Search
Search Results
-
A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses
Integration of relevant hands-on cybersecurity content into laboratories supporting our required operating systems course helps to provide all... -
Challenges of Securing and Defending Unmanned Aerial Vehicles
There are increasing concerns that foreign manufactured unmanned aerial systems may leak sensitive data to their manufacturers, particularly since... -
Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded Systems
In the U.S., the Department of Defense and the National Security Agency are taking steps to build cybersecurity capacity through workforce training... -
Deficiencies of Compliancy for Data and Storage
There are many reasons to implement data protection security strategies regardless of if the data is financial, personal or confidential, risks are a... -
Automated Linux Secure Host Baseline for Real-Time Applications Requiring SCAP Compliance
With the emergence of Linux real-time applications and the ever-growing cyber security requirements being imposed on those systems in high security... -
Information Warfare and Cyber Education: Issues and Recommendations
With the introduction of the Information Warfare (IW) paradigm across military service components, the institution of a new education focus is... -
A Video-Based Cybersecurity Modular Lecture Series for Community College Students
The shortage of people who can fill open cybersecurity positions is a growing problem, both in the U.S.A. and globally. There is a clear need to grow... -
Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography
Steganography is the process of hiding data inside audio, video, and image sources using various encoding methods. This paper presents a novel... -
Is There a Prophet Who Can Predict Software Vulnerabilities?
Shortcuts in software development generate technical debt and software vulnerabilities. We propose a framework that will allow stakeholders an... -
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity
We reflect on our ongoing journey in the educational Cybersecurity Assessment Tools (CATS) Project to create two concept inventories for... -
Identifying Vulnerabilities in Security and Privacy of Smart Home Devices
Smart Home Devices (SHDs) offer convenience that comes at the cost of security and privacy. SHDs can be subject to attacks and they can be used to... -
Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer
In recent years, financial crimes and large scale heists involving the banking sector have significantly increased. Banks and Financial Institutions... -
Distributed Denial of Service Attack Detection
Distributed Denial of Service (DDoS) attacks has been a persistent threat for network and applications. Successful attacks can lead to inaccessible... -
Gaming DevSecOps - A Serious Game Pilot Study
Serious games provide a method for teaching students in an engaging, non-threatening way. To be useful educational tools, these games need to be... -
Digital Forensics Education Modules for Judicial Officials
As our lives become more dependent on digital technology, cyber crime is increasing in our society. There is now an ever-increasing need to counter... -
Simulating Across the Cloud-to-Edge Continuum
As growth and adoption of the Internet of Things continue to accelerate, cloud infrastructure and communication service providers (CSPs) need to... -
SM Observers
Most of the design methods considered above were developed under the assumption that the state vector is available. In practice, however, only a part... -
High-Order Sliding Mode Control
The high-order sliding mode (HOSM) is discussed here as an alternative methodology to the conventional sliding mode control to design feedback... -
Mathematical Methods
This chapter presents the definition of sliding mode and discusses the conditions of the existence and the uniqueness of the solution of the arising... -
Adaptive SMC
In this chapter, the basic ideas of adaptive SMC are presented. They are intended to minimize an undesired chattering effect during motion in sliding...