The science, engineering and business of cyber security
Abstract
Index Terms
- The science, engineering and business of cyber security
Recommendations
A program to increase female engineering and science enrollments through NSF STEM scholarships
FIE '12: Proceedings of the 2012 IEEE Frontiers in Education Conference (FIE)This paper describes a scholarship and student mentoring program created to increase female enrollment and graduates in our Schools of Engineering and Science. This program was developed and administered jointly by both of the schools, and the ...
Computing MATTERS: building pathways to cyberinfrastructure
XSEDE '12: Proceedings of the 1st Conference of the Extreme Science and Engineering Discovery Environment: Bridging from the eXtreme to the campus and beyondAs we prepare students for the 21st century workforce, three of the most important skills for advancing modern mathematics and science are quantitative reasoning, computational thinking, and multi-scale modeling. Computing MATTERS: Pathways to ...
Starting Early: Increasing Elementary (K-8) Student Science Achievement With Retired Scientists and Engineers
Teaching Opportunities for Partners in Science (TOPS) is an outreach program using volunteers (the partners ) for: 1) assisting teachers in grades K-8 with preparation and delivery of science and engineering (S&E) lessons in the classroom; 2) providing ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Ahmad-Reza Sadeghi,
- Program Chairs:
- Virgil Gligor,
- Moti Yung
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Keynote
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 507Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in