4 | -- | 5 | Albert Y. Zomaya. A Novel Hierarchical Two-Tier Node-Deployment Strategy for Sustainable Wireless Sensor Networks |
9 | -- | 11 | Erich J. Neuhold. 50 & 25 Years Ago |
12 | -- | 13 | David Alan Grier. Learning to Live in an Insecure World |
14 | -- | 17 | Ann E. Kelley Sobel, Allen Parrish, Rajendra K. Raj. Curricular Foundations for Cybersecurity |
18 | -- | 28 | Matthew Hudnall. Educational and Workforce Cybersecurity Frameworks: Comparing, Contrasting, and Mapping |
29 | -- | 37 | Diana L. Burley, Alfred H. Lewis Jr.. Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice |
38 | -- | 47 | David S. Gibson, Vijay Anand, Josh Dehlinger, Charles Dierbach, Tracy Emmersen, Andrew Phillips. Accredited Undergraduate Cybersecurity Degrees: Four Approaches |
48 | -- | 57 | Tracy Emmersen, Joseph M. Hatfield, Jeff Kosseff, Steven R. Orr IV. The USNA's Interdisciplinary Approach to Cybersecurity Education |
58 | -- | 66 | Jean R. S. Blair, Andrew O. Hall, Edward Sobiesk. Educating Future Multidisciplinary Cybersecurity Teams |
67 | -- | 75 | Jessica Ivy, Sarah B. Lee, Dana Franz, Joseph Crumpton. Seeding Cybersecurity Workforce Pathways With Secondary Education |
76 | -- | 80 | Hal Berghel. Codes of Ethics in a Post-Truth World |
81 | -- | 86 | Robert N. Charette. Evolving From Know-How to Know-What |
87 | -- | 90 | Nir Kshetri, Jeffrey M. Voas. Trusting Pirated Software |