


default search action
NCS 2020: Huntsville, AL, USA
- Kim-Kwang Raymond Choo

, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2020, Huntsville, AL, USA, June 2-4, 2020. Advances in Intelligent Systems and Computing 1271, Springer 2021, ISBN 978-3-030-58702-4
Invited Paper
- Alan T. Sherman

, Geoffrey L. Herman
, Linda Oliva
, Peter A. H. Peterson
, Enis Golaszewski
, Seth Poulsen
, Travis Scheponik
, Akshita Gorti
:
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity. 3-34
Cyber Security Education
- Anton Dahbura, Joseph Carrigan:

A Video-Based Cybersecurity Modular Lecture Series for Community College Students. 37-45 - Ragib Hasan

, Yuliang Zheng
, Jeffery T. Walker:
Digital Forensics Education Modules for Judicial Officials. 46-60 - James S. Okolica, Alan C. Lin, Gilbert L. Peterson:

Gaming DevSecOps - A Serious Game Pilot Study. 61-77 - Jason Winningham, David Coe, Jeffrey H. Kulick, Aleksandar Milenkovic

, Letha H. Etzkorn:
A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses. 78-91 - Chola Chhetri

:
TWOPD: A Novel Approach to Teaching an Introductory Cybersecurity Course. 92-99 - Mohammad Shojaeshafiei

, Letha H. Etzkorn, Michael Anderson:
Network System's Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQM. 100-115
Cyber Security Technology
- William Goble, Elizabeth Braddy, Mike Burmester, Daniel Schwartz, Ryan Sloan, Demetra Drizis, Nitish Ahir, Melissa Ma, Matthew J. Bays

, Matt Chastain:
Challenges of Securing and Defending Unmanned Aerial Vehicles. 119-138 - Tapan Soni, Richard Baird, Andrea F. Lobo

, Vahid Heydari
:
Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography. 139-153 - Zack Kirkendoll, Matthew Lueck, Nathan F. Hutchins, Loyd R. Hook:

Automated Linux Secure Host Baseline for Real-Time Applications Requiring SCAP Compliance. 154-169 - Howard B. Goodman, Pam Rowland:

Deficiencies of Compliancy for Data and Storage - Isolating the CIA Triad Components to Identify Gaps to Security. 170-192 - Yasser Karim, Ragib Hasan

:
Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer. 193-210 - Chola Chhetri

, Vivian Motti
:
Identifying Vulnerabilities in Security and Privacy of Smart Home Devices. 211-231
Short Papers
- Joshua A. Sipper:

Information Warfare and Cyber Education: Issues and Recommendations. 235-237 - A. R. Rao, Kavita Mishra, Nagasravani Recharla:

Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded Systems. 238-239 - Travis Blue, Hossain Shahriar

:
Distributed Denial of Service Attack Detection. 240-241 - Michael T. Shrove

, Emil Jovanov
:
Is There a Prophet Who Can Predict Software Vulnerabilities? 242-243

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














