1 |
Conklin Wm Arthur, Cline Raymond E, Roosa Tiffany. (2014). Re engineering cyberseucirty educationin the US : An analysis of the critical factors. System Sciences (HICCS) 47th Hawaii International Conference 2014 (pp. 2006-2014). IEEE
|
2 |
I. Alsmadi & M. Zarour. (2018). Cybersecurity programs in Saudi Arabia: Issues and Recommendations. In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-5). IEEE.
|
3 |
B. D. Caulkins, K. Badillo-Urquiola, P. Bockelman & R. Leis. (2016). Cyber workforce development using a behavioral cybersecurity paradigm. In 2016 International Conference on Cyber Conflict (CyCon US) (pp. 1-6). IEEE.
|
4 |
C. Curricula. (2017). Curriculum guidelines for post-secondary degree programs in cybersecurity. New York : IEEE Computer Society. https://cybered.hosting.acm.org/wp/wp-content/uploads/2018/02/csec2017_web.pdf
|
5 |
W. Park & S. Ahn. (2017). Enhancing Education Curriculum of cybersecurity Based on NICE. KIPS Trans. on Comp. and Comm. Sys., 6(1), 321-328. DOI : 10.3745/KTCCS.2017.6.7.321
|
6 |
S. Hong. (2018). A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S. Journal of the Korea Institute of Information Security and Cryptology, 28(1), 249-267. DOI : 10.13089/JKIISC.2018. 28.1.249
DOI
|
7 |
NICE Webinar Series. (n.d.). How You can influence an updates to the NICE framework(Oline). https://www.nist.gov/system/files/documents/201 9/12/04/NICEFramework_Webinar_FINAL.pdf
|
8 |
Competency Model Clearinghouse. (n.d.). Cybersecurity Competency Model (Online). https://www.careeronestop.org/CompetencyModel/competency-models/pyramid-download.aspx?industry=cybersecurity
|
9 |
https://dodcio.defense.gov/Cyber-Workforce/DCWF.aspx
|
10 |
William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte. NICE Cybersecurity Workforce Framework. NIST SP 800-181.
|
11 |
S. Azadegan & M. O'Leary. (2016) An undergraduate Cyber Operations curriculum in the making: A 10+ year report. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI) (pp. 251-254). IEEE. DOI : 10.1109/ISI.2016.7745484
|
12 |
D. Yuan. (2017). Design and develop hands on cyber-security curriculum and laboratory. Computing Conference 2017 (pp. 1176-1179). IEEE. DOI : 10.1109/SAI.2017.8252239
|
13 |
A. Lodgher, J. Yang & U. Bulut. (2018). An Innovative Modular Approach of Teaching cybersecurityacross Computing Curricula. In 2018 IEEE Frontiers in Education Conference (FIE) (pp. 1-5). IEEE. DOI : 10.1109/FIE.2018.8659040
|
14 |
S. Naqvi, P. Sommer & M. Josephs. (2019). A Research-Led Practice-Driven Digital Forensic Curriculum to Train Next Generation of Cyber Firefighters. In 2019 IEEE Global Engineering Education Conference (EDUCON) (pp. 1204-1211). IEEE. DOI: 10.1109/EDUCON.2019.8725129
|
15 |
K. Kim, J. Smith, T. A. Yang & D. J. Kim, (2018). An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework. In 2018 National Cyber Summit (NCS) (pp. 1-7). IEEE.
|
16 |
N. Miloslavskaya & A. Tolstoy. (2016). State level views on professional competencies in the field of IoT and cloud information security. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 83-90). IEEE.
|