Char Sample
YOU?
Author Swipe
View article: Transforming Cyber Education thru Open to All Accessible Pathways
Transforming Cyber Education thru Open to All Accessible Pathways Open
Boise State University’s (BSU) Cyber Operations and Resilience CORe program was intentionally designed so that any student, especially non-traditional and non-technical students, with an interest in cybersecurity could have an education an…
View article: ZTA: Never Trust, Always Verify
ZTA: Never Trust, Always Verify Open
Zero Trust Architecture (ZTA) deployments are growing in popularity, widely viewed as a solution to historical enterprise security monitoring that typically finds attackers months after they have gained system access. ZTA design incorporat…
View article: Future Needs of the Cybersecurity Workforce
Future Needs of the Cybersecurity Workforce Open
Expected growth of the job market for cyber security professionals in both the US and the UK remains strong for the foreseeable future. While there are many roles to be found in cyber security, that vary from penetration tester to chief in…
View article: Interdisciplinary Lessons Learned While Researching Fake News
Interdisciplinary Lessons Learned While Researching Fake News Open
The misleading and propagandistic tendencies in American news reporting have been a part of public discussion from its earliest days as a republic ( Innis, 2007 ; Sheppard, 2007 ). “Fake news” is hardly new ( McKernon, 1925 ), and the term…
View article: Vulnerabilities in Artificial Intelligence and Machine Learning Applications and Data
Vulnerabilities in Artificial Intelligence and Machine Learning Applications and Data Open
Artificial intelligence (AI) applications driven by machine learning (ML) are transformational technologies within the international nuclear security regime. Advancements realized by AI—faster and improved data insights, more efficient and…
View article: Artificial Intelligence for Digital Security and Protections
Artificial Intelligence for Digital Security and Protections Open
Proper functioning of nuclear power plants relies on a mix of well-regulated human and machine-driven workflows. This regulation supports nuclear safety through a series of processes and many of the tasks that support these processes have …
View article: A Model for Evaluating Fake News
A Model for Evaluating Fake News Open
"Fake news” (FN) is slowly being recognized as a security problem that involves
\nmultiple academic disciplines; therefore, solving the problem of FN will rely on a
\ncross-discipline approach where behavioral science, linguistics, compute…
View article: Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model
Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model Open
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DI…
View article: A Cross-discipline approach to countering 4th generation espionage
A Cross-discipline approach to countering 4th generation espionage Open
In 2018 the UK government introduced the term ‘4th generation espionage’ to define the hybrid threats exemplified in fake news. As events occur, even seemingly benign events, the rush to report and take charge of the narrative can result i…
View article: A cultural exploration of the social media manipulators
A cultural exploration of the social media manipulators Open
The widespread use of Internet social media sites for the production and dissemination of propaganda continues to grow and gather attention. Social media sites spread information faster and wider than those institutions and methods histori…
View article: Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users Open
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addres…
View article: Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment
Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment Open
Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic …
View article: Data and Code to Reproduce: Malware in the Future? Forecasting Analyst Detection of Cyber Events
Data and Code to Reproduce: Malware in the Future? Forecasting Analyst Detection of Cyber Events Open
Forecasting cyber events