Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Data Collection | 3 |
| Information Security | 2 |
| College Faculty | 1 |
| College Students | 1 |
| Computer Networks | 1 |
| Consumer Economics | 1 |
| Crime | 1 |
| Deception | 1 |
| Delphi Technique | 1 |
| Electronic Mail | 1 |
| More ▼ | |
Source
| Journal of Cybersecurity… | 3 |
Author
| Casagrande, Marco | 1 |
| Conti, Mauro | 1 |
| Di Gangi, Paul M. | 1 |
| Fedeli, Monica | 1 |
| Goh, Samuel H. | 1 |
| Hamrick, Jennifer D. | 1 |
| Harry May | 1 |
| Losiouk, Eleonora | 1 |
| Travis Atkison | 1 |
| Wech, Barbara A. | 1 |
| Worrell, James L. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Italy | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education

Peer reviewed
