Full Text Available
Access Full Text at Repository
Search Results - "Computer and Cyber Security"
-
Integrating Adversarial Scenarios into LLM Security Labs: An Experience Report on a Hands-On Approach
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
Online Article RSS Article -
A Review of Routing Attacks in Routing Protocol Over Low-Power and Lossy-based IoT Networks
Published in Journal of Cybersecurity Education, Research and Practice (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cybercamp: an Experience Report on the Transformations of an Intensive Cybersecurity Summer Camp for High School Students
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Advancing Cybersecurity Practice: Explainable Machine Learning for Network Intrusion Detection
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Software-Defined Networking powered by AI-driven Anomaly Detection
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Security and Privacy of Wearable and Implantable Medical Devices: A Course-Based Approach to Medical Device Cybersecurity Education
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Experts’ validation of the fundamental cybersecurity competency index (FCCI) using a commercial cyber range through human-generative artificial intelligence (GenAI) teaming
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Systematic Review of Elementary Cybersecurity Education: Curriculum, Pedagogy, and Barriers
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Impact of Information Security Awareness Training on Knowledge, Attitude, and Behavior: A K-12 Case Study
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Higher Education Cybersecurity: A Vulnerability Assessment of the U.S. South’s Institutional Websites
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Arizona’s Experiential Learning Opportunities: Regional Security Operations Centers and Cybersecurity Clinics
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Prompt Engineering for GenAI in Cybersecurity Incident Response: A Multi-Platform Evaluation Based on NICE PR-IR-001
Published in Journal of Cybersecurity Education, Research and Practice (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Vishing and Smishing Perpetrators and Their Victims in Nigerian Slums
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Operationalizing Cyber-Routine Activities Theory for Senior Cybercrime Prevention: An Evaluation of the SHIELD Training-the-Trainer Program
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cybercrime, Vulnerability and Digital Guardianship: Opportunity Structures and Prevention in a Changing Online Landscape
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
A Study of Pattern of Cybercrime Abuse of Individual Internet Users in Umuahia North LGA, Abia State of South-eastern Nigeria
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Policy Considerations of Open-Source Intelligence: A Study of Bellingcat's Online Investigation Patterns (2014-2024)
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
The Legal Response to the Intrusion into Digital Identity in Social Media
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Modus Operandi and Blockchain Analysis of Romance Scams: Cryptocurrency-Driven Victimization
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Navigating the Digital Frontier: New Perspectives on Cybercrime and Governance
Published in nternational Journal of Cybersecurity Intelligence & Cybercrime (2025)Subjects: “…Computer and Cyber Security…”
Get full text