​
Login / Signup
NCS
2017
2022
2017
2022
Keyphrases
Publications
volume 310, 2022
National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021
NCS
310 (2022)
2021
Christopher Nguyen
,
Walt Williams
,
Brandon Didlake
,
Donte Mitchell
,
James McGinnis
,
Dipankar Dasgupta
Social Engineering Attacks in Healthcare Systems: A Survey.
NCS
(2021)
Wenhui Liang
,
Cui Zhang
,
Jun Dai
Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic.
NCS
(2021)
Nickolas Carter
,
Peter Pommer
,
Duane T. Davis
,
Cynthia E. Irvine
Increasing Log Availability in Unmanned Vehicle Systems.
NCS
(2021)
Tania Williams
,
Omar F. El-Gayar
Design of a Virtual Cybersecurity Escape Room.
NCS
(2021)
Roland Varriale
,
Ryan Crawford
,
Michael Jaynes
Risks of Electric Vehicle Supply Equipment Integration Within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications.
NCS
(2021)
Steven Day
,
William "Kohler" Smallwood
,
Joshua Kuhn
Simulating Industrial Control Systems Using Node-RED and Unreal Engine 4.
NCS
(2021)
Megan Stigall
,
Kim-Kwang Raymond Choo
Digital Forensics Education: Challenges and Future Opportunities.
NCS
(2021)
Bramwell Brizendine
,
Austin Babcock
A Novel Method for the Automatic Generation of JOP Chain Exploits.
NCS
(2021)
George T. Harter
,
Neil C. Rowe
Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques.
NCS
(2021)
Neil C. Rowe
,
Thuy D. Nguyen
,
Jeffery T. Dougherty
,
Matthew C. Bieker
,
Darry Pilkington
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots.
NCS
(2021)
Melissa Hannis
,
Idongesit Mkpong-Ruffin
,
Drew Hamilton
Student Educational Learning Experience Through Cooperative Research.
NCS
(2021)
Li-Chiou Chen
,
Andreea Cotoranu
,
Praviin Mandhare
,
Darren R. Hayes
An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building.
NCS
(2021)
Blair Taylor
,
Siddharth Kaza
,
Melissa Dark
Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.
NCS
(2021)
volume 1271, 2021
National Cyber Summit (NCS) Research Track 2020, Huntsville, AL, USA, June 2-4, 2020.
NCS
1271 (2021)
2020
Yasser Karim
,
Ragib Hasan
Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer.
NCS
(2020)
Tapan Soni
,
Richard Baird
,
Andrea Lobo
,
Vahid Heydari
Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography.
NCS
(2020)
Michael T. Shrove
,
Emil Jovanov
Is There a Prophet Who Can Predict Software Vulnerabilities?
NCS
(2020)
Ragib Hasan
,
Yuliang Zheng
,
Jeffery T. Walker
Digital Forensics Education Modules for Judicial Officials.
NCS
(2020)
Jason Winningham
,
David Coe
,
Jeffrey H. Kulick
,
Aleksandar Milenkovic
,
Letha H. Etzkorn
A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses.
NCS
(2020)
Mohammad Shojaeshafiei
,
Letha H. Etzkorn
,
Michael Anderson
Network System's Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQM.
NCS
(2020)
Anton Dahbura
,
Joseph Carrigan
A Video-Based Cybersecurity Modular Lecture Series for Community College Students.
NCS
(2020)
Travis Blue
,
Hossain Shahriar
Distributed Denial of Service Attack Detection.
NCS
(2020)
Joshua A. Sipper
Information Warfare and Cyber Education: Issues and Recommendations.
NCS
(2020)
Zack Kirkendoll
,
Matthew Lueck
,
Nathan Hutchins
,
Loyd Hook
Automated Linux Secure Host Baseline for Real-Time Applications Requiring SCAP Compliance.
NCS
(2020)
James S. Okolica
,
Alan C. Lin
,
Gilbert L. Peterson
Gaming DevSecOps - A Serious Game Pilot Study.
NCS
(2020)
Howard B. Goodman
,
Pam Rowland
Deficiencies of Compliancy for Data and Storage - Isolating the CIA Triad Components to Identify Gaps to Security.
NCS
(2020)
A. R. Rao
,
Kavita Mishra
,
Nagasravani Recharla
Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded Systems.
NCS
(2020)
Chola Chhetri
,
Vivian Motti
Identifying Vulnerabilities in Security and Privacy of Smart Home Devices.
NCS
(2020)
Alan T. Sherman
,
Geoffrey L. Herman
,
Linda Oliva
,
Peter A. H. Peterson
,
Enis Golaszewski
,
Seth Poulsen
,
Travis Scheponik
,
Akshita Gorti
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity.
NCS
(2020)
William Goble
,
Elizabeth Braddy
,
Mike Burmester
,
Daniel Schwartz
,
Ryan Sloan
,
Demetra Drizis
,
Nitish Ahir
,
Melissa Ma
,
Matt Bays
,
Matt Chastain
Challenges of Securing and Defending Unmanned Aerial Vehicles.
NCS
(2020)
Chola Chhetri
TWOPD: A Novel Approach to Teaching an Introductory Cybersecurity Course.
NCS
(2020)
volume 1055, 2020
National Cyber Summit, NCS 2019, Research Track, Huntsville, AL, USA, 4-6 June, 2019
NCS
1055 (2020)
2019
Xin Wang
,
Wei Zhang
An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units.
NCS
(2019)
Dan J. Kim
,
Bradford Love
,
Sanghun Kim
A Comparison Study of Cybersecurity Workforce Frameworks and Future Directions.
NCS
(2019)
A. Ravishankar Rao
,
Daniel J. B. Clarke
Capacity Building for a Cybersecurity Workforce Through Hands-on Labs for Internet-of-Things Security.
NCS
(2019)
Subhrajit Majumder
,
Akshay Mathur
,
Ahmad Y. Javaid
A Study on Recent Applications of Blockchain Technology in Vehicular Adhoc Network (VANET).
NCS
(2019)
Eric S. Imsand
,
Brian Tucker
,
Joe Paxton
,
Sara Graves
A Survey of Cyber Security Practices in Small Businesses.
NCS
(2019)
Johanna Jacob
,
Michelle Peters
,
T. Andrew Yang
Interdisciplinary Cybersecurity: Rethinking the Approach and the Process.
NCS
(2019)
Mohammad Shojaeshafiei
,
Letha H. Etzkorn
,
Michael Anderson
Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM.
NCS
(2019)
Mehrnoosh Shakarami
,
Ravi S. Sandhu
Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems.
NCS
(2019)
Amanda Joyce
,
Steven Day
Improving the Efficiency of a Cyber Competition Through Data Analysis - A Guide to CyberForce Competition™ Red Team Recruitment and Structure.
NCS
(2019)
Travis Scheponik
,
Enis Golaszewski
,
Geoffrey L. Herman
,
Spencer Offenberger
,
Linda Oliva
,
Peter A. H. Peterson
,
Alan T. Sherman
Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments.
NCS
(2019)
Adam Alexander
,
Paul Graham
,
Eric Jackson
,
Bryant Johnson
,
Tania Williams
,
Jaehong Park
An Analysis of Cybersecurity Legislation and Policy Creation on the State Level.
NCS
(2019)
Aaron Werth
,
Thomas H. Morris
A Specification-Based Intrusion Prevention System for Malicious Payloads.
NCS
(2019)
John A. Bland
,
C. Daniel Colvett
,
Walter Alan Cantrell
,
Katia P. Mayfield
,
Mikel D. Petty
,
Tymaine S. Whitaker
Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs.
NCS
(2019)
Jatinder N. D. Gupta
,
Ezhil Kalaimannan
,
Seong-Moo Yoo
A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator.
NCS
(2019)
Victor Melnik
,
Jun Dai
,
Cui Zhang
,
Benjamin White
Enforcing Secure Coding Rules for the C Programming Language Using the Eclipse Development Environment.
NCS
(2019)
Rajendra V. Boppana
,
Rajasekhar Chaganti
,
Vasudha Vedula
Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques for Software-Defined Networks.
NCS
(2019)
Caroline John
,
Bhuvana Ramachandran
,
Ezhil Kalaimannan
Impact of Targeted Cyber Attacks on Electrical Power Systems.
NCS
(2019)