• Publications
  • Influence
Experiential User-Centered Security in a Classroom: Secure Design for IoT
Convenience often trumps concerns about security in our everyday use of Internet of Things products. Cybersecurity professionals are usually expected to anticipate and eliminate these concerns asExpand
  • 2
  • 1
Rules of professional responsibility in digital forensics: A comparative analysis
  • Filipo Sharevski
  • Computer Science, Political Science
  • J. Digit. Forensics Secur. Law
  • 30 June 2015
The Committee on Identifying the Needs of Forensic Sciences Community (2009) accentuates the establishment of a uniform code of ethics emphasizing the importance of enforceability in strengtheningExpand
  • 6
  • 1
Novel approach for cybersecurity workforce development: A course in secure design
Training the future cybersecurity workforce to respond to emerging threats requires introduction of novel educational interventions into the cybersecurity curriculum. To be effective, theseExpand
  • 6
Digital forensic investigation in cloud computing environment: Impact on privacy
  • Filipo Sharevski
  • Computer Science, Engineering
  • 8th International Workshop on Systematic…
  • 1 November 2013
Cloud computing as an extensive IT service delivery platform is one of the most promising technologies for rapid business development and operational efficiency improvement. Unfortunately, many ofExpand
  • 7
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
For two days in February 2018, 17 cybersecurity educators and professionals from government and industry met in a "hackathon" to refine existing draft multiple-choice test items, and to create newExpand
  • 2
Leveraging Cellular Intemet-of-Things for Resilient and Robust Disaster Management
  • Filipo Sharevski
  • Computer Science
  • IEEE Global Communications Conference (GLOBECOM)
  • 1 December 2018
To improve operational efficiency, disaster management missions increasingly employ smart and interconnected devices. Autonomous robots are used for remote access, drones for impact zone surveys, andExpand
  • 1
Towards 5G cellular network forensics
The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, theExpand
  • 3
To tweet or not to tweet: covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions
Trolling and social bots have been proven as powerful tactics for manipulating the public opinion and sowing discord among Twitter users. This effort requires substantial content fabrication andExpand
  • 2
Beyond Trolling: Malware-Induced Misperception Attacks on Polarized Facebook Discourse
Social media trolling is a powerful tactic to manipulate public opinion on issues with a high moral component. Troll farms, as evidenced in the past, created fabricated content to provoke or silenceExpand
  • 1
Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering
In this paper we argue, drawing from the perspectives of cybersecurity and social psychology, that Internet-based manipulation of an individual or group reality using ambient tactical deception isExpand
  • 1