Journal: IEEE Computer

Volume 52, Issue 3

4 -- 5Albert Y. Zomaya. A Novel Hierarchical Two-Tier Node-Deployment Strategy for Sustainable Wireless Sensor Networks
9 -- 11Erich J. Neuhold. 50 & 25 Years Ago
12 -- 13David Alan Grier. Learning to Live in an Insecure World
14 -- 17Ann E. Kelley Sobel, Allen Parrish, Rajendra K. Raj. Curricular Foundations for Cybersecurity
18 -- 28Matthew Hudnall. Educational and Workforce Cybersecurity Frameworks: Comparing, Contrasting, and Mapping
29 -- 37Diana L. Burley, Alfred H. Lewis Jr.. Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice
38 -- 47David S. Gibson, Vijay Anand, Josh Dehlinger, Charles Dierbach, Tracy Emmersen, Andrew Phillips. Accredited Undergraduate Cybersecurity Degrees: Four Approaches
48 -- 57Tracy Emmersen, Joseph M. Hatfield, Jeff Kosseff, Steven R. Orr IV. The USNA's Interdisciplinary Approach to Cybersecurity Education
58 -- 66Jean R. S. Blair, Andrew O. Hall, Edward Sobiesk. Educating Future Multidisciplinary Cybersecurity Teams
67 -- 75Jessica Ivy, Sarah B. Lee, Dana Franz, Joseph Crumpton. Seeding Cybersecurity Workforce Pathways With Secondary Education
76 -- 80Hal Berghel. Codes of Ethics in a Post-Truth World
81 -- 86Robert N. Charette. Evolving From Know-How to Know-What
87 -- 90Nir Kshetri, Jeffrey M. Voas. Trusting Pirated Software