2012
DOI: 10.1109/mic.2012.5
|View full text |Cite
|
Sign up to set email alerts
|

Defense against the Dark Arts

Abstract: Computer science faculty must attract and retain students by offering innovative courses that spark student interest, yet still teach core, computer science concepts. These efforts have become particularly important as computer science enrollments have declined, thus increasing concerns for attracting and retaining students. We describe an innovative course that leverages students' interest in computer security issues to attract and retain technically-oriented students. Our initial vision was to offer a course… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Malware is software designed to intrude a computer system without the consent of the owner through the use of viruses, backdoors, spywares, trojans, keyloggers, botnets, and worms . In this context accurate malware detection is a necessity . Countermeasures may be dedicated to specific devices, as happens in the context of mobile devices and FM radios, to specific applications such as Internet chats, to operating systems such as Android, and to given environments such as delay tolerant networks (DTNs) and Ad hoc On‐Demand Distance Vector (AODV)‐based MANETs …”
Section: Introductionmentioning
confidence: 99%
“…Malware is software designed to intrude a computer system without the consent of the owner through the use of viruses, backdoors, spywares, trojans, keyloggers, botnets, and worms . In this context accurate malware detection is a necessity . Countermeasures may be dedicated to specific devices, as happens in the context of mobile devices and FM radios, to specific applications such as Internet chats, to operating systems such as Android, and to given environments such as delay tolerant networks (DTNs) and Ad hoc On‐Demand Distance Vector (AODV)‐based MANETs …”
Section: Introductionmentioning
confidence: 99%