We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses

    Integration of relevant hands-on cybersecurity content into laboratories supporting our required operating systems course helps to provide all...
    Jason Winningham, David Coe, ... Letha Etzkorn in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  2. Challenges of Securing and Defending Unmanned Aerial Vehicles

    There are increasing concerns that foreign manufactured unmanned aerial systems may leak sensitive data to their manufacturers, particularly since...
    William Goble, Elizabeth Braddy, ... Matt Chastain in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  3. Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded Systems

    In the U.S., the Department of Defense and the National Security Agency are taking steps to build cybersecurity capacity through workforce training...
    A. R. Rao, Kavita Mishra, Nagasravani Recharla in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  4. Deficiencies of Compliancy for Data and Storage

    There are many reasons to implement data protection security strategies regardless of if the data is financial, personal or confidential, risks are a...
    Howard B. Goodman, Pam Rowland in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  5. Automated Linux Secure Host Baseline for Real-Time Applications Requiring SCAP Compliance

    With the emergence of Linux real-time applications and the ever-growing cyber security requirements being imposed on those systems in high security...
    Zack Kirkendoll, Matthew Lueck, ... Loyd Hook in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  6. Information Warfare and Cyber Education: Issues and Recommendations

    With the introduction of the Information Warfare (IW) paradigm across military service components, the institution of a new education focus is...
    Conference paper 2021
  7. A Video-Based Cybersecurity Modular Lecture Series for Community College Students

    The shortage of people who can fill open cybersecurity positions is a growing problem, both in the U.S.A. and globally. There is a clear need to grow...
    Anton Dahbura, Joseph Carrigan in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  8. Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography

    Steganography is the process of hiding data inside audio, video, and image sources using various encoding methods. This paper presents a novel...
    Tapan Soni, Richard Baird, ... Vahid Heydari in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  9. Is There a Prophet Who Can Predict Software Vulnerabilities?

    Shortcuts in software development generate technical debt and software vulnerabilities. We propose a framework that will allow stakeholders an...
    Michael T. Shrove, Emil Jovanov in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  10. Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity

    We reflect on our ongoing journey in the educational Cybersecurity Assessment Tools (CATS) Project to create two concept inventories for...
    Alan T. Sherman, Geoffrey L. Herman, ... Akshita Gorti in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  11. Identifying Vulnerabilities in Security and Privacy of Smart Home Devices

    Smart Home Devices (SHDs) offer convenience that comes at the cost of security and privacy. SHDs can be subject to attacks and they can be used to...
    Chola Chhetri, Vivian Motti in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  12. Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer

    In recent years, financial crimes and large scale heists involving the banking sector have significantly increased. Banks and Financial Institutions...
    Conference paper 2021
  13. Distributed Denial of Service Attack Detection

    Distributed Denial of Service (DDoS) attacks has been a persistent threat for network and applications. Successful attacks can lead to inaccessible...
    Travis Blue, Hossain Shahriar in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  14. Gaming DevSecOps - A Serious Game Pilot Study

    Serious games provide a method for teaching students in an engaging, non-threatening way. To be useful educational tools, these games need to be...
    James S. Okolica, Alan C. Lin, Gilbert L. Peterson in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  15. Digital Forensics Education Modules for Judicial Officials

    As our lives become more dependent on digital technology, cyber crime is increasing in our society. There is now an ever-increasing need to counter...
    Ragib Hasan, Yuliang Zheng, Jeffery T. Walker in National Cyber Summit (NCS) Research Track 2020
    Conference paper 2021
  16. Simulating Across the Cloud-to-Edge Continuum

    As growth and adoption of the Internet of Things continue to accelerate, cloud infrastructure and communication service providers (CSPs) need to...
    Minas Spanopoulos-Karalexidis, Christos K. Filelis Papadopoulos, ... Theo Lynn in Managing Distributed Cloud Applications and Infrastructure
    Chapter Open access 2020
  17. SM Observers

    Most of the design methods considered above were developed under the assumption that the state vector is available. In practice, however, only a part...
    Vadim Utkin, Alex Poznyak, ... Andrey Polyakov in Road Map for Sliding Mode Control Design
    Chapter 2020
  18. High-Order Sliding Mode Control

    The high-order sliding mode (HOSM) is discussed here as an alternative methodology to the conventional sliding mode control to design feedback...
    Vadim Utkin, Alex Poznyak, ... Andrey Polyakov in Road Map for Sliding Mode Control Design
    Chapter 2020
  19. Mathematical Methods

    This chapter presents the definition of sliding mode and discusses the conditions of the existence and the uniqueness of the solution of the arising...
    Vadim Utkin, Alex Poznyak, ... Andrey Polyakov in Road Map for Sliding Mode Control Design
    Chapter 2020
  20. Adaptive SMC

    In this chapter, the basic ideas of adaptive SMC are presented. They are intended to minimize an undesired chattering effect during motion in sliding...
    Vadim Utkin, Alex Poznyak, ... Andrey Polyakov in Road Map for Sliding Mode Control Design
    Chapter 2020
Did you find what you were looking for? Share feedback.