Abstract is missing.
- Towards Secure Password Protection in Portable ApplicationsHossain Shahriar, Atef Shalan, Khaled Tarmissi. 3-13 [doi]
- Capacity Building for a Cybersecurity Workforce Through Hands-on Labs for Internet-of-Things SecurityA. Ravishankar Rao, Daniel J. B. Clarke. 14-29 [doi]
- An Analysis of Cybersecurity Legislation and Policy Creation on the State LevelAdam Alexander, Paul Graham, Eric Jackson, Bryant Johnson, Tania Williams, Jaehong Park. 30-43 [doi]
- A Survey of Cyber Security Practices in Small BusinessesEric Imsand, Brian Tucker, Joe Paxton, Sara Graves. 44-50 [doi]
- Improving the Efficiency of a Cyber Competition Through Data Analysis - A Guide to CyberForce Competition™ Red Team Recruitment and StructureAmanda Joyce, Steven Day. 51-60 [doi]
- Interdisciplinary Cybersecurity: Rethinking the Approach and the ProcessJohanna Jacob, Michelle Peters, T. Andrew Yang. 61-74 [doi]
- Developing and Implementing a Cybersecurity Course for Middle SchoolYesem Kurt Peker, Hillary Fleenor. 75-84 [doi]
- A Comparison Study of Cybersecurity Workforce Frameworks and Future DirectionsDan J. Kim, Bradford Love, Sanghun Kim. 85-96 [doi]
- Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation ApproachAlan Roder, Kim-Kwang Raymond Choo. 99-115 [doi]
- Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection SystemsSueAnne Griffith, Thomas H. Morris. 116-125 [doi]
- An Efficient Profiling-Based Side-Channel Attack on Graphics Processing UnitsXin Wang, Wei Zhang. 126-139 [doi]
- Enforcing Secure Coding Rules for the C Programming Language Using the Eclipse Development EnvironmentVictor Melnik, Jun Dai, Cui Zhang, Benjamin White. 140-152 [doi]
- A Specification-Based Intrusion Prevention System for Malicious PayloadsAaron Werth, Thomas H. Morris. 153-168 [doi]
- Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques for Software-Defined NetworksRajendra V. Boppana, Rajasekhar Chaganti, Vasudha Vedula. 169-184 [doi]
- Investigating Crowdsourcing to Generate Distractors for Multiple-Choice AssessmentsTravis Scheponik, Enis Golaszewski, Geoffrey L. Herman, Spencer Offenberger, Linda Oliva, Peter A. H. Peterson, Alan T. Sherman. 185-201 [doi]
- A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single InvestigatorJatinder N. D. Gupta, Ezhil Kalaimannan, Seong-Moo Yoo. 202-219 [doi]
- A Cloud Based Entitlement Granting EngineDavid Krovich, Austin Cottrill, Daniel J. Mancini. 220-231 [doi]
- Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and CostsJohn A. Bland, C. Daniel Colvett, Walter Alan Cantrell, Katia P. Mayfield, Mikel D. Petty, Tymaine S. Whitaker. 232-247 [doi]
- Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization SystemsMehrnoosh Shakarami, Ravi Sandhu. 248-263 [doi]
- Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQMMohammad Shojaeshafiei, Letha Etzkorn, Michael Anderson. 264-277 [doi]
- Impact of Targeted Cyber Attacks on Electrical Power SystemsCaroline John, Bhuvana Ramachandran, Ezhil Kalaimannan. 278-292 [doi]
- A Study on Recent Applications of Blockchain Technology in Vehicular Adhoc Network (VANET)Subhrajit Majumder, Akshay Mathur, Ahmad Y. Javaid. 293-308 [doi]