This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit's Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber…mehr
This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit's Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators and practitioners, as well as students seeking to learn about cyber security.
Part I - Cyber Security Education.- An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building.- Simulating Industrial Control Systems using Node-RED and Unreal Engine 4.- Student Educational Learning Experience Through Cooperative Research.- Digital Forensics Education: Challenges and Future Opportunities.- Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.- Design of a Virtual Cybersecurity Escape Room.- Part II - Cyber Security Technology.- A Novel Method for the Automated Generation for JOP Chain Exploits.- Increasing Log Availability in Unmanned Vehicle Systems.- Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques.- Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic.- Social Engineering Attacks in Healthcare Systems: A Survey.- Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots.- Risks ofElectric Vehicle Supply Equipment Integration within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications.
Part I – Cyber Security Education.- An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building.- Simulating Industrial Control Systems using Node-RED and Unreal Engine 4.- Student Educational Learning Experience Through Cooperative Research.- Digital Forensics Education: Challenges and Future Opportunities.- Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.- Design of a Virtual Cybersecurity Escape Room.- Part II – Cyber Security Technology.- A Novel Method for the Automated Generation for JOP Chain Exploits.- Increasing Log Availability in Unmanned Vehicle Systems.- Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques.- Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic.- Social Engineering Attacks in Healthcare Systems: A Survey.- Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots.- Risks ofElectric Vehicle Supply Equipment Integration within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications.
Part I - Cyber Security Education.- An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building.- Simulating Industrial Control Systems using Node-RED and Unreal Engine 4.- Student Educational Learning Experience Through Cooperative Research.- Digital Forensics Education: Challenges and Future Opportunities.- Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.- Design of a Virtual Cybersecurity Escape Room.- Part II - Cyber Security Technology.- A Novel Method for the Automated Generation for JOP Chain Exploits.- Increasing Log Availability in Unmanned Vehicle Systems.- Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques.- Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic.- Social Engineering Attacks in Healthcare Systems: A Survey.- Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots.- Risks ofElectric Vehicle Supply Equipment Integration within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications.
Part I – Cyber Security Education.- An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building.- Simulating Industrial Control Systems using Node-RED and Unreal Engine 4.- Student Educational Learning Experience Through Cooperative Research.- Digital Forensics Education: Challenges and Future Opportunities.- Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.- Design of a Virtual Cybersecurity Escape Room.- Part II – Cyber Security Technology.- A Novel Method for the Automated Generation for JOP Chain Exploits.- Increasing Log Availability in Unmanned Vehicle Systems.- Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques.- Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic.- Social Engineering Attacks in Healthcare Systems: A Survey.- Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots.- Risks ofElectric Vehicle Supply Equipment Integration within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497