dc.contributor.author | Rashid, A | |
dc.contributor.author | Danezis, G | |
dc.contributor.author | Chivers, H | |
dc.contributor.author | Lupu, E | |
dc.contributor.author | Martin, A | |
dc.contributor.author | Lewis, M | |
dc.contributor.author | Peersman, C | |
dc.date.accessioned | 2020-03-24T01:07:05Z | |
dc.date.available | 2020-03-24T01:07:05Z | |
dc.date.issued | 2018 | |
dc.identifier.issn | 1540-7993 | |
dc.identifier.doi | 10.1109/MSP.2018.2701150 | |
dc.identifier.uri | http://hdl.handle.net/10072/392580 | |
dc.description.abstract | Cybersecurity is becoming an important element in curricula at all education levels. However, the foundational knowledge on which the field of cybersecurity is being developed is fragmented, and as a result, it can be difficult for both students and educators to map coherent paths of progression through the subject. The Cyber Security Body of Knowledge (CyBOK) project (www.cybok.org) aims to codify the foundational and generally recognized knowledge on cybersecurity. | |
dc.description.peerreviewed | Yes | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.ispartofpagefrom | 96 | |
dc.relation.ispartofpageto | 102 | |
dc.relation.ispartofissue | 3 | |
dc.relation.ispartofjournal | IEEE Security and Privacy | |
dc.relation.ispartofvolume | 16 | |
dc.subject.fieldofresearch | Software engineering | |
dc.subject.fieldofresearch | Cybersecurity and privacy | |
dc.subject.fieldofresearchcode | 4612 | |
dc.subject.fieldofresearchcode | 4604 | |
dc.title | Scoping the Cyber Security Body of Knowledge | |
dc.type | Journal article | |
dc.type.description | C1 - Articles | |
dcterms.bibliographicCitation | Rashid, A; Danezis, G; Chivers, H; Lupu, E; Martin, A; Lewis, M; Peersman, C, Scoping the Cyber Security Body of Knowledge, IEEE Security and Privacy, 2018, 16 (3), pp. 96-102 | |
dc.date.updated | 2020-03-24T01:04:47Z | |
dc.description.version | Accepted Manuscript (AM) | |
gro.rights.copyright | © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Martin, Andrew | |