Abstract is missing.
- Experiences and Lessons Learned Creating and Validating Concept Inventories for CybersecurityAlan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, Akshita Gorti. 3-34 [doi]
- A Video-Based Cybersecurity Modular Lecture Series for Community College StudentsAnton Dahbura, Joseph Carrigan. 37-45 [doi]
- Digital Forensics Education Modules for Judicial OfficialsRagib Hasan, Yuliang Zheng, Jeffery T. Walker. 46-60 [doi]
- Gaming DevSecOps - A Serious Game Pilot StudyJames S. Okolica, Alan C. Lin, Gilbert L. Peterson. 61-77 [doi]
- A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems CoursesJason Winningham, David Coe, Jeffrey H. Kulick, Aleksandar Milenkovic, Letha Etzkorn. 78-91 [doi]
- TWOPD: A Novel Approach to Teaching an Introductory Cybersecurity CourseChola Chhetri. 92-99 [doi]
- Network System's Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQMMohammad Shojaeshafiei, Letha Etzkorn, Michael Anderson. 100-115 [doi]
- Challenges of Securing and Defending Unmanned Aerial VehiclesWilliam Goble, Elizabeth Braddy, Mike Burmester, Daniel Schwartz, Ryan Sloan, Demetra Drizis, Nitish Ahir, Melissa Ma, Matt Bays, Matt Chastain. 119-138 [doi]
- Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image SteganographyTapan Soni, Richard Baird, Andrea Lobo, Vahid Heydari. 139-153 [doi]
- Automated Linux Secure Host Baseline for Real-Time Applications Requiring SCAP ComplianceZack Kirkendoll, Matthew Lueck, Nathan Hutchins, Loyd Hook. 154-169 [doi]
- Deficiencies of Compliancy for Data and Storage - Isolating the CIA Triad Components to Identify Gaps to SecurityHoward B. Goodman, Pam Rowland. 170-192 [doi]
- Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds TransferYasser Karim, Ragib Hasan. 193-210 [doi]
- Identifying Vulnerabilities in Security and Privacy of Smart Home DevicesChola Chhetri, Vivian Motti. 211-231 [doi]
- Information Warfare and Cyber Education: Issues and RecommendationsJoshua A. Sipper. 235-237 [doi]
- Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded SystemsA. R. Rao, Kavita Mishra, Nagasravani Recharla. 238-239 [doi]
- Distributed Denial of Service Attack DetectionTravis Blue, Hossain Shahriar. 240-241 [doi]
- Is There a Prophet Who Can Predict Software Vulnerabilities?Michael T. Shrove, Emil Jovanov. 242-243 [doi]