. Buckner, "A non-traditonal approach to an assembly language course." Journal of Computing Sciences in Colleges 22.1 (2006): 179-186.[5]Imamura, Kosuke. "Assembly language is more than a teaching tool." Journal of Computing Sciences in Colleges 20, no. 2 (2004): 49-54.[6]Little, R. Rainey, and Mark K. Smotherman. "Assembly language courses in transition." ACM SIGCSE Bulletin 20, no. 1 (1988): 95-99.[7]Chmiel, Ryan, and Michael C. Loui. "Debugging: from novice to expert." ACM SIGCSE Bulletin 36, no. 1 (2004): 17-21.[8]Adolph, Karen E., and Kari S. Kretch. "Gibson’s theory of perceptual learning." International encyclopedia of the social and behavioral sciences 10 (2015): 127-134.[9]Fincher, Sally, Johan Jeuring, Craig S. Miller, Peter
overflow vulnerabilities, using freely available resources.References [1] Bassett, G., Hylender, D., Langlois, P., Pinto, A., & Widup, S., “Data Breach Investigations Report” Available:https://www.verizon.com/business/resources/reports/dbir, 2022.[2] “NIST National Vulnerability Database” Available: https://nvd.nist.gov/vuln/data-feeds, 2023.[3] MITRE Common Vulnerabilities and Exposures. Available:https://cve.mitre.org/cve/data_feeds.html, 2023.[4] “Tenable’s 2021 Threat Landscape Retrospective” Available:https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective, 2022.[5] Gueye, A., & Mell, P. “A Historical and Statistical Study of the SoftwareVulnerability Landscape”, arXiv preprint arXiv:2102.01722, 2021
. In Section 5, we providebrief descriptions of the concepts behind four (4) newly created and tested WPA3 lab exercises.Finally, Section 6 engages in a discussion, encompassing our students’ observations, and sugges-tions for qualitative assessment of the lab instructions, the concepts they are based on, along withour conclusions and potential future steps.2 Our ProjectIn this section, we outline the project’s opportunity, goal, objectives, and the proposed solution.The overarching objective of this endeavor is to seamlessly integrate WPA3’s wireless personaland enterprise security mode, as defined by [1], into our existing Information Technology (IT)undergraduate curriculum. Specifically tailored for juniors and seniors majoring in IT, the
.[26] M. C. Jadud, “An exploration of novice compilation behaviour in BlueJ,” Comput. Sci. Educ., vol. 15:1, pp. 25–40, 2005, doi: 10.1080/08993400500056530.[27] J. M. Allen, F. Vahid, A. Edgcomb, K. Downey, and K. Miller, “An Analysis of Using Many Small Programs in CS1,” in Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019, pp. 585–591. doi: 10.1145/3287324.3287466.[28] “Stepik.” https://stepik.org/ (accessed Feb. 28, 2023).[29] S. H. Edwards and K. P. Murali, “CodeWorkout: Short Programming Exercises with Built-in Data Collection,” in Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017, pp. 188–193. doi: 10.1145
preparation and professional development. Her 20+ publications include articles that appear in journals such as International Journal of Science and Mathematics Education, Journal of Social Studies Research, School Science and Mathematics, and Mathematics Teacher. She served as the Program Chair of the Special Interest Group (SIG) Democratic Citizenship in Education of the American Educational Research Association (AERA) from 2016 to 2018. She has taught high school mathematics and holds a clear renewable teaching certificate in mathematics in the state of Georgia. She currently serves as a Co-Principal Investigator (Co-PI) of a National Science Foundation (NSF) S-STEM grant. ©American Society