Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,730

Temple University Electronic Theses & Dissertations

https://digital.library.temple.edu/digital/collection/p245801coll10/custom/theses-dissertations_9112019.en_EN

All Temple University dissertations submitted Fall 2008 and thereafter are available electronically in full-text through this collection, as are all masters theses submitted in May 2010 and thereafter. A few theses and dissertations submitted prior to 1980 are available here as digital copies of the print original. All theses and dissertations are protected by copyright; they may be used for ...

Text Books – Dennis Silage, PhD - Sites

https://sites.temple.edu/silage/text-books/

Digital Communication Systems Using SystemVue Da Vinci Engineering Press, Thomson Delmar Publishing 2006 SystemVue models of baseband and bandpass modulation and demodulation systems, time, frequency and code division multiplexing, synchronization and equalization, channel models, frequency hopping and discrete sequence spread spectrum, orthogonal frequency division multiplexing and baseband ...

Social Engineering Competition - Sites

https://sites.temple.edu/socialengineering/

What is the Summer Social Engineering Competition (SEC) all about? The SEC allows students to compete in a purely social engineering experience that is grounded in the social sciences. The competition offers a timely and unique platform for students to learn about social engineering in a hands-on, engaging, and ethical manner. The competition has a different theme each year to demonstrate the ...

scholarshare.temple.edu

https://scholarshare.temple.edu/server/api/core/bitstreams/c07e6ddf-cfa5-4054-9707-1d907529edd5/content

scholarshare.temple.edu

Temple University, Center for Networked Computing

http://www.cnc.temple.edu/

The Center for Networked Computing (CNC), a university research center focused on network technology and its applications, was founded in 2010. Its missions are to advance the development of network technology and its applications by combining resource of government, industry, and academia and to train students who will be ready to join industry and academia. CNC is engaged in the following ...

Undergraduate | Temple University Bulletin

https://bulletin.temple.edu/undergraduate/

A searchable database of more than 4,000 undergraduate courses; Overviews of degree programs and requirements for more than 150 undergraduate majors, as well as for minors, concentrations and certificates; Information on study abroad and research opportunities; Academic policies and procedures; and, A directory of student support services.

Online Offerings - Temple University

https://www.temple.edu/online/online-offerings

Graduate Programs Our fully online accredited graduate programs are both designed and taught by our outstanding Temple University faculty. Our engaging learning-centered courses will professionally equip a diverse sets of globally located students aiming to become leaders in his or her respective fields. Graduate programs are delivered through asynchronous, synchronous, and hybrid modes that ...

Information Science and Technology BS - Temple University

https://bulletin.temple.edu/undergraduate/science-technology/information-science-technology-bs/

Overview Science and technology are the foundations of our future. The Department of Computer and Information Sciences (CIS) is focused on the understanding of fundamental scientific principles and the application of these principles to solving complex problems, using computing technology.

Department of Computer & Information Sciences | College of Science and ...

https://hci.temple.edu/

Research Learn about areas of research conducted by faculty and students.

Social engineering – CARE Lab: Cybersecurity in Application ... - Sites

https://sites.temple.edu/care/social-engineering/

Social engineering (SE) is defined as any act that uses persuasion strategies to influence individuals to take an action that may or may not be in their best interests. Cyberadversaries are increasingly using SE in their attacks to develop trust relationships with potential targets and then deceive them into revealing sensitive information (passwords), obtain unauthorized access (to restricted ...