Abstract is missing.
- An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE FrameworkKevin Kim, Justin Smith, T. Andrew Yang, Dan J. Kim. 1-7 [doi]
- Playbook Oriented Cyber ResponseAndy Applebaum, Shawn Johnson, Michael Limiero, Michael Smith. 8-15 [doi]
- Allocating Security Analysts to Cyber Alerts Using Markov GamesNoah Dunstatter, Mina Guirguis, Alireza Tahsini. 16-23 [doi]
- Online Cybersecurity Awareness Modules for College and High School StudentsYesem Peker, Lydia Ray, Stephanie da Silva. 24-33 [doi]
- Educational Competitions to Boost the Cyber Workforce-DevelopmentAmanda Joyce, Steven Day, Nathaniel Evans. 34-37 [doi]
- An OAuth-Based Authorization Framework for Access Control in Remote Collaboration SystemsSrikanth Jonnada, Ram Dantu, Pradhumna L. Shrestha, Ishan Ranasinghe, Logan Widick. 38-44 [doi]
- Design and Development of Smart TV ProtectorDonald Privitera, Hossain Shahriar. 45-52 [doi]
- Moving Target Defense for Avionic SystemsVahid Heydari. 53-57 [doi]
- Impact of Perceived Risk, Perceived Controllability, and Security Self-Efficacy on Secure Intention from Social Comparison Theory PerspectiveDan J. Kim, Brandon Phillps, Young U. Ryu. 58-63 [doi]
- Performance Analysis of Elliptic Curves for Real-Time Video EncryptionNilanjan Sen, Ram Dantu, Jagannadh Vempati, Mark A. Thompson. 64-71 [doi]
- An Optimized Running Window Entropy AlgorithmKeith J. Jones, Yong Wang. 72-77 [doi]