49 results on '"Rosanne English"'
Search Results
2. Exploring Student Perceptions and Expectations of Cyber Security.
3. Research-led Active Learning Sessions in Cyber Security through Research Paper Reading.
4. Towards Integrated Graduate Skills for UK Computing Science Students.
5. Experiences of Assessment in Data and Security Courses using Personal Response Systems.
6. Enhancing UK Computing Education Research Infrastructure with Doctoral Consortia.
7. Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice.
8. Designing Computer Security Assessments to Reduce Plagiarism.
9. Opportunities to Fail: Using Peer-review to support Assessment Literacy in Cyber Security.
10. Improving Computer Science Student Graduate Skills Through Assessment.
11. Modelling the Security of Recognition-Based Graphical Passwords.
12. You Have Three Tries Before Lockout. Why Three?.
13. Page Retrievability Calculator.
14. Engaging Students in Threat Thinking with the Cyber Security Cinema
15. The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords.
16. Measuring the revised guessability of graphical passwords.
17. Towards a metric for recognition-based graphical password security.
18. Comparison of high capacity steganography techniques.
19. Opportunities to Fail: Using Peer-review to Support Assessment Literacy in Cyber Security
20. Improving Computer Science Student Graduate Skills Through Assessment
21. Experiences of assessment in data and security courses using personal response systems
22. Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice
23. Why don’t UK citizens protest against privacy-invading dragnet surveillance?
24. Simulating and modelling the effectiveness of graphical password intersection attacks
25. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes
26. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE
27. The effectiveness of intersection attack countermeasures for graphical passwords
28. Measuring the revised guessability of graphical passwords
29. Towards a metric for recognition-based graphical password security
30. Devising a cyber security management module through integrated course design.
31. CEP 2022: Computing Education Practice 2022, Durham, United Kingdom, 6 January 2022
32. CogniPGA: Longitudinal Evaluation of Picture Gesture Authentication with Cognition-Based Intervention.
33. Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice.
34. Designing Computer Security Assessments to Reduce Plagiarism.
35. Why don’t UK citizens protest against privacy-invading dragnet surveillance?
36. Page Retrievability Calculator.
37. Simulating and modelling the effectiveness of graphical password intersection attacks.
38. The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords.
39. Table of contents.
40. The Migration of Persons with AIDS: Data From 12 States, 1985 to 1992.
41. Differences in bereavement reactions within couples following death of a child.
42. FrontMatter.
43. Call for Sheps Award Nominations in Demography.
44. Cybersecurity Teaching in Higher Education
45. Baby Names : More Than 3000 Names, with Origins and Meanings
46. Advances in Information Retrieval : 36th European Conference on IR Research, ECIR 2014, Amsterdam, The Netherlands, April 13-16, 2014, Proceedings
47. Echo360 Awards Over $120,000 in Technology Grants
48. Adolescent parents who lose their child are often forgotten
49. M - Z
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.