Skip to main content

Android-Based Mobile Apps for Hands-On Education

  • Reference work entry
  • First Online:
Encyclopedia of Education and Information Technologies
  • 61 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Andrus J, Nieh J (2012) Teaching operating systems using android. In: Proceedings of the 43rd ACM technical symposium on computer science education (SIGCSE 2012), pp 613–618, Raleigh, NC, USA, February 29 – March 03, 2012

    Google Scholar 

  • Bhattacharya P, Yang L, Guo M, Qian K, Yang M (2014) Learning mobile security with Labware. IEEE Secur Priv 12(1):69–72

    Article  Google Scholar 

  • Caltagirone S, Ortman P, Melton S, Manz D, King K, Oman P (2006) Design and implementation of a multi-use attack-defend computer security lab. In: Proceedings of the 39th annual Hawaii international conference on system sciences – HICSS, USA, 2006

    Google Scholar 

  • Chen L-C, Lin C (2007) Combining theory with practice in information security education. In: Proceedings of the 11th colloquium for information systems security education, pp 28–35, Boston, 4–7 June 2007

    Google Scholar 

  • Du W, Jayaraman K, Gaubatz N (2010) Enhancing security education with hands-on laboratory exercises. In: Proceedings of the fifth annual symposium on information assurance (ASIA ’10), June 16–17, 2010, Albany

    Google Scholar 

  • EDUCAUSE (2014) The future of mobile computing, 04/2011. http://net.educause.edu/ir/library/pdf/ESPNT1b.pdf. Accessed Nov 2014

  • Guo M, Bhattacharya P, Yang M, Qian K, Yang L (2013) Learning mobile security with android security Labware. In: Proceedings of the 44th ACM technical symposium on computer science education (SIGCSE 2013), pp 675–680, Denver, CO, USA, March 06 – 09, 2013

    Google Scholar 

  • Hill JM, Carver CA Jr, Humphries JW, Pooch UW (2001) Using an isolated network laboratory to teach advanced networks and security. In: Proceedings of the 32nd SIGCSE technical symposium on computer science education. ACM Press, Charlotte, pp 36–40

    Google Scholar 

  • Ibrahim W, Atif Y, Shuaib K, Sampson D (2015) A web-based course assessment tool with direct mapping to student outcomes. J Educ Technol Soc 18(2):46–59

    Google Scholar 

  • Levine A, Kossuth J (2011) The future of mobile computing. Mobile computing spotlight series, Part of the mobile computing 5-day EDUCAUSE Sprint, Apr 25, 2011, Louisville, USA

    Google Scholar 

  • Loveland S (2011) Human computer interaction that reaches beyond desktop applications. In: Proceedings of the 42nd ACM technical symposium computer science education (SIGCSE 11), pp 595–600, Dallas, 9–12 March 2011

    Google Scholar 

  • Northcutt S, Zeltser L, Winters S, Kent K, Ritchey RW (2005) Inside network perimeter security, 2nd edn. Sams Publishing, Indianapolis

    Google Scholar 

  • Sanderson DB (2009) Revising an assessment plan to conform to the new ABET-CAC guidelines. In: Proceedings of the 40th ACM technical symposium on computer science education (SIGCSE’09), pp 352–356, Chattanooga

    Google Scholar 

  • Trabelsi Z (2011) Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. In: Proceedings of the information security curriculum development conference, pp 74–83. Kennesaw, GA, USA, September 30 – October 01, 2011

    Google Scholar 

  • Trabelsi Z, Alketbi L (2013) Using network Packet Generators and Snort Rules for teaching Denial of service attacks. In: Proceedings of the 18th ACM conference on innovation and technology in computer science education, ITiCSE’13, pp 285–290. Canterbury, United Kingdom, July 01–03, 2013

    Google Scholar 

  • Trabelsi Z, Mustafa U (2014) A web-based firewall simulator tool for information security education. In: Proceedings of the 16th Australasian computing education conference (ACE2014). CRPIT, vol 148, pp 83–90. Auckland

    Google Scholar 

  • Trabelsi Z, Hayawi K, Al Braiki A, Mathew S (2013) Network attacks and defenses: a hands-on approach. CRC Press, Boca Raton

    Google Scholar 

  • Vigna G (2003a) Teaching network security through live exercises, In: Irvine CE, Armstrong HL (eds) World conference on information security education, volume 253 of IFIP conference proceedings, pp 3–18. Kluwer, 2003, Monterey California, USA, June 26–28, 2003

    Google Scholar 

  • Vigna G (2003b) Teaching hands-on network security: testbeds and live exercises. J Inf Warfare 2(3):8–24, 2003

    MathSciNet  Google Scholar 

  • Whitman ME, Mattord HJ, Green AW (2014) Hands-on information security lab manual, 4th edn. Cengage Learning, Singapore

    Google Scholar 

  • Yuan D, Zhong J (2008) A lab implementation of SYN flood attack and defense. In: Proceedings of the 9th ACM SIGITE conference on information technology education (SIGITE’08), Cincinnati, Ohio, USA, pp 57–58

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zouheir Trabelsi .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Trabelsi, Z. (2020). Android-Based Mobile Apps for Hands-On Education. In: Tatnall, A. (eds) Encyclopedia of Education and Information Technologies. Springer, Cham. https://doi.org/10.1007/978-3-030-10576-1_243

Download citation

Publish with us

Policies and ethics