National Cybersecurity Institute Journal Archive

Volume 3, Number 2
Cybersecurity Gender Inequality: The Role and Effort of the Community College  |  Building Bridges: From NSF I-Corps to Community Colleges—Cybersecurity for All  |  Meeting the Present and Future Demands of Cybersecurity  |  2 Plus 2 Cybersecurity Education—Transfer Pathways for Women and Minorities   Community College’s Outreach Role in Cybersecurity

Volume 3, Number 1
Cybersecurity Matriculation: Analyzing Online Higher Education from the Professor’s View  |  Data-Driven Cybersecurity Leveraging Intelligent Data Storage (IDS) Capabilities  |  Security Development Life Cycle Framework for Web-based Applications  |  Medical Devices: Managing the Risk  Community Colleges as Innovators in Cybersecurity Workforce Development  |  Leveraging Automated Animated Agent Commentary to Improve Sense-Making for Novice Users at Cybersecurity Competitions  |  Vulnerability Risk Modeling: Combining Cybersecurity and Epidemiology to Enhance National Defense

Volume 2, Number 3
Project-based Curricular Service Learning for Cybersecurity Education  |  A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs  |  Creating New Private-Public Partnerships in Cybersecurity  |  Evolution of Information Security Issues in Small Businesses  |  Hybrid Implementation of Flipped Classroom Approach to Cybersecurity Education  |  Malware Fingerprinting: Analysis of Tool Marks and Other Characteristics of Windows Malware  |  Strengthening Cyber Incident Response Capabilities Through Education and Training in the Incident Command System

Volume 2, Number 2
Developing a Comprehensive Cybersecurity Curriculum  |  Cybersecurity Outreach for Underrepresented Minority Students  |  Bridging the Gap  |  Cybersecurity Competitions: Recommendations for Assessment, Evaluation and Research  |  The Central New York Hackathon: A Case Study on the Collaborative Design and Implementation of a Regional Cyber Defense Event  |  NCI Symposium on Security in Cyberspace

Volume 2, Number 1
Intrinsic or Opportunistic: Chinese Cyber Espionage Strategies  |  War Against Identity Cyber Assault in a Social World  |  Regulation of Cybersecurity in the Financial Sector: Now Modeled on the Emergency Preparedness Cycle  |  Cybersecurity Graduate Training Reveals Security-by-Obscurity Vulnerabilities in Website Authentication  The Exclusiveness of Malicious Software Called Spyware and Exploring Mitigating Techniques  |  Bibliometric Analysis of the Scientific Literature on MOOC’s Self Directed Learning (SDL) and Educational Taxonomies  |  Security in Cyberspace: Part II: NCI Cyber Symposium Series

Volume 1, Number 3
NCI Symposium on the Nature of Cyber Warfare  |  Elements of National Cybersecurity Strategy for Developing Nations  |  Data-Centric Security  |  Advances in Operational Risk and Threat Modeling  The Need for a Paradigm Shift Toward Cybersecurity in Journalism  |  Is Cybersecurity Possible in Healthcare?

Volume 1, Number 2
Is There a Cyber War? Review Essay  |  Cyber Warfare Simulation to Prepare to Control Cyber Space  |  Multidisciplinary Approaches for Cyber Security  |  Geospatial Mapping of Internet Protocol Addresses for Real-Time Cyber Domain Visual Analytics and Knowledge Management Using the Global Information Network Architecture  The New Demands of Online Reputation Management  |  The Risk of Cyber Crimes to the Critical National Infrastructure: A Threat Assessment  |  Making the Community Project Approach Work in Your Community

Volume 1, Number 1
Usable Cybersecurity: Human Factors in Cybersecurity Education Curricula  |  Extraction and Reasoning over Network Data to Detect Novel Cyber Attacks  |  A New Five-Factor Process for Increasing Cybersecurity and Privacy  |  Towards a Cyber War Taboo? A Framework to Explain the Emergence of Norms for the Use of Force in Cyberspace  The Power of Rails and Industry Collaboration in Cyber Education  |  Assessing Security Against a Framework: Wireless Local Area Networks in a Classified Environment