified their STEM problem-solving skills and critical thinking. Both formative and summative evaluations for this Academy showed that it helped students improve their critical thinking ability and motivated them to pursue careers in STEM-related disciplines, specifically in information technology and cybersecurity areas.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...