A survey of botnet detection techniques by command and control infrastructure TS Hyslip, JM Pittman Journal of Digital Forensics, Security and Law 10 (1), 2, 2015 | 43 | 2015 |
An observational study of peer learning for high school students at a cybersecurity camp JM Pittman, R Pike Information Systems Education Journal 14 (3), 4, 2016 | 18 | 2016 |
Machine Learning and Port Scans: A Systematic Review JM Pittman arxiv preprint arXiv:2301.13581, 2023 | 11 | 2023 |
A cyber science based ontology for artificial general intelligence containment JM Pittman, C Crosby arXiv preprint arXiv:1801.09317, 2018 | 9 | 2018 |
Cloud-based Versus Local-based Web Development R Pike, JM Pittman, D Hwang Information Systems Education Journal 15 (4), 52, 2017 | 9 | 2017 |
How Early is Early Enough: Correlating Student Performance with Final Grades. L Williams, KJ Titus, JM Pittman Proceedings of the 5th Conference on Computing Education Practice, 13-16, 2021 | 8 | 2021 |
Shades of perception-user factors in identifying password strength JM Pittman, N Robinson arXiv preprint arXiv:2001.04930, 2020 | 8 | 2020 |
Understanding system utilization as a limitation associated with cybersecurity laboratories–A literature analysis J Pittman Journal of Information Technology Education. Research 12, 363, 2013 | 8 | 2013 |
Towards a model for zero trust data JM Pittman, S Alaee, C Crosby, T Honey, GM Schaefer American Journal of Science & Engineering 3 (1), 18-24, 2022 | 7 | 2022 |
A taxonomy for dynamic honeypot measures of effectiveness JM Pittman, K Hoffpauir, N Markle, C Meadows arXiv preprint arXiv:2005.12969, 2020 | 7 | 2020 |
The cybersecurity competition federation D Manson, P Pusey, MJ Hufe, J Jones, D Likarish, J Pittman, D Tobey Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015 | 7 | 2015 |
B2ci 2019: The ieee brain to computer interface competition’s gaming event JM McQuighan, G Bajwa, JM Pittman 2019 IEEE Conference on Games (CoG), 1-7, 2019 | 6 | 2019 |
Stovepiping and Malicious Software: A Critical Review of AGI Containment JM Pittman, JP Espinoza, C Crosby arXiv preprint arXiv:1811.03653, 2018 | 5 | 2018 |
Does competitor grade level influence perception of cybersecurity competition design gender inclusiveness? JM Pittman Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015 | 5 | 2015 |
Primer--A Tool for Testing Honeypot Measures of Effectiveness JM Pittman, K Hoffpauir, N Markle arXiv preprint arXiv:2011.00582, 2020 | 4 | 2020 |
A Green Scheduling Algorithm for Cloud-based Honeynets J Pittman, S Alaee Frontiers in Sustainability 3 (1048606), 2023 | 3 | 2023 |
Do Users Correctly Identify Password Strength? J Pittman, N Robinson Journal of The Colloquium for Information Systems Security Education 8 (1), 6-6, 2020 | 3 | 2020 |
Curating Research Data-Cyber security perspective from a nascent Brain Machine Interface Laboratory JM Pittman, G Bajwa, J Joseph, N Keller 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2018 | 3 | 2018 |
A Comparative Analysis of Port Scanning Tool Efficacy JM Pittman arXiv preprint arXiv:2303.11282, 2023 | 2 | 2023 |
Machine Learning Classifiers in Honeynets - A Critical Review B Baker, K Quinn, JM Pittman International Research Journal of Engineering and Technology (IRJET) 7 (5 …, 2020 | 2 | 2020 |