

{"id":42,"date":"2020-08-19T16:19:20","date_gmt":"2020-08-19T20:19:20","guid":{"rendered":"https:\/\/sites.temple.edu\/rbleiman\/?page_id=42"},"modified":"2025-01-15T09:15:58","modified_gmt":"2025-01-15T14:15:58","slug":"publications","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/rbleiman\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<ol style=\"list-style-type:1\" class=\"wp-block-list\">\n<li><strong>Bleiman, R.<\/strong>, Park, H., Rege, A. (forthcoming). \u201cEducating students on the behavioral and psychological aspects of romance scam victimization via a social engineering competition\u201d. Journal of Cybersecurity Education Research and Practice (JCERP).<\/li>\n\n\n\n<li>Rege, A., <strong>Bleiman, R.<\/strong> (forthcoming). \u201cA Case Study of a Ransomware and Social Engineering Competition.\u201d Proceedings from the IEEE Cyber Science Conference.<\/li>\n\n\n\n<li>Rege, A., Spence, G., <strong>Bleiman, R.<\/strong>, Mitchell, S. &amp; Latko, J. (forthcoming). \u201cBridging the \u2018town and gown\u2019 divide: Experiential learning for students via a community cyberhygiene training program\u201d In 2024 IEEE Integrated STEM Education Conference (ISEC).<\/li>\n\n\n\n<li><strong>Bleiman, R.<\/strong> (2024). \u201cUnderstanding the United States Republicans\u2019 Susceptibility to Political Misinformation\u201d. Proceedings from the IEEE Cyber Science Conference.<\/li>\n\n\n\n<li>Rege, A., <strong>Bleiman, R.<\/strong>, Williams, K. (2024). \u201cThe Relevance of Social Engineering Competitions in Cybersecurity Education\u201d. Proceedings from the IEEE Cyber Science Conference.<\/li>\n\n\n\n<li>Rege, A., Williams, J., <strong>Bleiman, R.<\/strong> &amp; Williams, K. (2023). \u201cStudents\u2019 application of the MITRE ATT&amp;CK\u00ae framework via a real-time cybersecurity exercise\u201d. Proceedings from the 22nd European Conference on Cyber Warfare and Security<\/li>\n\n\n\n<li>Rege, A. &amp; <strong>Bleiman, R.<\/strong> (2022). \u201cA Free and Community-driven Critical Infrastructure Ransomware Dataset\u201d. Proceedings from the IEEE Cyber Science Conference.<\/li>\n\n\n\n<li><strong>Bleiman, R.<\/strong>, Williams, J., Rege, A. &amp; Williams, K. (2022). \u201cExploring the MITRE ATT&amp;CK\u00ae Matrix in SE Education\u201d. Proceedings from the IEEE Cyber Science Conference.<\/li>\n\n\n\n<li>Williams, K., <strong>Bleiman, R.<\/strong>, &amp; Rege, A. (2022). Educating educators on social engineering: Experiences developing and implementing a social engineering workshop for all education levels. Proceedings of the 12th IEEE Integrated STEM Education Conference (ISEC).<\/li>\n\n\n\n<li>Rege, A. &amp; <strong>Bleiman, R.<\/strong> (2022). Collegiate Social Engineering Capture the Flag Competition. Proceedings of the 2021 IEEE eCrime Researchers Summit. Winner of Best Student Paper Award.<\/li>\n\n\n\n<li><strong>Bleiman, R.<\/strong>, Ducoste, M., &amp; Rege, A. (2021). \u201cUnderstanding cybercriminals through analysis of penetration testing group dynamics\u201d. Proceedings form the IEEE Cyber Science Conference.<\/li>\n\n\n\n<li>Ducoste, M., <strong>Bleiman, R.<\/strong>, Nguyen, T., &amp; Rege, A. (2021). \u201cAn examination of industry standards of success within penetration testing groups\u201d. Proceedings form the 11th IEEE Integrated STEM Education Conference (ISEC).<\/li>\n\n\n\n<li>Rege, A. &amp; <strong>Bleiman, R.<\/strong> (2020). \u201cRansomware attacks against critical infrastructure\u201d. Proceedings of the 19th European Conference on Cyber Warfare and Security.<\/li>\n\n\n\n<li>Rege, A., Nguyen, T., &amp; <strong>Bleiman, R.<\/strong> (2020). \u201cA social engineering awareness and training workshop for STEM students and practitioners\u201d. Proceedings of the 10th IEEE Integrated STEM Education Conference.<\/li>\n\n\n\n<li><strong>Bleiman, R.<\/strong> &amp; Rege, A. (2020). \u201cAn Examination in Social Engineering: The Susceptibility of Disclosing Private Security Information in College Students\u201d. Proceedings of the 15th International Conference for Cyber Warfare and Security.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21994,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/users\/21994"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":6,"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":225,"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/pages\/42\/revisions\/225"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/rbleiman\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}