


default search action
NCS 2021: Huntsville, AL, USA
- Kim-Kwang Raymond Choo

, Tommy H. Morris
, Gilbert L. Peterson
, Eric S. Imsand
:
National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021. Lecture Notes in Networks and Systems 310, Springer 2022, ISBN 978-3-030-84613-8 - Li-Chiou Chen, Andreea Cotoranu, Praviin Mandhare, Darren R. Hayes:

An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building. 3-12 - Steven Day, William "Kohler" Smallwood, Joshua Kuhn:

Simulating Industrial Control Systems Using Node-RED and Unreal Engine 4. 13-21 - Melissa Hannis

, Idongesit Mkpong-Ruffin, Drew Hamilton:
Student Educational Learning Experience Through Cooperative Research. 22-27 - Megan Stigall, Kim-Kwang Raymond Choo

:
Digital Forensics Education: Challenges and Future Opportunities. 28-46 - Blair Taylor, Siddharth Kaza, Melissa Dark:

Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research. 47-59 - Tania Williams

, Omar F. El-Gayar
:
Design of a Virtual Cybersecurity Escape Room. 60-73 - Bramwell Brizendine, Austin Babcock:

A Novel Method for the Automatic Generation of JOP Chain Exploits. 77-92 - Nickolas Carter, Peter Pommer, Duane T. Davis, Cynthia E. Irvine:

Increasing Log Availability in Unmanned Vehicle Systems. 93-109 - George T. Harter, Neil C. Rowe:

Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques. 110-123 - Wenhui Liang, Cui Zhang, Jun Dai

:
Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic. 124-140 - Christopher Nguyen, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis, Dipankar Dasgupta:

Social Engineering Attacks in Healthcare Systems: A Survey. 141-150 - Neil C. Rowe, Thuy D. Nguyen, Jeffery T. Dougherty, Matthew C. Bieker, Darry Pilkington:

Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots. 151-162 - Roland Varriale, Ryan Crawford, Michael Jaynes:

Risks of Electric Vehicle Supply Equipment Integration Within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications. 163-173

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














