


default search action
NCS 2020: Huntsville, AL, USA
- Kim-Kwang Raymond Choo
, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2020, Huntsville, AL, USA, June 2-4, 2020. Advances in Intelligent Systems and Computing 1271, Springer 2021, ISBN 978-3-030-58702-4
Invited Paper
- Alan T. Sherman
, Geoffrey L. Herman
, Linda Oliva
, Peter A. H. Peterson
, Enis Golaszewski
, Seth Poulsen
, Travis Scheponik
, Akshita Gorti
:
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity. 3-34
Cyber Security Education
- Anton Dahbura, Joseph Carrigan:
A Video-Based Cybersecurity Modular Lecture Series for Community College Students. 37-45 - Ragib Hasan
, Yuliang Zheng
, Jeffery T. Walker:
Digital Forensics Education Modules for Judicial Officials. 46-60 - James S. Okolica, Alan C. Lin, Gilbert L. Peterson:
Gaming DevSecOps - A Serious Game Pilot Study. 61-77 - Jason Winningham, David Coe, Jeffrey H. Kulick, Aleksandar Milenkovic
, Letha H. Etzkorn:
A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses. 78-91 - Chola Chhetri
:
TWOPD: A Novel Approach to Teaching an Introductory Cybersecurity Course. 92-99 - Mohammad Shojaeshafiei
, Letha H. Etzkorn, Michael Anderson:
Network System's Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQM. 100-115
Cyber Security Technology
- William Goble, Elizabeth Braddy, Mike Burmester, Daniel Schwartz, Ryan Sloan, Demetra Drizis, Nitish Ahir, Melissa Ma, Matthew J. Bays
, Matt Chastain:
Challenges of Securing and Defending Unmanned Aerial Vehicles. 119-138 - Tapan Soni, Richard Baird, Andrea F. Lobo
, Vahid Heydari
:
Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography. 139-153 - Zack Kirkendoll, Matthew Lueck, Nathan F. Hutchins, Loyd R. Hook:
Automated Linux Secure Host Baseline for Real-Time Applications Requiring SCAP Compliance. 154-169 - Howard B. Goodman, Pam Rowland:
Deficiencies of Compliancy for Data and Storage - Isolating the CIA Triad Components to Identify Gaps to Security. 170-192 - Yasser Karim, Ragib Hasan
:
Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer. 193-210 - Chola Chhetri
, Vivian Motti
:
Identifying Vulnerabilities in Security and Privacy of Smart Home Devices. 211-231
Short Papers
- Joshua A. Sipper:
Information Warfare and Cyber Education: Issues and Recommendations. 235-237 - A. R. Rao, Kavita Mishra, Nagasravani Recharla:
Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded Systems. 238-239 - Travis Blue, Hossain Shahriar
:
Distributed Denial of Service Attack Detection. 240-241 - Michael T. Shrove
, Emil Jovanov
:
Is There a Prophet Who Can Predict Software Vulnerabilities? 242-243

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.