Skip Navigation

Cyber Defense Research & Publications

APUS experienced cyber defense faculty publish in academic journals as well as industry-respected blogs such as InHomelandSecurity and InCyberDefense. Our faculty are also  active speakers at industry conferences at the local, regional, national, and international levels. Visit our our faculty page for more contributions by individual faculty members.

Visit InCyberDefense to read original news contributions from our faculty as well as curated news from around the industry.

Visit InHomelandSecurity to read original news contributions from our faculty as well as curated news from around the industry.

Archives

Media Contributions

Peer-Reviewed Publications

Cybershaming: the shallowing hypothesis in action. Issues in Information Systems.
William Pendergrass with C. Payne and G. Buretz | 2016

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
In Proc. IEEE ISIT 2016, pages 2519-2523
Yongge Wang | 2016

Privacy-preserving data storage in cloud using array BP-XOR codes.
IEEE Transactions on Cloud Computing (TCC) 3(4):425--435
Yongge Wang | 2015

Analysis of cyberbullying victimization case studies in the context of the social-ecological theory.
A Social-Ecological Approach to Cyberbullying - Chapter 22
Hauppauge, NY: Nova Science Publishers, Inc. ISBN: 978-1-63483-755-2
William Pendergrass with Michelle Wright | 2015

Dealing with Information Security and Privacy
Encyclopedia of Information Science and Technology
Dennis Backherms with Kathleen Houlihan | 2015

#notallmen, #bringbackourgirls & #yesallwomen: three months of gender discussion in the age of Twitter.
Issues in Information Systems. 16(1), pp. 60-68
William Pendergrass | 2015

Cyberbullying: bullying gone digital.
Handbook on Bullying: Prevalence, Psychological Impacts and Intervention Strategies
Hauppauge, NY: Nova Science Publishers, Inc. Chapter 6, pp. 69-89. ISBN: 978-1-63463-040-5
William Pendergrass with Michelle Wright | 2014

A case study analysis of KnightSec and the Steubenville rape case.
2014 Proceedings of the Conference for Information Systems Applied Research, pp. 1-11
William Pendergrass with Michelle Wright | 2014

Cyberbullied to death: an analysis of victims taken from recent events.
Issues in Information Systems, 15(1), pp. 132-140
William Pendergrass with Michelle Wright | 2014

The yin and yang of 4chan’s nature. 
Encyclopedia of Information Science and Technology, Third Edition, IGI Global, Chapter 670, pp. 6810-6817. DOI: 10.4018/978-1-4666-5888-2.ch670
William Pendergrass  | 2014

The rise and fall of CabinCr3w: how simple mistakes doomed a hacking group.
Issues in Information Systems,14(1), pp. 27-36
William Pendergrass with R. Skovira | 2013

Using Biometrics to Secure Patient Health Information
Dennis Backherms | 2013

What is Anonymous? A Case Study Analysis of an Information Systems Hacker Activist Collective Movement.
Published Doctoral Dissertation - UMI Number: 3565206
William Pendergrass | 2013

Array BP-XOR codes for reliable cloud storage systems.
In Proc IEEE ISIT 2013, pages 326–330. IEEE Press
Yongge Wang | 2013

Efficient identity-based and authenticated key agreement protocol.
Transactions on Computational Science, 17:172–197
Yongge Wang | 2013

Woman and Crime: A Text Reader. Cyberstalking: An Exploratory Study of Students at a Mid-Atlantic University
Sage Publications Inc., ISBN: 9781412987509
Karan Paullet (with Rota, and Swan) | 2012

Faculty Presentations

A Comparative Analysis of Academic Dishonestly in Online Classes: An assessment of Student and Faculty Perceptions
Together with APUS faculty member Adnan A. Chawdhry, and David M. Douglas, and Jamie Pinchot
32nd Annual CCSC Eastern Regional Conference
Karen Paullet | Oct. 2016

Mobile Devices and the Internet of Things
2016 FISSEA 29th Annual Conference
Karen Paullet | March 2016

Media interview: Cybersecurity Alert: Employee Mobile Devices (BYOD) Make Your Company Vulnerable to Attacks
2016 FISSEA 29th Annual conference
Karen Paullet | March 2016

Cybershaming: the shallowing hypothesis in action.
International Association for Computer Information Systems Conference, Nashville, TN
William Pendergrass | Oct.  2016.

Creating an Incident Response Plan
Security BSides Conference, Wilmington Univ., New Castle, DE
Bryan Bechard | Oct. 2016

The Job of the CISO
Security BSides Conference, Wilmington Univ., New Castle, DE
Bryan Bechard | Oct. 2015

#NotAllMen, #BringBackOurGirls & #YesAllWomen: Three Months of Gender Discussion in the Age of Twitter
International Association for Computer Information Systems Conference, Clearwater Beach, FL
William Pendergrass | Oct. 2015

Opening the Digital Pandora’s Box: Mobile Device Security Awareness
2014 FISSEA Conference, Gaithersburg, MD
Karen Paullet | March 2014

Podcast: Mobile security issues, including digital forensics and the impact on identity fraud.
Panhandle Talk Radio WRNR AM740, Martinsburg WV
Karen Paullet | March 2014

A Case Study Analysis of KnightSec and the Steubenville Rape Case
Conference for Information Systems Applied Research in Baltimore, MD
William Pendergrass | Nov. 2014

Lost Anonymity in Hacker Identity: Case Study Analysis of How Law Enforcement Identified Three Hackers
American Fuel & Petrochemical Manufacturers Association’s 2014 Q & A and Technology Forum in Denver, CO
William Pendergrass | Oct. 2014

Cyberbullied To Death: An Analysis Of Victims Taken From Recent Events
International Association for Computer Information Systems Conference, Las Vegas, NV
William Pendergrass | Oct. 2014

Technological Challenges in the Littorals; Panel Discussion
Naval Postgraduate School Littoral Operations Center Inaugural Wargame Planning Session, Monterey, CA
William Pendergrass | March 2014.

Post-Secondary Education Network Security: Results of Addressing the End-User Challenge along with Reimers and Barretto
8th Annual International Technology, Education, and Development Conference in Valencia, Spain (INTED2014)
William Pendergrass |  March 2014

Common IA Issues
Doctoral Symposium Workshop at the Colorado Technical University
Stephen McCauley | April 2014

The Rise and Fall of CabinCr3w: How Simple Mistakes Doomed a Hacking Group
International Association for Computer Information Systems Conference, San Juan, PR
William Pendergrass | Oct. 2013

A White Hat Perspective on Cyber Security & Other Internet Issues Panel Discussion
Greater Washington DC Chapter of the Internet Society
William Pendergrass | Oct. 2012

Hackers Gone Wild: The 2011 Spring Break Of LulzSec
International Association for Computer Information Systems Conference, Myrtle Beach, SC
William Pendergrass | Oct. 2012