Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Data Collection | 3 |
Information Security | 2 |
College Faculty | 1 |
College Students | 1 |
Computer Networks | 1 |
Consumer Economics | 1 |
Crime | 1 |
Deception | 1 |
Delphi Technique | 1 |
Electronic Mail | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 3 |
Author
Casagrande, Marco | 1 |
Conti, Mauro | 1 |
Di Gangi, Paul M. | 1 |
Fedeli, Monica | 1 |
Goh, Samuel H. | 1 |
Hamrick, Jennifer D. | 1 |
Harry May | 1 |
Losiouk, Eleonora | 1 |
Travis Atkison | 1 |
Wech, Barbara A. | 1 |
Worrell, James L. | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Italy | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education