APUS experienced cyber defense faculty publish in academic journals as well as industry-respected blogs such as InHomelandSecurity and InCyberDefense. Our faculty are also active speakers at industry conferences at the local, regional, national, and international levels. Visit our our faculty page for more contributions by individual faculty members.
Visit InCyberDefense to read original news contributions from our faculty as well as curated news from around the industry.
Visit InHomelandSecurity to read original news contributions from our faculty as well as curated news from around the industry.
Archives
Media Contributions
- Will the end of net neutrality be a security nightmare? CSO Jan 29, 2018
- Rootkits: The “Stealth” Malware on Your Computers Kevin Harris | Oct. 2016
- Lock Down Your Login and Password for Better Online Security Bryan Bechard | Oct. 2016
- How to Create Safe Passwords Irena Kageorgis| Oct. 2016
- Cybersecurity Alert: Employee Mobile Devices (BYOD) Make Your Company Vulnerable to Attacks Susan Hoffman, APUS staff writer, with Dr. Karen Paullet | Mar. 2016
- AMU Students Conduct Maritime CyberSecurity Research for USCG Leischen Stelter, APUS staff writer | Mar. 2016
- AMU Students Prepare for Cyber Crisis Competition in D.C. Leischen Stelter, APUS staff writer | Mar. 2016
- Smartphones and Security Dr. James Marion | Nov. 2015
- RANSOMWARE-Held Hostage by Malware Mr. Peter Mylonakos | Nov. 2015
- Do Millennials Care About Privacy? Dr. Stephen McCauley | Nov. 2015
- The Issue with Privacy Dr. Stephen McCauley | Nov. 2015
- The Growing Trend of Medical Identity Theft Margaret Rutter Foltz | Nov. 2015
- What’s Your Personal Risk of Being Hacked? Dr. Ron L. Booth | Nov. 2015
- What Motivated Hackers to Act in 2015? Paul Gillespie | Nov. 2015
- Smartphones and Security Dr. James Marion | Nov. 2015
- Perceptions – and Misconceptions – of Cloud Security Jared Spencer | Nov. 2015
- Social Media is Not Your Friend Dr. Alissa Johnson | Oct. 2015
- Common Flaws with Common Courtesy Securing IT Assets Elliott S. Lynn, PhD | Oct. 2015
- The Time Is Now for Cybersecurity Awareness Training Kevin Harris | Oct. 2015
- Cybersecurity Then and Now: Perspectives from DHS Cyber Trailblazer John Felker Susan Hoffman, APUS staff writer | Oct. 2015
- Is Your Mobile Device Exposed To A Cyber-Attack? Dr. Jacqueline Gutierrez | Oct. 2015
- Transmission Complete? Addressing the Challenges in Healthcare Tech Dr. Yongge Wang | Oct. 2015
- Is Your Mobile Device Exposed To A Cyber-Attack Dr. Jacqueline Gutierrez | Oct. 2015
- Cybersecurity Challenges for Manned and Unmanned Systems Dr. Cortney L. Bolden | Oct. 2015
- Cybersecurity and New Best Practices for the Consumer Bryan Bell | Oct. 2015
- Cybersecurity Risk Management Strategy for the Consumer Paul Gillespie | Oct. 2015
- Protect the Organization from Cyberattacks: Security Through Active Prevention (STAP) Brett Miller | Oct. 2015
- 16 Safety Tips for National Cyber Security Awareness Month Dr. Karen Paullet | Oct. 2015
- Cybersecurity Workforce Education Kenneth Desforges | Oct. 2015
- The ‘Smart’ Credit Card Is Chipping Away at Fraud Dr. Christina Steele | Oct. 2015
- Why Environmental Risk Managers Need to Worry About Cybersecurity Dr. Phyllis J. Langone | Oct. 2015
- Video: National Cyber Security Awareness Month Glynn Cosker, staff writer | Sept. 2015
- Minimize Your Exposure to Hackers: Steps to Protect Your Mobile Device Brett Miller | Aug. 2015
- Cybersecurity Trends: Part 2 Dr. Kelli Frakes | July 2015
- Education and Training for Cybersecurity Daniel Benjamin | June 2015
- Cybersecurity Trends for 2015 Glynn Cosker | Apr. 2015
- The Relevance of Maritime Cybersecurity Dr. Mark Riccardi | Mar. 2015
- Brave New World: The Future of Cyberspace & Cybersecurity Dr. James Burch | Mar. 2015
- Cybersecurity Hits Hollywood: What Have We Learned? James Thompson | Dec. 2014
- Keeping Mobile Devices Secure in the Age of Malware Dr. Karen Paullet | Nov. 2014
- Cybersecurity Education and Technology: An Expert’s View Dr. Clay Wilson | Nov. 2014
- Protecting Yourself Online: Are You Being Careful? Dr. Adnan A. Chawdhry | Oct. 2014
- Clearing Up Misperceptions on Electromagnetic Pulse Implications Dr. Clay Wilson | Oct. 2014
- Cyber Privacy Forecast: Stormy Weather Ahead Margaret Rutter Foltz | Oct. 2014
- Data Breaches: How Vulnerable Are We in the Mobile World? Dennis Backherms | Oct. 2014
- 3 Tips for Researching Degrees like Cybersecurity James Thompson | Aug. 2014
- Five Steps Leaders Must Take to Prepare for a Cyber-Attack Lincoln Kaffenberger | Feb. 2014
- Cyber Security: The Insider Threat Joe Campos | Jan. 2014
- The Rise of Cybercrime Means Endless Career Opportunities for Security Experts Derrick Thomas | Mar. 2013
Peer-Reviewed Publications
Cybershaming: the shallowing hypothesis in action. Issues in Information Systems.
William Pendergrass with C. Payne and G. Buretz | 2016
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
In Proc. IEEE ISIT 2016, pages 2519-2523
Yongge Wang | 2016
Privacy-preserving data storage in cloud using array BP-XOR codes.
IEEE Transactions on Cloud Computing (TCC) 3(4):425--435
Yongge Wang | 2015
Analysis of cyberbullying victimization case studies in the context of the social-ecological theory.
A Social-Ecological Approach to Cyberbullying - Chapter 22
Hauppauge, NY: Nova Science Publishers, Inc. ISBN: 978-1-63483-755-2
William Pendergrass with Michelle Wright | 2015
Dealing with Information Security and Privacy
Encyclopedia of Information Science and Technology
Dennis Backherms with Kathleen Houlihan | 2015
#notallmen, #bringbackourgirls & #yesallwomen: three months of gender discussion in the age of Twitter.
Issues in Information Systems. 16(1), pp. 60-68
William Pendergrass | 2015
Cyberbullying: bullying gone digital.
Handbook on Bullying: Prevalence, Psychological Impacts and Intervention Strategies
Hauppauge, NY: Nova Science Publishers, Inc. Chapter 6, pp. 69-89. ISBN: 978-1-63463-040-5
William Pendergrass with Michelle Wright | 2014
A case study analysis of KnightSec and the Steubenville rape case.
2014 Proceedings of the Conference for Information Systems Applied Research, pp. 1-11
William Pendergrass with Michelle Wright | 2014
Cyberbullied to death: an analysis of victims taken from recent events.
Issues in Information Systems, 15(1), pp. 132-140
William Pendergrass with Michelle Wright | 2014
The yin and yang of 4chan’s nature.
Encyclopedia of Information Science and Technology, Third Edition, IGI Global, Chapter 670, pp. 6810-6817. DOI: 10.4018/978-1-4666-5888-2.ch670
William Pendergrass | 2014
The rise and fall of CabinCr3w: how simple mistakes doomed a hacking group.
Issues in Information Systems,14(1), pp. 27-36
William Pendergrass with R. Skovira | 2013
Using Biometrics to Secure Patient Health Information
Dennis Backherms | 2013
What is Anonymous? A Case Study Analysis of an Information Systems Hacker Activist Collective Movement.
Published Doctoral Dissertation - UMI Number: 3565206
William Pendergrass | 2013
Array BP-XOR codes for reliable cloud storage systems.
In Proc IEEE ISIT 2013, pages 326–330. IEEE Press
Yongge Wang | 2013
Efficient identity-based and authenticated key agreement protocol.
Transactions on Computational Science, 17:172–197
Yongge Wang | 2013
Woman and Crime: A Text Reader. Cyberstalking: An Exploratory Study of Students at a Mid-Atlantic University
Sage Publications Inc., ISBN: 9781412987509
Karan Paullet (with Rota, and Swan) | 2012
Faculty Presentations
A Comparative Analysis of Academic Dishonestly in Online Classes: An assessment of Student and Faculty Perceptions
Together with APUS faculty member Adnan A. Chawdhry, and David M. Douglas, and Jamie Pinchot
32nd Annual CCSC Eastern Regional Conference
Karen Paullet | Oct. 2016
Mobile Devices and the Internet of Things
2016 FISSEA 29th Annual Conference
Karen Paullet | March 2016
Media interview: Cybersecurity Alert: Employee Mobile Devices (BYOD) Make Your Company Vulnerable to Attacks
2016 FISSEA 29th Annual conference
Karen Paullet | March 2016
Cybershaming: the shallowing hypothesis in action.
International Association for Computer Information Systems Conference, Nashville, TN
William Pendergrass | Oct. 2016.
Creating an Incident Response Plan
Security BSides Conference, Wilmington Univ., New Castle, DE
Bryan Bechard | Oct. 2016
The Job of the CISO
Security BSides Conference, Wilmington Univ., New Castle, DE
Bryan Bechard | Oct. 2015
#NotAllMen, #BringBackOurGirls & #YesAllWomen: Three Months of Gender Discussion in the Age of Twitter
International Association for Computer Information Systems Conference, Clearwater Beach, FL
William Pendergrass | Oct. 2015
Opening the Digital Pandora’s Box: Mobile Device Security Awareness
2014 FISSEA Conference, Gaithersburg, MD
Karen Paullet | March 2014
Podcast: Mobile security issues, including digital forensics and the impact on identity fraud.
Panhandle Talk Radio WRNR AM740, Martinsburg WV
Karen Paullet | March 2014
A Case Study Analysis of KnightSec and the Steubenville Rape Case
Conference for Information Systems Applied Research in Baltimore, MD
William Pendergrass | Nov. 2014
Lost Anonymity in Hacker Identity: Case Study Analysis of How Law Enforcement Identified Three Hackers
American Fuel & Petrochemical Manufacturers Association’s 2014 Q & A and Technology Forum in Denver, CO
William Pendergrass | Oct. 2014
Cyberbullied To Death: An Analysis Of Victims Taken From Recent Events
International Association for Computer Information Systems Conference, Las Vegas, NV
William Pendergrass | Oct. 2014
Technological Challenges in the Littorals; Panel Discussion
Naval Postgraduate School Littoral Operations Center Inaugural Wargame Planning Session, Monterey, CA
William Pendergrass | March 2014.
Post-Secondary Education Network Security: Results of Addressing the End-User Challenge along with Reimers and Barretto
8th Annual International Technology, Education, and Development Conference in Valencia, Spain (INTED2014)
William Pendergrass | March 2014
Common IA Issues
Doctoral Symposium Workshop at the Colorado Technical University
Stephen McCauley | April 2014
The Rise and Fall of CabinCr3w: How Simple Mistakes Doomed a Hacking Group
International Association for Computer Information Systems Conference, San Juan, PR
William Pendergrass | Oct. 2013
A White Hat Perspective on Cyber Security & Other Internet Issues Panel Discussion
Greater Washington DC Chapter of the Internet Society
William Pendergrass | Oct. 2012
Hackers Gone Wild: The 2011 Spring Break Of LulzSec
International Association for Computer Information Systems Conference, Myrtle Beach, SC
William Pendergrass | Oct. 2012