- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
0001000001000000
- More
- Availability
-
11
- Author / Contributor
- Filter by Author / Creator
-
-
Pusey, Portia (2)
-
Abdelsalam, Mahmoud (1)
-
Gupta, Maanak (1)
-
Kaleem, Faisal (1)
-
Mittal, Sudip (1)
-
Swanson, Kyle (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Aleven, V. (0)
-
& Andrews-Larson, C. (0)
-
& Archibald, J. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
The demand for skilled cybersecurity professionals continues to outpace supply, necessitating effective educational and workforce development programs. This exploratory study analyzes the influence of a scholarship and support activities on participants' career development through the theoretical frameworks of Social Cognitive Career Theory and career identity literature. Findings suggest that the Metropolitan State University Cyber Defenders Program bolstered participants' self-efficacy beliefs related to their academic and career pursuits, fostered positive outcome expectations regarding cybersecurity careers, and strengthened their career goals and engagement. The scholarship itself and peer interactions emerged as key supports. While overall results are positive, areas concerning perceptions of diversity within the field and the ease of finding employment warrant further exploration.more » « lessFree, publicly-accessible full text available October 29, 2026
-
Pusey, Portia; Gupta, Maanak; Mittal, Sudip; Abdelsalam, Mahmoud (, Journal of The Colloquium for Information Systems Security Education)This paper presents the findings of action research conducted to evaluate new modules created to teach learners how to apply machine learning (ML) and artificial intelligence (AI) techniques to malware data sets. The trend in the data suggest that learners with cybersecurity competencies may be better prepared to complete the AI/ML modules’ exercises than learners with AI/ML competencies. We describe the challenge of identifying prerequisites that could be used to determine learner readiness, report our findings, and conclude with the implications for instructional design and teaching practice.more » « less
An official website of the United States government
