All Stories

  1. A Statistical Approach for Keystroke Continuous Authentication Subversion
  2. MiNTT: A Family of Module Lattice-based Cryptographic Compression Functions
  3. Building Successful STEM Partnerships in Education: Strategies for Enhancing Collaboration
  4. Integrating Generative AI into Microelectronics Education
  5. Hardware Trojan Key-Corruption Detection with Automated Neural Architecture Search
  6. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
  7. QUANTITATIVE TECHNIQUES WITH SMALL SAMPLE SIZES: AN EDUCATIONAL SUMMER CAMP EXAMPLE
  8. Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
  9. Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models
  10. TP-NET: Training Privacy-Preserving Deep Neural Networks under Side-Channel Power Attacks
  11. Transition Recovery Attack on Embedded State Machines Using Power Analysis
  12. Learning Privacy-Preserving Graph Convolutional Network with Partially Observed Sensitive Attributes
  13. Confusion Over Models: Exploring Discourse in a STEM Professional Development
  14. Computer Science beyond Coding: Partnering to Create Teacher Cybersecurity Microcredentials
  15. Comparing Ransomware using TLSH and @DisCo Analysis Frameworks
  16. Data-Driven Suitability Analysis to Enable Machine Learning Explainability and Security
  17. Jangseung: A Guardian for Machine Learning Algorithms to Protect Against Poisoning Attacks
  18. Privacy-Preserving Fair Machine Learning Without Collecting Sensitive Demographic Data
  19. Side-channel Leakage Assessment Metrics: A Case Study of GIFT Block Ciphers
  20. Stealing Machine Learning Parameters via Side Channel Power Attacks
  21. Integrated STEM for Teacher Professional Learning and Development: “I Need Time for Practice”
  22. Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity
  23. Defensive Strategies for Autonomous Decentralized Lightweight Swarms
  24. Detecting DDoS Attacks Near The Edge with Router Canaries
  25. Secure and Resilient Swarms: Autonomous Decentralized Lightweight UAVs to the Rescue
  26. One-Class Classification to Continuously Authenticate Users Based on Keystroke Timing Dynamics
  27. Adversarial Impacts on Autonomous Decentralized Lightweight Swarms
  28. A State Machine Encoding Methodology Against Power Analysis Attacks
  29. Ants Go Marching—Integrating Computer Science into Teacher Professional Development with NetLogo
  30. Mitigating information leakage using secure finite state machines.
  31. Computer science and engineering: utilizing action research and lesson study
  32. CyberSecurity and Technology: How Do They Fit into a Science Classroom?
  33. A State Encoding Methodology for Side-Channel Security vs. Power Trade-off Exploration
  34. S-CHIRP: Securing Communications in Lightweight Peer-to-Peer Networks in the IoT
  35. Blockchain-Based Election Infrastructures
  36. EVO-SCHIRP: Evolved Secure Swarm Communications
  37. Secure and Decentralized Swarm Behavior with Autonomous Agents for Smart Cities
  38. Designing for Security Within and Between IoT Devices
  39. Integrated STEM: Focus on Informal Education and Community Collaboration through Engineering
  40. Portable tor router: Easily enabling web privacy for consumers
  41. S-CHIRP: Secure communication for heterogeneous IoTs with round-robin protection
  42. Predictive liability models and visualizations of high dimensional retail employee data
  43. CressInt : A user-friendly web resource for genome-scale exploration of gene regulation in Arabidopsis thaliana
  44. Enabling Side Channel Secure FSMs in the Presence of Low Power Requirements
  45. Secure controllers: Requirements of S*FSM
  46. S*FSM: A Paradigm Shift for Attack Resistant FSM Designs and Encodings
  47. SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits
  48. Safety-Centric Design of Distributed Embedded Avionics
  49. The Use of Device Simulation in Development of USB Storage Devices
  50. Designing a Creative Cybersecurity Microcredential for Educators: Challenges and Successes of K-12 Teacher Professional Development
  51. Constructing and Refining Computer Science Outreach Focused on Student Engagement
  52. Building Collaboration and Securing Interest in Computer Science Education through Outreach Opportunities
  53. Novel STEM Research Programs Could Minimize Attrition in Undergraduate Engineering
  54. Enabling Advanced Topics in Computing and Engineering Through Authentic Inquiry: A Cybersecurity Case Study
  55. Interactive Web Notebooks Using the Cloud to Enable CS in K-16+ Classrooms and PDs
  56. Teaching Teachers to Think Like Engineers Using NetLogo
  57. Flexible Learning Cycles: Introducing Agile Constructivist Pedagogy
  58. Board 319: Integrating Computing Throughout K-12 While Bridging the Digital Divide
  59. On the Development of Cybersecurity and Computing Centric Professional Developments and the Subsequent Implementation of Topics in K12 Lesson Plans (RTP)
  60. The Artful Craft of Improving Virtual Summer Camps in the Midst of COVID-19 (Work in Progress)
  61. WySLICE - Integrating Computer Science throughout Existing K-12 Core Disciplinary Areas
  62. Hardening Freshman Engineering Student Soft Skills
  63. Arduinos and Games: K-12 Teachers Explore Computer Science (Evaluation)
  64. Developing a Creative K-12 Manipulative: An ECECS Capstone
  65. Engineering Education Collaboration: Innovative Pedagogical Methods For High School And University Environmentalists
  66. Go With The Flow: Describing Storm Water Runoff Rates Using The Derivative
  67. Improving Future Faculty With Graduate Engineering Education