Cis 690 Capstone Mobile Security Case Study

Promote Self-efficacy in Learning of Mobile App and Security with real-world Relevant Laboratory (Abstract Only)

Authors: Kai QianKennesaw State University, Marietta, GA, USA
Dan LoKennesaw State University, Marietta, GA, USA
Wei ChenTennessee State University, Nashville, TN, USA
Ying QianEast China Normal University, Shanghai, China
2016 Article
  Bibliometrics
· Citation Count: 0
· Downloads (cumulative): n/a
· Downloads (12 Months): n/a
· Downloads (6 Weeks): n/a

Published in:

 
· Proceeding
SIGCSE '16 Proceedings of the 47th ACM Technical Symposium on Computing Science Education
Pages 691-691

Memphis, Tennessee, USA — March 02 - 05, 2016
ACMNew York, NY, USA ©2016
table of contents ISBN: 978-1-4503-3685-7 doi>10.1145/2839509.2850552

authentic learningcomputational science and engineering educationdistributed architecturesdistributed computing methodologiesinteractive learning environmentsinteractive systems and toolslabmobileparallel architecturesparallel computing methodologiesreal worldweb services

Powered by


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us

Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only)

Authors: Xiaohong YuanNorth Carolina A&T State University, Greensboro, NC, USA
Kelvin S. BryantNorth Carolina A&T State University, Greensboro, NC, USA
Kenneth WilliamsNorth Carolina A&T State University, Greensboro, NC, USA
Jinsheng XuNorth Carolina A&T State University, Greensboro, NC, USA
2015 Article
  Bibliometrics
· Citation Count: 1
· Downloads (cumulative): n/a
· Downloads (12 Months): n/a
· Downloads (6 Weeks): n/a

Published in:

 
· Proceeding
SIGCSE '15 Proceedings of the 46th ACM Technical Symposium on Computer Science Education
Pages 686-686

Kansas City, Missouri, USA — March 04 - 07, 2015
ACMNew York, NY, USA ©2015
table of contents ISBN: 978-1-4503-2966-8 doi>10.1145/2676723.2691902

computer crimecomputer science educationcryptanalysis and other attackscurriculumintrusion/anomaly detection and malware mitigationmobile computingmobile securitymodel curricula

Powered by


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us

0 thoughts on “Cis 690 Capstone Mobile Security Case Study

Leave a Reply

Your email address will not be published. Required fields are marked *