Abstract is missing.
- The human element in cyber security: a study on student motivation to actRebecca LeFebvre. 1-8 [doi]
- Professional association membership of computer and information security professionalsGeorge Corser. 9-15 [doi]
- A tale of two CTs: IP packets rejected by a firewallGeorge Corser. 16-20 [doi]
- Hands-on denial of service lab exercises using SlowLoris and RUDYEvan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, Richard Weiss. 21-29 [doi]
- Forming a student information assurance clubJeffrey A. Livermore. 30-32 [doi]
- IR, DR and BC with wireless mesh networksKirk Inman, Humayun Zafar. 33-39 [doi]
- A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs)Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu, Bao Tri-Tran. 40-45 [doi]
- Attacks and countermeasures in wireless cellular networksEralda Caushaj, Huirong Fu, Haissam Badih, Ishwar Sethi, Ye Zhu, Supeng Leng. 46-52 [doi]
- An approach for detecting malicious keyloggersAdam Howard, Yi Hu. 53-56 [doi]
- System evaluation lifecycle: chasing windmillsDavid Crowe, Wasim A. Al-Hamdani. 57-61 [doi]
- Lightening in a bottle: usable and secureDavid Crowe, Wasim A. Al-Hamdani. 62-68 [doi]
- Designing and implementing cloud-based digital forensics hands-on labsMichael Simmons, Hongmei Chi. 69-74 [doi]
- The creation of a minor in cyber security: the sequelFrank H. Katz. 75-81 [doi]