Supplementary file 1_Teaching log data analysis in Indian cybersecurity classrooms: a mixed-methods study of pedagogical challenges and learner difficulties.pdf
Introduction<p>Log data analysis is a core competency in cybersecurity education, essential for investigating cyberattacks and identifying their root causes. However, teaching and learning this skill present distinct challenges in resource-constrained contexts such as India. Existing pedagogic...
Saved in:
| Main Author: | Priya V. Nagvekar (22611434) (author) |
|---|---|
| Other Authors: | Syaamantak Das (22337596) (author), Sridhar Iyer (12660433) (author) |
| Published: |
2025
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A concrete example showing a few log lines from a VMWare log file.
by: Hao Zhang (15339)
Published: (2025) -
Comparison of methods for log anomaly detection.
by: Hao Zhang (15339)
Published: (2025) -
Learning Cybersecurity in the Middle East
by: Raad North (22399618)
Published: (2025) -
Another case of log file anomaly detection is shown.
by: Hao Zhang (15339)
Published: (2025) -
One case of log file anomaly detection is shown.
by: Hao Zhang (15339)
Published: (2025)