Open Access
Issue |
E3S Web Conf.
Volume 548, 2024
X International Conference on Advanced Agritechnologies, Environmental Engineering and Sustainable Development (AGRITECH-X 2024)
|
|
---|---|---|
Article Number | 03016 | |
Number of page(s) | 9 | |
Section | Information Technologies, Automation Engineering and Digitization of Agriculture | |
DOI | https://doi.org/10.1051/e3sconf/202454803016 | |
Published online | 12 July 2024 |
- E.V. Vasilyeva, A.N Kamanina, Discussion 117,108–118 (2023). https://www.doi.org/10.46320/2077-7639-2023-2023-2-117-108-118 [Google Scholar]
- L.A. Konstantinova, I.V. Kramarenko, E-Management 5(3), 50–63 (2022). https://www.doi.org/10.26425/2658-3445-2022-5-3-50-63 [CrossRef] [Google Scholar]
- A. Zubarev, V. Dushkevich, Information Security 6 (2019) [Google Scholar]
- N.A. Bushmeleva, E.V. Razova, Scientific and methodological electronic journal "Concept" (2), 537–544 (2017) [Google Scholar]
- E.K. Grosheva, P.I. Nevmerzhickij, Business education in knowledge economy 3(8), 35–38 (2017) [Google Scholar]
- V.P. Polyakov, Methodical system of teaching information security among university students: Doctor of Pedagogical Sciences dissertation: 13.00.08 (Nizhny Novgorod, 2006) [Google Scholar]
- A.A. Altufieva, Methodical bases of teaching information security on the basis of telecommunication resources of the Internet: dissertation of candidate of pedagogical sciences:13.00.02 (St. Petersburg, 2008) [Google Scholar]
- O. A. Karaulova, Interactive teaching methods as a factor in improving the quality of the educational process in Proceedings of the 11th International Scientific and Practical Conference New Information Technologies in Education and Science NITO-2018, Yekaterinburg, 217–223 (2018) [Google Scholar]
- E. B. Belov, Information and Communication (2), 94–96 (2002) [Google Scholar]
- Yuechuan Wei, Some ideas on construction of course of mathematical foundations in information security, in Proceedings of the 2015 Conference on Education and Teaching in Colleges and Universities, 10–12 (2016). https://www.doi.org/10.2991/cetcu-15.2016.4 [Google Scholar]
- Michael E. Whitman, Herbert J. Mattord Designing and teaching information security curriculum, in Proceedings of the 1st Annual Conference on Information Security Curriculum Development, 8 Oct 2004, 1–7 (2004). https://www.doi.org/10.1145/1059524.1059526 [Google Scholar]
- M. Richards, B.A. Price, B. Nuseibeh, Progress in Informatics 5, 91 (2008). https://www.doi.org/10.2201/NiiPi.2008.5.9 [CrossRef] [Google Scholar]
- R. Gallo, R. Dahab, Assurance Cases as a Didactic Tool for Information Security in Proceedings of IFIP WISE 9 2015: The Ninth World Conference on Information Security Education, May 2015, 15–26 (2015). https://www.doi.org/10.1007/978-3-319-18500-2_2 [Google Scholar]
- C. Morales-Gonzalez, M. Harper, X. Fu, Journal of The Colloquium for Information Systems Security Education 10(1), 6 (2023). https://www.doi.org/10.53735/cisse.v10i1.173 [CrossRef] [Google Scholar]
- G.D. Momcheva, T.I. Bakardjieva, V.G. Spasova, A.I. Ivanova, Education and Technologies 12(2), 516–518 (2021). https://www.doi.org/10.26883/2010.212.3903 [CrossRef] [Google Scholar]
- Ahmad Fuzi Md Ajis, Rohayu Ahmad, Suhaila Osman, Isma bin Ishak, Catalyst of Information Security in Malaysia Higher Learning Institutions, 2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE), 18-19 April 2020, (2020). https://www.doi.org/10.1109/ISCAIE47305.2020.9108806 [Google Scholar]
- C.K. Chan, A.W.T. Yeoh, Journal of Computer and Communications 6(1), 1–11 (2018). https://www.doi.org/10.4236/jcc.2018.61001 [Google Scholar]
- S.N. Titovskii, N.V. Titovskaia, T.S. Titovskaya, T.P. Pushkaryova, Virtualization and problems of training IT specialists, in European Proceedings of Social and Behavioural Sciences EpSBS: Proceedings of the International Conference on Economic and Social Trends for Sustainability of Modern Society (ICEST 2020), 20-22 May 2020, 794–799, Krasnoyarsk Science and Technology City Hall, Krasnoyarsk (2020). https://www.doi.org/10.15405/epsbs.2020.10.03.93 [CrossRef] [Google Scholar]
- J. Stites, A. Siraj, E.L Brown, Smart grid security educational training with thundercloud: a virtual security test bed, in Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference, 12 Oct 2013, 105–110 (2013). https://www.doi.org/10.1145/2528908.2528927 [Google Scholar]
- G. Chryssolouris, D. Mavrikios, D. Fragos, V. Karabatsou, R. Pistiolis, International Journal of Computer Integrated Manufacturing 15(3), 214–221 (2002). https://www.doi.org/10.1080/09511920110034978 [CrossRef] [Google Scholar]
- S.N. Titovskii, N.V. Titovskaia, Use of virtual machines in KrasSAU, in collection: Science and Education: Experience, Problems, Prospects of Development. Materials of the International Scientific-Practical Conference, 22-23 Apr 2015, 141–144, Krasnoyarsk State Agrarian University, Krasnoyarsk (2015) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.