Part of the Information Security Commons

Works in Information Security

2023

IoT Health Devices: Exploring Security Risks in the Connected Landscape, Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer
School of Cybersecurity Faculty Publications

PDF

What Effects Do Large Language Models Have on Cybersecurity, Josiah Marshall
Cybersecurity Undergraduate Research Showcase

PDF

A Targeted Study on the Match between Cybersecurity Higher Education Offerings and Workforce Needs, Diane Murphy, Nektaria Tryfona, Andrew M. Marshall
Virginia Journal of Science

PDF

Leveraging Artificial Intelligence and Machine Learning for Enhanced Cybersecurity: A Proposal to Defeat Malware, Emmanuel Boateng
Cybersecurity Undergraduate Research Showcase

PDF

Cyber Security in Cyber Space, James D. Lee Jr.
Cybersecurity Undergraduate Research Showcase

PDF

The Linkage Between the Climate Change and the Cybercrimes, Min Kim
Cybersecurity Undergraduate Research Showcase

PDF

Some Legal and Practical Challenges in the Investigation of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase

PDF

Unveiling the Dark Web and the Impact of REvil's Cyberattacks, Tanya Sasnouskaya
Cybersecurity Undergraduate Research Showcase

PDF

Cybersecurity Workforce Development in Nigeria: Transforming the Cybercrime Gangs into Cybersecurity Specialists, Olohi Favor Anteyi
Cybersecurity Undergraduate Research Showcase

PDF

Role of AI in Threat Detection and Zero-day Attacks, Kelly Morgan
Cybersecurity Undergraduate Research Showcase

PDF

Assessing the Frequency and Severity of Malware Attacks: An Exploratory Analysis of the Advisen Cyber Loss Dataset, Ahmed M. Abdelmagid, Farshid Javadnejad, C. Ariel Pinto, Michael K. McShane, Rafael Diaz, Elijah Gartell
Modeling, Simulation and Visualization Student Capstone Conference

PDF

Visual Art in the Age of AI, Roshnica Gurung
Cybersecurity Undergraduate Research Showcase

PDF

The Rise and Risks of Internet of Things, Diamond E. Hicks
Cybersecurity Undergraduate Research Showcase

PDF

S-400s, Disinformation, and Anti-American Sentiment in Turkey, Russell "Alex" Korb, Saltuk Karahan, Gowri Prathap, Ekrem Kaya, Luke Palmieri, Hamdi Kavak, Richard L. Wilson (Ed.), Major Brendan Curran (Ed.)
Political Science & Geography Faculty Publications

PDF

Unmasking Deception in VANETs: A Decentralized Approach to Verifying Truth in Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu
College of Sciences Posters

PDF

Security of Internet of Things (IoT) Using Federated Learning and Deep Learning — Recent Advancements, Issues and Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Electrical & Computer Engineering Faculty Publications

PDF

Light Auditor: Power Measurement Can Tell Private Data Leakage Through IoT Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, ChunSheng Xin, Gang Zhou
Electrical & Computer Engineering Faculty Publications

PDF

Digital Transformation, Applications, and Vulnerabilities in Maritime and Shipbuilding Ecosystems, Rafael Diaz, Katherine Smith
VMASC Publications

PDF

Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty
VMASC Publications

PDF

2022

Towards Privacy and Security Concerns of Adversarial Examples in Deep Hashing Image Retrieval, Yanru Xiao
Computer Science Theses & Dissertations

PDF

A Brief Review of DNS, Root Servers, Vulnerabilities and Decentralization, Mallory Runyan
Cybersecurity Undergraduate Research Showcase

PDF

Ethical Concerns in Self-Driving Cars, Victoria Shand
Cybersecurity Undergraduate Research Showcase

PDF

Investigating Privacy Policies using PolicyLint Tool, Tricia Camaya
Cybersecurity Undergraduate Research Showcase

PDF

Federated Learning and Applications in Cybersecurity, Ani Sreekumar
Cybersecurity Undergraduate Research Showcase

PDF

Is Cybersecurity Training Practical or Not?, Bhawnish Sharma
Cybersecurity Undergraduate Research Showcase

PDF

Applications of Blockchain in Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Information Technology & Decision Sciences Faculty Publications

PDF

The Importance of Social Engineering, Jalaya Allen
Cybersecurity Undergraduate Research Showcase

PDF

The Impact of Ethical Hacking within Small Businesses, Nygia Tribbey
Cybersecurity Undergraduate Research Showcase

PDF

Cyber Deception for Critical Infrastructure Resiliency, Md Ali Reza Al Amin
Computational Modeling & Simulation Engineering Theses & Dissertations

PDF

Predictors of Email Response: Determinants of the Intention of not Following Security Recommendations, Miguel Angel Toro-Jarrin
Engineering Management & Systems Engineering Theses & Dissertations

PDF

How Online Platforms are Used by Child Predators and What Are the Effective Preventive Measures?, Kayla MacPherson
Cybersecurity Undergraduate Research Showcase

PDF

Application of U.S. Sanction Laws and Ransomware Payments, Trinity Woodbury
Cybersecurity Undergraduate Research Showcase

PDF

COVA CCI Undergrad Cyber Research, Nana Jeffrey
Cybersecurity Undergraduate Research Showcase

PDF

Medical Devices and Cybersecurity, Hilary Finch
School of Cybersecurity Posters

PDF

DeapSECURE Computational Training for Cybersecurity: Third-Year Improvements and Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu
Modeling, Simulation and Visualization Student Capstone Conference

PDF

Deep Learning: The Many Approaches of Intrusion Detection System Can Be Implemented and Improved Upon, Trinity Taylor
Cybersecurity Undergraduate Research Showcase

PDF

Camouflaged Poisoning Attack on Graph Neural Networks, Chao Jiang, Yi He, Richard Chapman, Hongyi Wu
Computer Science Faculty Publications

PDF

Post-Quantum Secure Identity-Based Encryption Scheme Using Random Integer Lattices for IoT-Enabled AI Applications, Dharminder Dharminder, Ashok Kumar Das, Sourav Saha, Basudeb Bera, Athanasios V. Vasilakos
VMASC Publications

PDF

ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J.P.C. Rodrigues
VMASC Publications

PDF

The Effects of Antecedents and Mediating Factors on Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
Information Technology & Decision Sciences Faculty Publications

PDF

Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Ozgur Guler
Engineering Technology Faculty Publications

PDF

Toward a Student-Ready Cybersecurity Program: Findings from a Survey of STEM-Students, Lora Pitman, Brian K. Payne, Tancy Vandecar-Burdin, Leonora Thorbjornsen
University Administration Publications

BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu
Engineering Technology Faculty Publications

PDF

Attitudes About Cybersecurity Articulation Agreements and Transfer Students: A Statewide Survey of Faculty Members and Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova
Sociology & Criminal Justice Faculty Publications

PDF

A Channel State Information Based Virtual MAC Spoofing Detector, Peng Jiang, Hongyi Wu, Chunsheng Xin
Electrical & Computer Engineering Faculty Publications

PDF

"MystifY": A Proactive Moving-Target Defense for a Resilient SDN Controller in Software Defined CPS, Mohamed Azab, Mohamed Samir, Effat Samir
Electrical & Computer Engineering Faculty Publications

PDF

Ready Raider One: Exploring the Misuse of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
Computer Science Faculty Publications

PDF

Formal Modeling and Verification of a Blockchain-Based Crowdsourcing Consensus Protocol, Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat
VMASC Publications

PDF

The Future of Blockchain, Elijah N. Gartrell
Cybersecurity Undergraduate Research Showcase

PDF

Cybersecurity & Correctional Institutions, Kelly Himelwright
Cybersecurity Undergraduate Research Showcase

PDF

Random Password Generation, Kirk Smith
Cybersecurity Undergraduate Research Showcase

PDF

Corporate Cybersecurity in the Context of M&A Transactions, Cameron Beck
Cybersecurity Undergraduate Research Showcase

PDF

Security Issues with Network Connected SCADA Systems, Chad Holm
Cybersecurity Undergraduate Research Showcase

PDF

Examining Trends and Experiences of the Last Four Years of Socially Engineered Ransomware Attacks, William Seymour
Cybersecurity Undergraduate Research Showcase

PDF

Exploratory Analysis of Password and Login Security Methods, Sofia Huang
Cybersecurity Undergraduate Research Showcase

PDF

Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions, Mohammad Wazid, Ashok Kumar Das, Noor Mohd, Youngho Park
VMASC Publications

PDF

RansomBuster IoT: A Intrusion Detection and Dataset Creation Tool for Ransomware Attacks within IoT Networks, Jackson M. Walker
Cybersecurity Undergraduate Research Showcase

PDF

Understanding the Effectivity and Increased Reliance of Credit Risk Machine Learning Models in Banking, Grishma Baruah
Cybersecurity Undergraduate Research Showcase

PDF

Deepfakes: AI Technology of the Future, Hosanna Root
Cybersecurity Undergraduate Research Showcase

PDF

Digital Forensic Investigation, Dejuan Green
Cybersecurity Undergraduate Research Showcase

PDF

A Review of Distributed Identity Technology in IoT Devices, Myles Perry
Cybersecurity Undergraduate Research Showcase

PDF

Mitigation of Algorithmic Bias to Improve AI Fairness, Kathy Wang
Cybersecurity Undergraduate Research Showcase

PDF

Cyber Threat on the High Seas. A Growing Threat to Infrastructure, James Cummins
Cybersecurity Undergraduate Research Showcase

PDF

Cybersecurity in Fintech Companies, Efstratios Zouros
Cybersecurity Undergraduate Research Showcase

PDF

Modeling IoT Solutions: A Lack of IoT Device Security, and User Education, Benjamin Newlin
Cybersecurity Undergraduate Research Showcase

PDF

Cyber Whistleblowers: The Black Sheep of Whistleblowing?, Andrew Wisniewski Jr.
Cybersecurity Undergraduate Research Showcase

PDF

DeepPOSE: Detecting GPS Spoofing Attack Via Deep Recurrent Neural Network, Peng Jiang, Hongyi Wu, Chunsheng Xin
Electrical & Computer Engineering Faculty Publications

PDF

CIVIIC: Cybercrime in Virginia: Impacts on Industry and Citizens Final Report, Randy Gainey, Tancy Vandecar-Burdin, Jay Albanese, Thomas Dearden, James Hawdon, Katalin Parti
Sociology & Criminal Justice Faculty Publications

PDF

2021

Analytical Approach to Biometric Security and How It Affects Privacy, Torré A. Williams
Cybersecurity Undergraduate Research Showcase

PDF

An Analysis of Significant Cyber Incidents and the Impact on the Past, Present, and Future, Seth E. Smith
Cybersecurity Undergraduate Research Showcase

PDF

Internet of Things: Cybersecurity in Small Businesses, Zobair Wali
Cybersecurity Undergraduate Research Showcase

PDF

Cybersecurity Maturity Model Certification (CMMC) Compliance for DoD Contractors, Sierra Burnett
Cybersecurity Undergraduate Research Showcase

PDF

GDPR, PIPL & LGPD: Privacy Regulations & Policies Across the Globe, Raymond H. Geistel
Cybersecurity Undergraduate Research Showcase

PDF

How Secure Are Android and Apple’s Operating Systems and Based Applications Against Cyber Attacks and Cyber Crime, Marlowe Cosby Jr.
Cybersecurity Undergraduate Research Showcase

PDF

Self-Supervised Perceptual Ad-Blocker, Killian Robinson
Cybersecurity Undergraduate Research Showcase

PDF

Developing an International Framework for Addressing Non-State Actors in Cyberspace, Joanna C. Di Scipio
Cybersecurity Undergraduate Research Showcase

PDF

Protection of Patient Privacy on Mobile Device Machine Learning, Matthew Nguyen
Cybersecurity Undergraduate Research Showcase

PDF

The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez
Political Science & Geography Faculty Publications

PDF

Effects of Cloud Computing in the Workforce, Kevin Rossi Acosta
Cybersecurity Undergraduate Research Showcase

PDF

Quantifying Cyber Risk by Integrating Attack Graph and Impact Graph, Omer F. Keskin
Engineering Management & Systems Engineering Theses & Dissertations

PDF

A Look into Increasing the Number of Veterans and Former Government Employees Converting to Career and Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala
Engineering Technology Faculty Publications

PDF

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection and Machine Learning, Goksel Kucukkaya
Engineering Management & Systems Engineering Theses & Dissertations

PDF

Cybersecurity Legislation and Ransomware Attacks in the United States, 2015-2019, Joseph Skertic
Graduate Program in International Studies Theses & Dissertations

PDF

INNOVATE Cyber, Kayla Marbella
Undergraduate Research Symposium

The Interdisciplinary Impacts of Technology Semantics and Communicational Bypassing in the Cybersecurity Field, Brooke Nixon
Undergraduate Research Symposium

Encryption and Decryption with a Raspberry Pi Device, Taylor Powell
Undergraduate Research Symposium

PDF

Role of Artificial Intelligence in the Internet of Things (IoT) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Engineering Technology Faculty Publications

PDF

A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil
Engineering Management & Systems Engineering Faculty Publications

PDF

Simulation for Cybersecurity: State of the Art and Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty
VMASC Publications

PDF

Enhancing Cyberweapon Effectiveness Methodology with SE Modeling Techniques: Both for Offense and Defense, C. Ariel Pinto, Matthew Zurasky, Fatine Elakramine, Safae El Amrani, Raed M. Jaradat, Chad Kerr, Vidanelage L. Dayarathna
Engineering Management & Systems Engineering Faculty Publications

PDF

Promoting Diversity in Teaching Cybersecurity Through GICL, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)
Information Technology & Decision Sciences Faculty Publications

PDF

Quantum Computing and Technologies: State-of-Art and Future Prospects, Yuming He, Wu He
Information Technology & Decision Sciences Faculty Publications

DeapSECURE Computational Training for Cybersecurity Students: Improvements, Mid-Stage Evaluation, and Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu
University Administration Publications

PDF

COVID-19 and Biocybersecurity's Increasing Role on Defending Forward, Xavier Palmer, Lucas N. Potter, Saltuk Karahan
Electrical & Computer Engineering Faculty Publications

PDF

Cybersecurity, Technology, and Society: Developing an Interdisciplinary, Open, General Education Cybersecurity Course, Brian K. Payne, Wu He, Cong Wang, D. E. Wittkower, Hongyi Wu
Sociology & Criminal Justice Faculty Publications

Matters of Biocybersecurity with Consideration to Propaganda Outlets and Biological Agents, Xavier-Lewis Palmer, Ernestine Powell, Lucas Potter, Thaddeus Eze (Ed.), Lee Speakman (Ed.), Cyril Onwubiko (Ed.)
Electrical & Computer Engineering Faculty Publications

PDF

Best Cybersecurity Practices for Companies, Post Van Buren, Mary Riley
Cybersecurity Undergraduate Research Showcase

PDF

Cybersecurity: Building a Better Defense with a Great Offense, David M. Cooke
Cybersecurity Undergraduate Research Showcase

PDF

Leverage Psychological Factors Associated with Lapses in Cybersecurity in Organizational Management, Chad Holm
Cybersecurity Undergraduate Research Showcase

PDF

On the Usage and Vulnerabilities of API Systems, Conner D. Yu
Cybersecurity Undergraduate Research Showcase

PDF

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
Computational Modeling & Simulation Engineering Faculty Publications

PDF

Using Torchattacks to Improve the Robustness of Models with Adversarial Training, William S. Matos Díaz
Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment

PDF

Faculty and Advisor Advice for Cybersecurity Students: Liberal Arts, Interdisciplinarity, Experience, Lifelong Learning, Technical Skills, and Hard Work, Brian K. Payne, Bria Cross, Tancy Vandecar-Burdin
Sociology & Criminal Justice Faculty Publications

CLEAR: Clean-Up Sample Targeted Backdoor in Neural Networks, Liuwan Zhu, Rui Ning, Chunsheng Xin, Chonggang Wang, Hongyi Wu
Electrical & Computer Engineering Faculty Publications

Exploring Cybersecurity Education at the K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.)
Information Technology & Decision Sciences Faculty Publications

PDF

2020

Internet of Things (IoT): Cybersecurity Risks in Healthcare, Ruhi Patel
Cybersecurity Undergraduate Research Showcase

PDF

The Hidden Advantage Among Digital Natives within Bug Bounty Programs, James (Jimmy) Allah-Mensah
Cybersecurity Undergraduate Research Showcase

PDF

A Survey on Securing Personally Identifiable Information on Smartphones, Dar’rell Pope, Yen-Hung (Frank) Hu, Mary Ann Hoppa
Virginia Journal of Science

PDF

Cyber-Assets at Risk (CAR): Monetary Impact of Personally Identifiable Information Data Breaches on Companies, Omer Ilker Poyraz
Engineering Management & Systems Engineering Theses & Dissertations

PDF

Snitch Application: Addressing Cyber Trust in Future Living Spaces, Russell Moore
Cybersecurity Undergraduate Research Showcase

PDF

Modeling and Design of Secure Internet of Things, Charles A. Kamhoua (Editor), Laurent L. Njilla (Editor), Alexander Kott (Editor), Sachhin Shetty (Editor)
Computational Modeling & Simulation Engineering Books

Human Behavior Is a Significant Flaw in Maintaining Cyber Security, Elizabeth Jackson
Cybersecurity Undergraduate Research Showcase

PDF

Space Infrastructures: From Risk to Resilience Governance, Unal Tatar (Editor), Adrian V. Gheorghe (Editor), Omer F. Keskin (Editor), Jean Muylaert (Editor)
Engineering Management & Systems Engineering Faculty Books

Account Recovery Methods for Two-Factor Authentication (2FA): An Exploratory Study, Lauren Nicole Tiller
Psychology Theses & Dissertations

PDF

Is the Right to Data Privacy Considered a Human Right?, Grace Bailey
Virginias Collegiate Honors Council Conference

The Corrosion of the United State's Hegemony Due to Rising Cyber Warfare, Ariana Oyola
Virginias Collegiate Honors Council Conference

Cybersecurity Education Through Technological and Engineering Literacy Standards, Philip A. Reed, Steven A. Barbato
STEMPS Faculty Publications

PDF

Applying High Impact Practices in an Interdisciplinary Cybersecurity Program, Brian K. Payne, Lisa Mayes, Tisha Parades, Elizabeth Smith, Hongyi Wu
Sociology & Criminal Justice Faculty Publications

Evade Deep Image Retrieval by Stashing Private Images in the Hash Space, Yanru Xiao, Cong Wang, Xing Gao
Computer Science Faculty Publications

The Cyberworld and Human Trafficking: A Double-Edged Sword, Bridget Dukes
Cybersecurity Undergraduate Research Showcase

PDF

Data and Artificial Intelligence: Mismatch Between Expectations and Uses, Diana Garcia
Cybersecurity Undergraduate Research Showcase

PDF

Security in 5G-Enabled Internet of Things Communication: Issues: Challenges, and Future Research Roadmap, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J.P.C. Rodrigues
VMASC Publications

PDF

IoT Devices in the Public Health Sector, Cayla Young
Cybersecurity Undergraduate Research Showcase

PDF

The Interdisciplinary Impacts of Technology Semantics and Communicational Bypassing in the Cybersecurity Field, Brooke Nixon
Cybersecurity Undergraduate Research Showcase

PDF

Study of the Feasibility of a Virtual Environment for Home User Cybersecurity, Sean Powell
OUR Journal: ODU Undergraduate Research Journal

PDF

Topical Review of Vulnerability Management for Local Hampton Roads Industry, Gregory W. Hubbard Jr., Matthew Eunice
OUR Journal: ODU Undergraduate Research Journal

PDF

2019

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
VMASC Publications

PDF

A Study of Existing Cross-Site Scripting Detection and Prevention Techniques Using XAMPP and VirtualBox, Jalen Mack, Yen-Hung (Frank) Hu, Mary Ann Hoppa
Virginia Journal of Science

PDF

Legal and Technical Issues for Text and Data Mining in Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

On the Responsibility for Uses of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

Keeping Anonymity at the Consumer Behavior on the Internet: Proof of Sacrifice, Sachio Horie
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

The Right to Human Intervention: Law, Ethics and Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

Difference Between Algorithmic Processing and the Process of Lifeworld (Lebenswelt), Domenico Schneider
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

What to Do When Privacy Is Gone, James Brusseau
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

Information Privacy: Not Just GDPR, Danilo Bruschi
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

Responding to Some Challenges Posed by the Re-identification of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

Hacking the Extended Mind: The Security Implications of the New Metaphysics, Robin L. Zebrowski
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

PDF

Quantifying Impact of Cyber Actions on Missions or Business Processes: A Multilayer Propagative Approach, Unal Tatar
Engineering Management & Systems Engineering Theses & Dissertations

PDF

Cyber Security- A New Secured Password Generation Algorithm with Graphical Authentication and Alphanumeric Passwords Along With Encryption, Akash Rao
Electrical & Computer Engineering Theses & Dissertations

PDF

Blockchain for Distributed Systems Security, Sachhin Shetty, Charles A. Kamhoua, Laurent L. Njilla
VMASC Books

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework, Nir Nissim, Aviad Cohen, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, Lee Giles
Computer Science Faculty Publications

PDF

Attacker Capability Based Dynamic Deception Model for Large-Scale Networks, Md Ali Reza Al Amin, Sachhin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua
Computational Modeling & Simulation Engineering Faculty Publications

PDF

Deep Learning Based Malware Classification Using Deep Residual Network, Yan Lu, Jonathan Graham, Jiang Li
Electrical & Computer Engineering Faculty Publications

Searching for Evidence of Scientific News in Scholarly Big Data, Md Reshad Ul Hoque, Dash Bradley, Chiman Kwan, Agnese Chiatti, Jiang Li, Jian Wu
Electrical & Computer Engineering Faculty Publications

Transfer Learning for Detecting Unknown Network Attacks, Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua, Kevin Kwiat
VMASC Publications

PDF

2018

Security Risk Tolerance in Mobile Payment: A Trade-off Framework, Yong Chen
Information Technology & Decision Sciences Theses & Dissertations

PDF

New Dimensions for a Challenging Security Environment: Growing Exposure to Critical Space Infrastructure Disruption Risk, Adrian V. Gheorghe, Alexandru Georgescu, Olga Bucovetchi, Marilena Lazăr, Cezar Scarlat
Engineering Management & Systems Engineering Faculty Publications

PDF

Applying Machine Learning to Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth AL-Maksousy
Computer Science Theses & Dissertations

PDF

A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
VMASC Publications

PDF

Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability, Agbotiname L. Imoize, Taiwo Oyedare, Michael E. Otuokere, Sachin Shetty
VMASC Publications

PDF

Micromodule 5: Economics of Cyber Systems Risk Management, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management

Introduction - Syllabus, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management

PDF

Micromodule 4: Cybersecurity Risk Governance, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management

Micromodule 08: Risk Management Framework and Information Security Management Systems, C. Ariel Pinto
Module 2: Applied Standards and Cybersecurity Risk Management

Micromodule 2: Fundamentals of Risk Management, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management

Micromodule 12: Cyber Risk Management in Internet of Things, C. Ariel Pinto
Module 3: Field Skills on Cybersecurity Risk Management

Micromodule 11: Cyber Risk Management in Cloud Environment, C. Ariel Pinto
Module 3: Field Skills on Cybersecurity Risk Management

Micromodule 07: Cybersecurity Framework and DoD Risk Management Framework, C. Ariel Pinto
Module 2: Applied Standards and Cybersecurity Risk Management

Micromodule 09: Government Standards and Regulations, C. Ariel Pinto
Module 2: Applied Standards and Cybersecurity Risk Management

Micromodule 10: Industry Standards and Best Practices, C. Ariel Pinto
Module 2: Applied Standards and Cybersecurity Risk Management

Micromodule 1: Fundamentals of Cybersecurity, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management

Micromodule 3: Risk Management of Tools Techniques, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management

Micromodule 6: Cyber Resilience and Decision Making, C. Ariel Pinto
Module 1: Fundamentals of Cybersecurity Risk Management

Cyber Security and Criminal Justice Programs in the United States: Exploring the Intersections, Brian K. Payne, Lora Hadzhidimova
Sociology & Criminal Justice Faculty Publications

PDF

2017

A Comparative Study on Machine Learning Algorithms for Network Defense, Abdinur Ali, Yen-Hung Hu, Chung-Chu (George) Hsieh, Mushtaq Khan
Virginia Journal of Science

PDF

Strategic Cyber Defense: A Multidisciplinary Perspective, Unal Tatar, Yasir Gokce, Adrian V. Gheorghe
Engineering Management & Systems Engineering Faculty Books

Securing the Internet of Things, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Books

Teaching Hands-On Cyber Defense Labs to Middle School and High School Students: Our Experience from GenCyber Camps, Peng Jiang, Xin Tian, Chunsheng Xin, Wu He
Electrical & Computer Engineering Faculty Publications

PDF

Earning a Seat at the Table: How IT Departments Can Partner in Organizational Change and Innovation, Robert L. Moore, Nathan Johnson
STEMPS Faculty Publications

PDF

2016

An Assessment Model to Improve National Cyber Security Governance, Unal Tatar, Bilge Karabacak, Adrian Gheorghe
Engineering Management & Systems Engineering Faculty Publications

Developing and Using Evidence-Based E-Learning Videos for Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar
Information Technology & Decision Sciences Faculty Publications

2015

Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments, Youakim Badr, Salim Hariti, Youssif AL-Nashif, Erik Blasch
Electrical & Computer Engineering Faculty Publications

PDF

2013

Security Risks and Protection in Online Learning: A Survey, Yong Chen, Wu He
Distance Learning Faculty & Staff Publications

PDF

2010

Security in Ad Hoc Networks and Pervasive Computing, Isaac Z. Wu, X.-Y. Li, M. Song, C.-M. Liu
Electrical & Computer Engineering Faculty Publications

PDF

2009

Multicast Encryption Infrastructure for Security in Sensor Networks, Richard R. Brooks, Brijesh Pillai, Matthew Pirretti, Michele C. Weigle
Computer Science Faculty Publications

PDF

2007

Providing VANET Security Through Active Position Detection, Gongjun Yan, Gyanesh Choudhary, Michele C. Weigle, Stephan Olariu
Computer Science Faculty Publications

PDF

2006

Group Key Management in Wireless Ad-Hoc and Sensor Networks, Mohammed A. Moharrum
Computer Science Theses & Dissertations

PDF

2004

A Framework for Secure Group Key Management, Sahar Mohamed Ghanem
Computer Science Theses & Dissertations

PDF