References
- Arreguin-Toft, I. (2001). How the weak win wars: A theory of asymmetric conflict. International security, Vol. 26, Issue 1, 93-128.
- Baker, M. (2013). State of cyber workforce development. Software Engineering Institute, Carnegie Mellon University.
- Bazzell, M. (2016). Open source intelligence techniques: resources for searching and analyzing online information. Create Space Independent Publishing Platform.
- Beggs, R. W. (2014). Mastering Kali Linux for advanced penetration testing. Packt Publishing Ltd.
- Bruneau, E., & Kteily, N. (2017). The enemy as animal: Symmetric dehumanization during asymmetric warfare. PloS one, Vol. 12, Issue 7.10.1371/journal.pone.0181422552898128746412
- Cheung, R. S., Cohen, J. P., Lo, H. Z., & Elia, F. (2011). Challenge based learning in cybersecurity education. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Las Vegas Nevada, USA: CSREA Press.
- Cielen, D., Meysman, A., & Ali, M. (2016). Introducing data science: big data, machine learning, and more, using Python tools. Shelter Island, NY: Manning Publications Co.
- Davey, J., & Armstrong, H. L. (2001). An Approach to Teaching Cyber Warfare Tools and Techniques. Journal of Information Warfare, Vol. 1, Issue 2, 87-94.
- Dawson, M., & Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8345-710.4018/978-1-4666-8345-7
- Dawson, M., Wang, P., & Williams, K. (2018). The role of cae-cde in cybersecurity education for workforce development. Information Technology-New Generations. Springer, Cham.10.1007/978-3-319-77028-4_20
- Gikas, C. (2010). A general comparison of fisma, hipaa, iso 27000 and pci-dss standards. Information Security Journal: A Global Perspective, Vol. 19, Issue 3, 132-141.
- Helms, C. P. (2015). The Digital GCC: USCYBERCOM as a Combatant Command. Air Command and Staff College Maxwell Air Force Base United States, Alabama, SUA.10.21236/AD1012758
- Hollis, D. M. (2010). USCYBERCOM: The need for a combatant command versus a subunified command. Washington Dc: National Defense University Press.
- Hu, J., Cordel, D., & Meinel, C. (2004). A Virtual Laboratory for IT Security Education. Proceedings of EMISA International Conference on Informationssysteme im E-Business und E-Government (EMISA), Vol. 56, 60-71.
- Kim, E., Wells Jr, W. G., & Duffey, M. R. (2003). A model for effective implementation of Earned Value Management methodology. International Journal of Project Management, Vol. 21, Issue 5, 375-382.
- Najera-Gutierrez, G., & Ansari, J. A. (2018). Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. Birmingham, UK: Packt Publishing Ltd.
- Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Special Publication, 800, 181.10.6028/NIST.SP.800-181
- Ranasinghe, N., Karunanayaka, K., Cheok, A. D., Fernando, O. N. N., Nii, H., & Gopalakrishnakone, P. (2011). Digital taste and smell communication. Proceedings of the 6th International Conference on Body Area Networks, 78-84, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).10.4108/icst.bodynets.2011.247067
- Schneider, F. B. (2013). Cybersecurity education in universities. IEEE Security & Privacy, Vol. 11, Issue 4, 3-4.
- Tzu, S. (2014). The art of war. Strategic Studies, 86-110, Routledge.
- U.S. Cybercom. (n.d.). Command History, available at: https://www.cybercom.mil/About/History/, accessed on 22 December 2019.
- Vijayan, J. (2009). Defense Secretary Gates approves creation of U.S. Cyber Command, available at: https://www.computerworld.com/article/2525896/defense-secretary-gates-approves-creation-of-u-s--cyber-command.html, accessed on 22 December 2019.
- Wang, M., Callaghan, V., Bernhardt, J., White, K., & Peña-Rios, A. (2018). Augmented reality in education and training: pedagogical approaches and illustrative case studies. Journal of Ambient Intelligence and Humanized Computing, Vol. 9, Issue 5, 1391-1402.
- Wang, P., Dawson, M., & Williams, K. L. (2019). Improving cyber defense education through national standard alignment: Case studies. National Security: Breakthroughs in Research and Practice, 78-91, IGI Global.
- Wong, E. (2005). Swift Road for US Citizen Soldiers Already Fighting in Iraq. New York Times.
