On the origins and variations of blockchain technologies AT Sherman, F Javani, H Zhang, E Golaszewski IEEE Security & Privacy 17 (1), 72-77, 2019 | 178 | 2019 |
Creating a cybersecurity concept inventory: A status report on the CATS project AT Sherman, L Oliva, D DeLatte, E Golaszewski, M Neary, K Patsourakos, ... arXiv preprint arXiv:1706.05092, 2017 | 18 | 2017 |
Formal methods analysis of the secure remote password protocol AT Sherman, E Lanus, M Liskov, E Zieglar, R Chang, E Golaszewski, ... Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the …, 2020 | 16 | 2020 |
Project-based learning inspires cybersecurity students: A scholarship-for-service research study AT Sherman, PAH Peterson, E Golaszewski, E LaFemina, E Goldschen, ... IEEE Security & Privacy 17 (3), 82-88, 2019 | 14 | 2019 |
Experiences and lessons learned creating and validating concept inventories for cybersecurity AT Sherman, GL Herman, L Oliva, PAH Peterson, E Golaszewski, ... National Cyber Summit, 3-34, 2020 | 13 | 2020 |
Investigating crowdsourcing to generate distractors for multiple-choice assessments T Scheponik, E Golaszewski, G Herman, S Offenberger, L Oliva, ... National Cyber Summit (NCS) Research Track, 185-201, 2020 | 12 | 2020 |
The CATS hackathon: Creating and refining test items for cybersecurity concept inventories AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ... IEEE Security & Privacy 17 (6), 77-83, 2019 | 12 | 2019 |
Initial validation of the cybersecurity concept inventory: pilot testing and expert review S Offenberger, GL Herman, P Peterson, AT Sherman, E Golaszewski, ... 2019 IEEE Frontiers in Education Conference (FIE), 1-9, 2019 | 12 | 2019 |
Psychometric evaluation of the cybersecurity concept inventory S Poulsen, GL Herman, PAH Peterson, E Golaszewski, A Gorti, L Oliva, ... ACM Transactions on Computing Education (TOCE) 22 (1), 1-18, 2021 | 10 | 2021 |
Shadow IT in higher education: survey and case study for cybersecurity SG Orr, CJ Bonyadi, E Golaszewski, AT Sherman, PAH Peterson, R Forno, ... Cryptologia 48 (1), 26-90, 2024 | 5* | 2024 |
Project-based learning continues to inspire cybersecurity students: the 2018--2019 SFS research studies at UMBC E Golaszewski, AT Sherman, L Oliva, PAH Peterson, MR Bailey, S Bohon, ... ACM inroads 11 (2), 46-54, 2020 | 5 | 2020 |
The SFS summer research study at UMBC: Project-Based learning inspires cybersecurity students A Sherman, E Golaszewski, E LaFemina, E Goldschen, M Khan, L Mundy, ... Cryptologia 43 (4), 293-312, 2019 | 5 | 2019 |
Psychometric evaluation of the cybersecurity curriculum assessment GL Herman, S Huang, PA Peterson, L Oliva, E Golaszewski, AT Sherman Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023 | 4 | 2023 |
Automatically Binding Cryptographic Context to Messages in Network Using Formal Methods E Golaszewski University of Maryland, Baltimore County, 2024 | | 2024 |
Psychometric Evaluation of the Cybersecurity Concept Inventorym S Poulson, G Herman, P Peterson, L Oliva, E Golaszewski, A Gorti, ... The ACM transactions on computing education, 2021 | | 2021 |
Analysis of the Secure Remote Password protocol using CPSA E Lanus, AT Sherman, R Chang, E Golaszewski, R Wnuk-Fink, C Bonyadi, ... High Confidence Software and Systems Conference (HCSS), 2020 | | 2020 |
Learning Continues to Inspire Cybersecurity Students: The 2018-2019 SFS Research Studies at UMBC E Golaszewski, AT Sherman, L Oliva, PAH Peterson, MR Bailey, S Bohon, ... | | 2020 |
Cybersecurity in the Era of Data Science: Examining New Adversarial Models AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ... IEEE SECURITY & PRIVACY 17 (6), 77-83, 2019 | | 2019 |
Preventing Return Oriented Programming Attacks By Preventing Return Instruction Pointer Overwrites N Allgood, E Golaszewski, B Smith, A Spizler | | |