National Cyber Summit (NCS) Research Track 2021

This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of...

Full description

Bibliographic Details
Other Authors: Choo, Kim-Kwang Raymond (Editor), Morris, Tommy (Editor), Peterson, Gilbert (Editor), Imsand, Eric (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2022, 2022
Edition:1st ed. 2022
Series:Lecture Notes in Networks and Systems
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03164nmm a2200361 u 4500
001 EB002007728
003 EBX01000000000000001170628
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220104 ||| eng
020 |a 9783030846145 
100 1 |a Choo, Kim-Kwang Raymond  |e [editor] 
245 0 0 |a National Cyber Summit (NCS) Research Track 2021  |h Elektronische Ressource  |c edited by Kim-Kwang Raymond Choo, Tommy Morris, Gilbert Peterson, Eric Imsand 
250 |a 1st ed. 2022 
260 |a Cham  |b Springer International Publishing  |c 2022, 2022 
300 |a X, 175 p. 64 illus., 54 illus. in color  |b online resource 
505 0 |a Part I – Cyber Security Education -- An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building -- Simulating Industrial Control Systems using Node-RED and Unreal Engine 4 -- Student Educational Learning Experience Through Cooperative Research -- Digital Forensics Education: Challenges and Future Opportunities -- Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research -- Design of a Virtual Cybersecurity Escape Room -- Part II – Cyber Security Technology -- A Novel Method for the Automated Generation for JOP Chain Exploits -- Increasing Log Availability in Unmanned Vehicle Systems -- Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques -- Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic -- Social Engineering Attacks in Healthcare Systems: A Survey -- Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots -- Risks ofElectric Vehicle Supply Equipment Integration within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications 
653 |a Computational intelligence 
653 |a Computers 
653 |a Computational Intelligence 
653 |a Computer Hardware 
653 |a Data Engineering 
653 |a Engineering / Data processing 
700 1 |a Morris, Tommy  |e [editor] 
700 1 |a Peterson, Gilbert  |e [editor] 
700 1 |a Imsand, Eric  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes in Networks and Systems 
028 5 0 |a 10.1007/978-3-030-84614-5 
856 4 0 |u https://doi.org/10.1007/978-3-030-84614-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 620.00285 
520 |a This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators and practitioners, as well as students seeking to learn about cyber security