default search action
NCS 2021: Huntsville, AL, USA
- Kim-Kwang Raymond Choo, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021. Lecture Notes in Networks and Systems 310, Springer 2022, ISBN 978-3-030-84613-8 - Li-Chiou Chen, Andreea Cotoranu, Praviin Mandhare, Darren R. Hayes:
An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building. 3-12 - Steven Day, William "Kohler" Smallwood, Joshua Kuhn:
Simulating Industrial Control Systems Using Node-RED and Unreal Engine 4. 13-21 - Melissa Hannis, Idongesit Mkpong-Ruffin, Drew Hamilton:
Student Educational Learning Experience Through Cooperative Research. 22-27 - Megan Stigall, Kim-Kwang Raymond Choo:
Digital Forensics Education: Challenges and Future Opportunities. 28-46 - Blair Taylor, Siddharth Kaza, Melissa Dark:
Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research. 47-59 - Tania Williams, Omar F. El-Gayar:
Design of a Virtual Cybersecurity Escape Room. 60-73 - Bramwell Brizendine, Austin Babcock:
A Novel Method for the Automatic Generation of JOP Chain Exploits. 77-92 - Nickolas Carter, Peter Pommer, Duane T. Davis, Cynthia E. Irvine:
Increasing Log Availability in Unmanned Vehicle Systems. 93-109 - George T. Harter, Neil C. Rowe:
Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques. 110-123 - Wenhui Liang, Cui Zhang, Jun Dai:
Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic. 124-140 - Christopher Nguyen, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis, Dipankar Dasgupta:
Social Engineering Attacks in Healthcare Systems: A Survey. 141-150 - Neil C. Rowe, Thuy D. Nguyen, Jeffery T. Dougherty, Matthew C. Bieker, Darry Pilkington:
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots. 151-162 - Roland Varriale, Ryan Crawford, Michael Jaynes:
Risks of Electric Vehicle Supply Equipment Integration Within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications. 163-173
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.