Intrusion Detection Through Dynamic Software Measurement
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
IEEE Security and Privacy
A behavioral approach to worm detection
Proceedings of the 2004 ACM workshop on Rapid malcode
Proceedings of the 4th ACM workshop on Recurring malcode
Introduction to Probability Models, Ninth Edition
Introduction to Probability Models, Ninth Edition
Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
Designing computer forensics courses using case studies to enhance computer security curricula
Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
An interdisciplinary accounting forensics course to improve computer science enrollments
Journal of Computing Sciences in Colleges
e-learning of security and information assurance with sequence diagrams
Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments
Hi-index | 0.00 |
We have been experimenting with methods for improving undergraduate curricula and research experiences as well as the security courses for Computer Science and Information Systems students. Recent surges in attacks and intrusions reflect vulnerabilities in computer networks and emerge of sophisticated new attacks are always associated with determining evolving risks and preventing them. Innovative methods and tools can help attack defenses, prevent attack propagations, detect and respond to such attacks. Mathematical or statistical modeling of attacks is an important concept to introduce to students in security courses as they help assess vulnerability under a variety of conditions that predetermine the extent of damages to a system and, thereby, predict possible losses. This paper describes a learning module developed to help students understand basic statistical and mathematical modeling of unscrupulous attacks.