The use of physical systems and Virtual Machines has become inefficient and expensive for creating tailored, hands-on exercises for providing cyber security training. The main purpose of this project is to directly address these issues faced in cyber security education with the help of Docker containers. Using Docker, a lightweight and automated platform was developed for creating, sharing, and managing hands-on exercises. With the help of orchestration tools, this platform provides a centralized point to monitor and control the systems and exercises with a high degree of automation. In a classroom/lab environment, this infrastructure enables instructors and students not only to share exercises but also helps create and deploy exercises mor...
In cybersecurity, understanding the technologies and the best ways to interface with them is paramou...
Nowadays the notion of cybersecurity has claimed center stage in the daily life of individuals and o...
With new technology restructuring instructional practices, many school systems are working towards a...
This research included a thorough examination of the existing software assurance or what is commonly...
Abstract. The serverless computing has posed new challenges for cloud vendors that are difficult to ...
The Android operating system is quickly becoming the most popular platform for mobiledevices. As And...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
This paper's primary goal is to use Bloom's Revised Taxonomy educational objectives in creating Cybe...
This work is an investigation into reconstructing fragmented ASCII files based on content analysis m...
Today, one is expected to remember multiple user names and passwords for different domains when one ...
This thesis study introduces operational concepts for accelerating necessary cyber security improvem...
This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra s...
The main purpose of this project is to determine if the use of Information Technology (IT) tools, sp...
Current hard drive technology shows a widening gap between the ability to store vast amounts of dat...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
In cybersecurity, understanding the technologies and the best ways to interface with them is paramou...
Nowadays the notion of cybersecurity has claimed center stage in the daily life of individuals and o...
With new technology restructuring instructional practices, many school systems are working towards a...
This research included a thorough examination of the existing software assurance or what is commonly...
Abstract. The serverless computing has posed new challenges for cloud vendors that are difficult to ...
The Android operating system is quickly becoming the most popular platform for mobiledevices. As And...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
This paper's primary goal is to use Bloom's Revised Taxonomy educational objectives in creating Cybe...
This work is an investigation into reconstructing fragmented ASCII files based on content analysis m...
Today, one is expected to remember multiple user names and passwords for different domains when one ...
This thesis study introduces operational concepts for accelerating necessary cyber security improvem...
This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra s...
The main purpose of this project is to determine if the use of Information Technology (IT) tools, sp...
Current hard drive technology shows a widening gap between the ability to store vast amounts of dat...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
In cybersecurity, understanding the technologies and the best ways to interface with them is paramou...
Nowadays the notion of cybersecurity has claimed center stage in the daily life of individuals and o...
With new technology restructuring instructional practices, many school systems are working towards a...