Welcome to the Kean University Center for Cybersecurity content repository. The “Center” focuses on providing cyber defense and cybersecurity-related information, resources, and academic programs for students, staff, faculty, and the regional and extended global community. Kean University has been designated as a National Center of Academic Excellence in Cyber Defense Education (CAE-CD) by the National Security Agency. This credential and designation recognize and provides acknowledgment that Kean University is contributing towards successfully training and educating the future workforce for positions in the high-demand cybersecurity field. The “Center” exists under the direction of pursuing a collaborative methodology, emphasizing a multidisciplinary approach to cybersecurity and cybercrime education. This integrative approach, structure, and strategy recognize the benefits gained by providing cybersecurity education in both technical and non-technical fields. This collaboration includes true cybersecurity program integration, uniquely including both policy and technical education, between the Kean University School of Computer Science and Technology and the School of Criminal Justice and Public Administration, and the Office of Computer and Information Services (OCIS).

Follow

Submissions from 2024

PDF

Alice in Cyberspace 2024, Stanley Mierzwa

PDF

Life During Wartime: Proactive Cybersecurity is a Humanitarian Imperative, Stanley Mierzwa and Diane Rubino

Submissions from 2023

PDF

Pre-College Students STEaM to Future Career Success at Kean, Cybersecurity Center for

PDF

Poster Research Days: Preliminary Researching the Potential Cybersecurity Threats by Using Virtual Reality Headsets, Rashaad Couloote

PDF

Run Toward the Incident: Collaboration between Academia and Law Enforcement for Cybersecurity, Center for Cybersecurity and Stanley Mierzwa

PDF

Research Days Poster: An Analysis of SQL Injection Techniques, Uko Ebreso, Pankati Patel, and Jing-Chiou Liou

PDF

Research Days Poster: Cyber Threats on the Manufacturing Sector, Afifa Ghouse

Link

Current Cybersecurity Challenges of Applying Blockchain in Healthcare, Jing Chiou Liou and Nahla F AL Hamad

PDF

A Study of Issues and Mitigations on DDoS and Medical IoT Devices, Jing-Chiou Liou and Robin Singh

PDF

Practical Approaches and Guidance to Small Business Organization Cyber Risk and Threat Assessments, Stanley Mierzwa and Aneta Klepacka

PDF

Research Days Poster: Security Operation Center, Jaineel A. Shah and Jing-Chiou Liou

PDF

Research Days Poster: A Study on Ransomware and Possible Mitigations, Robin Singh and Jing-Chiou Liou

PDF

Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence and Machine Learning, Annaliese Watson, Aysha Gardner, and Dahana Moz Ruiz

Submissions from 2022

PDF

An Overview of the Potential for Blockchain Technology to Improve Cybersecurity, Stanley Mierzwa

PDF

Kean University Students Preparing for Cybersecurity Certification Exams in Free Summer Program, Stanley Mierzwa

Link

NATIONAL CENTERS OF ACADEMIC EXCELLENCE IN CYBERSECURITY, Stanley Mierzwa

Link

See Yourself in Cybersecurity: How an expert is encouraging all students and practitioners to explore the field (and our Catalog), Stanley Mierzwa

PDF

Ransomware Incident Preparations With Ethical Considerations and Command System Framework Proposal, Stanley Mierzwa, James Drylie, and Dennis Bogdan

Link

Securing the Nation’s Critical Infrastructures A Guide for the 2021-2025 Administration, Stanley Mierzwa and Lauren Spath

PDF

Cybersecurity Best Practices for the Manufacturing Industry, David Ortiz and Stanley Mierzwa

Submissions from 2021

PDF

Cybersecurity Considerations with the Increasing Uses of Small Unmanned Aircraft Systems (sUAS) or Drones, Matthew Kucharek and Stanley Mierzwa

PDF

Creation of a customized college student cybersecurity awareness online learning solution, Stanley Mierzwa, Iassen Christov, and Bruno Lima

Link

Commentary or Perspective: Opportunities to Leverage the Use of Global Public Health Innovative Research Technology in Combatting Cybercrime, Stanley Mierzwa, Lauren Spath, and Iassen Christov

Submissions from 2020

Link

Systems and methods for authenticating devices using single factor dynamic authentication, Jing-Chiou Liou

Link

A Survey on the Effectiveness of the Secure Software Development Life Cycle Models, Jing-Chiou Liou and Saniora R. Duclervil