An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building
Li-Chiou Chen, Andreea Cotoranu, Praviin Mandhare and Darren Hayes
Simulating Industrial Control Systems using Node-RED and Unreal Engine 4
Steven Day, William Smallwood and Joshua Kuhn
Student Educational Learning Experience Through Cooperative Research Melissa Hannis, Idongesit Mkpong-Ruffin and Drew Hamilton
Digital Forensics Education: Challenges and Future Opportunities Megan Stigall and Kim-Kwang Raymond Choo
Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research Blair Taylor, Sidd Kaza and Melissa Dark
Design of a Virtual Cybersecurity Escape Room Tania Williams and Omar El-Gayar
Part II – Cyber Security Technology
A Novel Method for the Automated Generation for JOP Chain Exploits Bramwell Brizendine, Austin Babcock and Josh Stroschien
Increasing Log Availability in Unmanned Vehicle Systems Nicholas Carter, Peter Pommer, Duane Davis and Cynthia Irvine
Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques George Harter and Neil Rowe
Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic Wenhui Liang, Cui Zhang and Jun Dai
Social Engineering Attacks in Healthcare Systems: A Survey Christopher Nguyen, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis and Dipankar Dasgupta
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots Neil Rowe, Thuy Nguyen, Jeffrey Dougherty, Matthew Bieker and Darry Pilkington
Risks of Electric Vehicle Supply Equipment Integration within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications Roland Varriale, Michael Jaynes and Ryan Crawford
This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators and practitioners, as well as students seeking to learn about cyber security.