Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Connie Justice"'
Publikováno v:
Data, Vol 9, Iss 10, p 119 (2024)
Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can
Externí odkaz:
https://doaj.org/article/ec6ff68cab55425ca407082bc2ffd25f
Publikováno v:
Education Sciences, Vol 12, Iss 11, p 732 (2022)
Teaching of modern cybersecurity specialists should be up to date and use the newest methods and methodologies in universities as the IT industry is rapidly growing and constantly changing. A good idea is to use methods of management in IT companies
Externí odkaz:
https://doaj.org/article/71baee8cbf8d425bb23aaccd25bee813
Publikováno v:
European Conference on Cyber Warfare and Security. 21:256-262
Zero Trust Architecture (ZTA) deployments are growing in popularity, widely viewed as a solution to historical enterprise security monitoring that typically finds attackers months after they have gained system access. ZTA design incorporates multiple
Autor:
Connie Justice, Char Sample
Publikováno v:
International Conference on Cyber Warfare and Security. 17:81-91
Expected growth of the job market for cyber security professionals in both the US and the UK remains strong for the foreseeable future. While there are many roles to be found in cyber security, that vary from penetration tester to chief information s
Autor:
Volodymyr Maksymovych, Elena Nyemkova, Connie Justice, Mariia Shabatura, Oleh Harasymchuk, Yuriy Lakh, Morika Rusynko
Publikováno v:
Electronics; Volume 11; Issue 13; Pages: 2039
Poisson pulse sequence generators are quite well studied, have good statistical properties, are implemented both in software and hardware, but have not yet been used for the purpose of authentication. The work was devoted to modeling authenticators o
Publikováno v:
FIE
The National Research Council’s report states that cross-sectional studies of multiple courses within a discipline, or all courses in a major, would enhance the understanding of how people learn the concepts, practices, and ways of thinking of scie
Publikováno v:
IEEE BigData
Fake News is widely recognized as a security problem that involves multiple academic disciplines; therefore, solving the problem of fake news requires a cross-discipline approach where behavioral science, computational linguistics, mathematics, stati
Improve Integrated Learning in Computer Information Technology through Cross-Curricular Instruction?
Autor:
Connie Justice, Xiao Luo
Publikováno v:
SIGITE
In order to better understand the cognitive process of undergraduate students in connecting and transferring knowledge from one setting to another, and better assist students to obtain the big picture of information technology, investigations into cr
Autor:
Connie Justice, Nichole McFarland
Publikováno v:
2017 ASEE Annual Conference & Exposition Proceedings.
Autor:
Connie Justice, Rushabh Vyas
Publikováno v:
2017 ASEE Annual Conference & Exposition Proceedings.