Steven Fulton

Orcid: 0000-0001-6962-8558

According to our database1, Steven Fulton authored at least 16 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Improving Wireless Security Research: Cost-Effective Detection of Wireless Charging Vulnerabilities.
Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025

2024
A Blockchain Architecture to Increase the Resilience of Industrial Control Systems from the Effects of a Ransomware Attack: A Proposal and Initial Results.
ACM Trans. Cyber Phys. Syst., January, 2024

Multi-Shield Cyber Security Visualization - a tool to enhance cybersecurity design and analysis.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack.
Proceedings of the Human Aspects of Information Security and Assurance, 2024

2023
Like a Bee to a Honeypot: A Bug Bounty Capstone Project.
J. Comput. Sci. Coll., 2023

2022
Introducing Software Development Process, Software Engineering, and Artificial Intelligence in a CS0.5 Course Project.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

2021
A Layered Model for Building Cyber Defense Training Capacity.
Proceedings of the Information Security Education for Cyber Resilience, 2021

2019
A Short-Cycle Framework Approach to Integrating Psychometric Feedback and Data Analytics to Rapid Cyber Defense.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Collaborative Training and Response Communities - An Alternative to Traditional Cyber Defense Escalation.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2017
Evaluating a Multi Agency Cyber Security Training Program Using Pre-post Event Assessment and Longitudinal Analysis.
Proceedings of the Information Security Education for a Global Digital Society, 2017

2012
Defining and exposing privacy issues with social media.
J. Comput. Sci. Coll., 2012

Braingame: a web-based student response system.
J. Comput. Sci. Coll., 2012

What are we teaching in cyber competitions?
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
Demonstrating the impact of multitasking in the classroom.
Proceedings of the 2011 Frontiers in Education Conference, 2011

2010
Network firewall visualization in the classroom.
J. Comput. Sci. Coll., 2010

The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition.
J. Comput. Sci. Coll., 2010


  Loading...