Most Popular Papers *
Car Hacking: Accessing and Exploiting the CAN Bus Protocol
Bryson R. Payne
The 2020 Twitter Hack – So Many Lessons to Be Learned
Paul D. Witman and Scott Mackelprang
Cybersecurity Challenges and Awareness of the Multi-Generational Learners in Nepal
Raj Kumar Dhungana, Lina Gurung Dr, and Hem Poudyal
Building the Operational Technology (OT) Cybersecurity Workforce: What are Employers Looking for?
Christopher A. Ramezan, Paul M. Coffy, and Jared Lemons
What You See Is Not What You Know: Studying Deception in Deepfake Video Manipulation
Cathryn Allen, Bryson R. Payne, Tamirat Abegaz, and Chuck Robertson
Integrating NIST and ISO Cybersecurity Audit and Risk Assessment Frameworks into Cameroonian Law
Bernard Ngalim
Integrity, Confidentiality, and Equity: Using Inquiry-Based Labs to help students understand AI and Cybersecurity
Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, and Yan Huang
Planning and Implementing a Successful NSA-NSF GenCyber Summer Cyber Academy
Bryson R. Payne, Tamirat Abegaz, and Keith Antonia
A toolkit approach to information security awareness and education
Peter Korovessis, Steven Furnell, Maria Papadaki, and Paul Haskell-Dowland
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 11/29/23.