default search action
NCS 2019: Huntsville, AL, USA
- Kim-Kwang Raymond Choo, Thomas H. Morris, Gilbert L. Peterson:
National Cyber Summit, NCS 2019, Research Track, Huntsville, AL, USA, 4-6 June, 2019. Advances in Intelligent Systems and Computing 1055, Springer 2020, ISBN 978-3-030-31238-1
Cyber Security Education
- Hossain Shahriar, Atef Shalan, Khaled Tarmissi:
Towards Secure Password Protection in Portable Applications. 3-13 - A. Ravishankar Rao, Daniel J. B. Clarke:
Capacity Building for a Cybersecurity Workforce Through Hands-on Labs for Internet-of-Things Security. 14-29 - Adam Alexander, Paul Graham, Eric Jackson, Bryant Johnson, Tania Williams, Jaehong Park:
An Analysis of Cybersecurity Legislation and Policy Creation on the State Level. 30-43 - Eric S. Imsand, Brian Tucker, Joe Paxton, Sara Graves:
A Survey of Cyber Security Practices in Small Businesses. 44-50 - Amanda Joyce, Steven Day:
Improving the Efficiency of a Cyber Competition Through Data Analysis - A Guide to CyberForce Competition™ Red Team Recruitment and Structure. 51-60 - Johanna Jacob, Michelle Peters, T. Andrew Yang:
Interdisciplinary Cybersecurity: Rethinking the Approach and the Process. 61-74 - Yesem Kurt Peker, Hillary Fleenor:
Developing and Implementing a Cybersecurity Course for Middle School. 75-84 - Dan J. Kim, Bradford Love, Sanghun Kim:
A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions. 85-96
Cyber Security Technology
- Alan Roder, Kim-Kwang Raymond Choo:
Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach. 99-115 - SueAnne Griffith, Thomas H. Morris:
Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems. 116-125 - Xin Wang, Wei Zhang:
An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units. 126-139 - Victor Melnik, Jun Dai, Cui Zhang, Benjamin White:
Enforcing Secure Coding Rules for the C Programming Language Using the Eclipse Development Environment. 140-152 - Aaron Werth, Thomas H. Morris:
A Specification-Based Intrusion Prevention System for Malicious Payloads. 153-168 - Rajendra V. Boppana, Rajasekhar Chaganti, Vasudha Vedula:
Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques for Software-Defined Networks. 169-184 - Travis Scheponik, Enis Golaszewski, Geoffrey L. Herman, Spencer Offenberger, Linda Oliva, Peter A. H. Peterson, Alan T. Sherman:
Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments. 185-201 - Jatinder N. D. Gupta, Ezhil Kalaimannan, Seong-Moo Yoo:
A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator. 202-219 - David Krovich, Austin Cottrill, Daniel J. Mancini:
A Cloud Based Entitlement Granting Engine. 220-231 - John A. Bland, Christopher Daniel Colvett, Walter Alan Cantrell, Katia P. Mayfield, Mikel D. Petty, Tymaine S. Whitaker:
Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs. 232-247 - Mehrnoosh Shakarami, Ravi S. Sandhu:
Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems. 248-263 - Mohammad Shojaeshafiei, Letha H. Etzkorn, Michael Anderson:
Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM. 264-277 - Caroline John, Bhuvana Ramachandran, Ezhil Kalaimannan:
Impact of Targeted Cyber Attacks on Electrical Power Systems. 278-292 - Subhrajit Majumder, Akshay Mathur, Ahmad Y. Javaid:
A Study on Recent Applications of Blockchain Technology in Vehicular Adhoc Network (VANET). 293-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.