Choo / Imsand / Morris | National Cyber Summit (NCS) Research Track 2021 | Buch | 978-3-030-84613-8 | www.sack.de

Buch, Englisch, Band 310, 175 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 295 g

Reihe: Lecture Notes in Networks and Systems

Choo / Imsand / Morris

National Cyber Summit (NCS) Research Track 2021


1. Auflage 2022
ISBN: 978-3-030-84613-8
Verlag: Springer International Publishing

Buch, Englisch, Band 310, 175 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 295 g

Reihe: Lecture Notes in Networks and Systems

ISBN: 978-3-030-84613-8
Verlag: Springer International Publishing


This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators and practitioners, as well as students seeking to learn about cyber security.

Choo / Imsand / Morris National Cyber Summit (NCS) Research Track 2021 jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Part I – Cyber Security Education

An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building

Li-Chiou Chen, Andreea Cotoranu, Praviin Mandhare and Darren Hayes

Simulating Industrial Control Systems using Node-RED and Unreal Engine 4

Steven Day, William Smallwood and Joshua Kuhn

Student Educational Learning Experience Through Cooperative Research
Melissa Hannis, Idongesit Mkpong-Ruffin and Drew Hamilton

Digital Forensics Education: Challenges and Future Opportunities
Megan Stigall and Kim-Kwang Raymond Choo

Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research
Blair Taylor, Sidd Kaza and Melissa Dark

Design of a Virtual Cybersecurity Escape Room
Tania Williams and Omar El-Gayar

Part II – Cyber Security Technology

A Novel Method for the Automated Generation for JOP Chain Exploits
Bramwell Brizendine, Austin Babcock and Josh Stroschien

Increasing Log Availability in Unmanned Vehicle Systems
Nicholas Carter, Peter Pommer, Duane Davis and Cynthia Irvine

Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques
George Harter and Neil Rowe

Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic
Wenhui Liang, Cui Zhang and Jun Dai

Social Engineering Attacks in Healthcare Systems: A Survey
Christopher Nguyen, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis and Dipankar Dasgupta

Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots
Neil Rowe, Thuy Nguyen, Jeffrey Dougherty, Matthew Bieker and Darry Pilkington

Risks of Electric Vehicle Supply Equipment Integration within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications
Roland Varriale, Michael Jaynes and Ryan Crawford



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.