default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 67 matches
- 2022
- Kim-Kwang Raymond Choo, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, September 28-30, 2021. Lecture Notes in Networks and Systems 310, Springer 2022, ISBN 978-3-030-84613-8 [contents] - 2021
- Bramwell Brizendine, Austin Babcock:
A Novel Method for the Automatic Generation of JOP Chain Exploits. NCS 2021: 77-92 - Nickolas Carter, Peter Pommer, Duane T. Davis, Cynthia E. Irvine:
Increasing Log Availability in Unmanned Vehicle Systems. NCS 2021: 93-109 - Li-Chiou Chen, Andreea Cotoranu, Praviin Mandhare, Darren R. Hayes:
An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building. NCS 2021: 3-12 - Steven Day, William "Kohler" Smallwood, Joshua Kuhn:
Simulating Industrial Control Systems Using Node-RED and Unreal Engine 4. NCS 2021: 13-21 - Melissa Hannis, Idongesit Mkpong-Ruffin, Drew Hamilton:
Student Educational Learning Experience Through Cooperative Research. NCS 2021: 22-27 - George T. Harter, Neil C. Rowe:
Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques. NCS 2021: 110-123 - Wenhui Liang, Cui Zhang, Jun Dai:
Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic. NCS 2021: 124-140 - Christopher Nguyen, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis, Dipankar Dasgupta:
Social Engineering Attacks in Healthcare Systems: A Survey. NCS 2021: 141-150 - Neil C. Rowe, Thuy D. Nguyen, Jeffery T. Dougherty, Matthew C. Bieker, Darry Pilkington:
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots. NCS 2021: 151-162 - Megan Stigall, Kim-Kwang Raymond Choo:
Digital Forensics Education: Challenges and Future Opportunities. NCS 2021: 28-46 - Blair Taylor, Siddharth Kaza, Melissa Dark:
Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research. NCS 2021: 47-59 - Roland Varriale, Ryan Crawford, Michael Jaynes:
Risks of Electric Vehicle Supply Equipment Integration Within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications. NCS 2021: 163-173 - Tania Williams, Omar F. El-Gayar:
Design of a Virtual Cybersecurity Escape Room. NCS 2021: 60-73 - Kim-Kwang Raymond Choo, Tommy H. Morris, Gilbert L. Peterson, Eric S. Imsand:
National Cyber Summit (NCS) Research Track 2020, Huntsville, AL, USA, June 2-4, 2020. Advances in Intelligent Systems and Computing 1271, Springer 2021, ISBN 978-3-030-58702-4 [contents] - 2020
- Travis Blue, Hossain Shahriar:
Distributed Denial of Service Attack Detection. NCS 2020: 240-241 - Chola Chhetri:
TWOPD: A Novel Approach to Teaching an Introductory Cybersecurity Course. NCS 2020: 92-99 - Chola Chhetri, Vivian Motti:
Identifying Vulnerabilities in Security and Privacy of Smart Home Devices. NCS 2020: 211-231 - Anton Dahbura, Joseph Carrigan:
A Video-Based Cybersecurity Modular Lecture Series for Community College Students. NCS 2020: 37-45 - William Goble, Elizabeth Braddy, Mike Burmester, Daniel Schwartz, Ryan Sloan, Demetra Drizis, Nitish Ahir, Melissa Ma, Matthew J. Bays, Matt Chastain:
Challenges of Securing and Defending Unmanned Aerial Vehicles. NCS 2020: 119-138 - Howard B. Goodman, Pam Rowland:
Deficiencies of Compliancy for Data and Storage - Isolating the CIA Triad Components to Identify Gaps to Security. NCS 2020: 170-192 - Ragib Hasan, Yuliang Zheng, Jeffery T. Walker:
Digital Forensics Education Modules for Judicial Officials. NCS 2020: 46-60 - Yasser Karim, Ragib Hasan:
Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer. NCS 2020: 193-210 - Zack Kirkendoll, Matthew Lueck, Nathan F. Hutchins, Loyd R. Hook:
Automated Linux Secure Host Baseline for Real-Time Applications Requiring SCAP Compliance. NCS 2020: 154-169 - James S. Okolica, Alan C. Lin, Gilbert L. Peterson:
Gaming DevSecOps - A Serious Game Pilot Study. NCS 2020: 61-77 - A. R. Rao, Kavita Mishra, Nagasravani Recharla:
Designing an Internet-of-Things Laboratory to Improve Student Understanding of Secure Embedded Systems. NCS 2020: 238-239 - Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, Akshita Gorti:
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity. NCS 2020: 3-34 - Mohammad Shojaeshafiei, Letha H. Etzkorn, Michael Anderson:
Network System's Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQM. NCS 2020: 100-115 - Michael T. Shrove, Emil Jovanov:
Is There a Prophet Who Can Predict Software Vulnerabilities? NCS 2020: 242-243 - Joshua A. Sipper:
Information Warfare and Cyber Education: Issues and Recommendations. NCS 2020: 235-237
skipping 37 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-11 22:31 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint