Curtis A. Carver

Learn More
This paper discusses the use of an isolated network laboratory to teach computer security using persistent cooperative groups and an active learning approach. Computer security and computer security education are areas of increasing importance as computer systems become more interconnected. When offered, undergraduate and graduate computer security courses(More)
Cloud computing is frequently being utilized to eliminate the need to local information resources. In this paper, we address the problem of intrusion detection in cloud environments and the possibility of allowing intrusion detection to be provided to clients as a service. The paper describes the Cloud Intrusion Detection Service (CIDS), which is intended(More)
Because students have different learning styles, it's important to incorporate multiple teaching techniques into the classroom experience. One such technique is the use of puzzles and games in the classroom to reinforce the learning objectives. Many topics in Computer Science are well suited for coverage in such a game. Several in-class puzzles and games(More)
This paper describes a unique resource at West Point, the Information Analysis and Research Laboratory, referred to as the IWAR range. The IWAR range is an isolated laboratory used by undergraduate students and faculty researchers. The IWAR is a production-system-like, heterogeneous environment. The IWAR has become a vital part of the Information Assurance(More)
The United States Army is engaged in an effort to use information systems to achieve tactical advantage over potential adversaries. Existing and future information systems place a significant load on the tactical network, resulting in a bandwidth management crisis, yet there is no prioritization, allocation, planning, or management tool available to(More)
Awareness of the need for secure systems has grown rapidly as computers have become increasingly pervasive in our society. Numerous computer security technologies have been proposed and implemented, but all of them fall short of providing the level of security most organizations and endusers expect. No current technology, whether used in isolation or used(More)
The United States Army is embracing the use of new information technologies to achieve tactical advantage over potential adversaries. Existing and future information systems place a significant load on the tactical data network, resulting in a bandwidth management crisis, yet there is no prioritization, allocation, planning, or management tool available to(More)
This paper examines the approaches to information technology (IT) education at three universities in Afghanistan. If the world truly is flat, the approaches to IT education at the National Military Academy of Afghanistan, American University in Kabul, and Kabul University would be similar to what you might find in the United States and other developed(More)
In this paper, we have been explored the brief review about the intrusion detection system. This review emphasizes about how to automatically and systematically build adaptable and extensible advanced intrusion detection system using data mining techniques and how to provide in-built prevention policies in the detection system so that it will reduce network(More)