The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "InfoSecCD"( http://dblp.L3S.de/Venues/InfoSecCD )

URL (DBLP): http://dblp.uni-trier.de/db/conf/infoseccd

Publication years (Num. hits)
2006 (40) 2007 (33) 2010 (31) 2011 (17) 2012-2013 (33) 2014 (18) 2015 (18)
Publication types (Num. hits)
inproceedings(182) proceedings(8)
Venues (Conferences, Journals, ...)
InfoSecCD(190)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 120 occurrences of 88 keywords

Results
Found 190 publication records. Showing 190 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Pedro Laboy Litigation support: complying with the law when handling electronic information during legal proceedings. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianhua Yang, Yien Wang Denial of service hands-on lab for information assurance education: a case study. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Imano Williams, Xiaohong Yuan Evaluating the effectiveness of Microsoft threat modeling tool. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jimmy Vuong Disaster recovery planning. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryan Wilson Creation of a bootable Kali Linux USB drive with persistent storage. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1N. Paul Schembari From student research to intrusion detection. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Asif Iqbal 0003, Hanan Al Obaidli, Mário Guimarães, Oliver Popov Sandboxing: aid in digital forensic research. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Crystal Williams, Hongmei Chi An investigation of privacy protocols in location-based service. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hongmei Chi Integrate mobile devices into CS security education. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lindsay Simpkins, Xiaohong Yuan, Jwalit Modi, Justin Zhan, Li Yang 0001 A course module on web tracking and privacy. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Svetlana Peltsverger A survey of university system of Georgia cyber security programs. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lee Epling, Brandon Hinkel, Yi Hu Penetration testing in a box. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Deborah L. Cooper Data security: data breaches. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Herbert J. Mattord Ongoing threats to information protection. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Neil Light Encryption and privacy in the business environment. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Humayun Zafar (eds.) Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015 Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  BibTeX  RDF
1Julio C. Rivera, Paul Michael Di Gangi, Allen C. Johnston, James L. Worrell Undergraduate student perceptions of personal social media risk. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sherly Abraham, Lifang Shih Towards an integrative learning approach in cybersecurity education. Search on Bibsonomy InfoSecCD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hongmei Chi, David Angulo Rubio Design insider threat hands-on labs. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jianhua Yang, Thomas Reddington Enhance learning through developing network security hands-on lab for online students. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar Teaching privacy in an interactive fashion. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ming Yang 0019, Becky Rutherfoord, Kai Qian Learning cloud computing and security through CloudSim simulation. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Uchita Shah Important of security governance, its dependence on other forms of governance, and its diverse application among industries. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kelly Moyle Importance of governance with human resources information systems. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mauri Martin, Wasim A. Al-Hamdani Secure key management in cloud computing. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1H. Scott Dunn FERPA compliance in higher education. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guillermo A. Francia III, Jay Snellen III Laboratory projects for embedded and control systems security. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Humayun Zafar (eds.) Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014 Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  BibTeX  RDF
1Nazia Badar, Jaideep Vaidya, Vijay Atluri More data, more security challenges: integrating analytics in to the information security curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carlo Labudiong, Wasim A. Al-Hamdani Network risk assessment base on multi-core processor architecture. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frank H. Katz A comparison of different methods of instruction in cryptography. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Randall Craig Reid, Sherwood Lane Lambert Using contingency planning model to mitigate the impact of the inevitable disaster at the class level. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1James M. Anderson VoIP security governance in small/medium organizations. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lindsay Simpkins, Xiaohong Yuan, Jung Hee Kim A course module on clickjacking. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang 0001 A course module on mobile malware. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bryson R. Payne, Aaron R. Walker Motivating secure coding practices in a freshman-level programming course. Search on Bibsonomy InfoSecCD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Denise Pheils Applying a Community Project Approach to IT and Security Courses. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Todd R. Andel, Jeffrey Todd McDonald A Systems Approach to Cyber Assurance Education. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Duane Hunt, Wasim A. Al-Hamdani Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jim Hoag Evolution of a Cybersecurity curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongmei Chi, Edward L. Jones, John Brown Teaching Secure Coding Practices to STEM Students. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jane LeClair, Sherly Abraham, Lifang Shih An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nada Encisco Incident Response Planning for a Fortune-500 Consumer Products Manufacturer. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Humayun Zafar (eds.) Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013 Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dipankar Dasgupta, Denise M. Ferebee, Zbigniew Michalewicz Applying Puzzle-Based Learning to Cyber-Security Education. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Frank H. Katz Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Crowe, Wasim A. Al-Hamdani Google Privacy: Something for Nothing? Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1N. Paul Schembari, Mike Jochen The Assessment of Learning Outcomes in Information Assurance Curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Adam Tilley The Role of the User in Social Media Incident Response. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jaideep Vaidya, Basit Shafiq, David Lorenzi, Nazia Badar Incorporating Privacy into the Undergraduate Curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joseph Stites, Ambareen Siraj, Eric L. Brown Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Svetlana Peltsverger, Guangzhi Zheng A Virtual Environment for Teaching Technical Aspects of Privacy. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mark Brown, Jeff Crawford, Steven Nordstrom, Fred Scholl, Fortune S. Mhlanga Understanding the Presence of Experiential Learning Opportunity Programs in the Information Security Field. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Asif Iqbal 0003, Hanan Al Obaidli, Huwida Said, Mário A. M. Guimarães The Study of the Interrelation between Law Programs and Digital Forensics in UAE Academia. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Diane R. Murphy, Richard H. Murphy Teaching Cybersecurity: Protecting the Business Environment. Search on Bibsonomy InfoSecCD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu 0001, Bao Tri-Tran A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs). Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar K. Sethi, Ye Zhu 0001, Supeng Leng Attacks and countermeasures in wireless cellular networks. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1George P. Corser A tale of two CTs: IP packets rejected by a firewall. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Evan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, Richard S. Weiss Hands-on denial of service lab exercises using SlowLoris and RUDY. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Frank H. Katz The creation of a minor in cyber security: the sequel. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Crowe, Wasim A. Al-Hamdani Lightening in a bottle: usable and secure. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rebecca LeFebvre The human element in cyber security: a study on student motivation to act. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jeffrey A. Livermore Forming a student information assurance club. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Simmons, Hongmei Chi Designing and implementing cloud-based digital forensics hands-on labs. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1George P. Corser Professional association membership of computer and information security professionals. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Crowe, Wasim A. Al-Hamdani System evaluation lifecycle: chasing windmills. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kirk Inman, Humayun Zafar IR, DR and BC with wireless mesh networks. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Humayun Zafar (eds.) Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012 Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  BibTeX  RDF
1Adam Howard, Yi Hu An approach for detecting malicious keyloggers. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Durga Vemuri, Wasim A. Al-Hamdani Measures to improve security in a microkernel operating system. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Humayun Zafar (eds.) Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011 Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  BibTeX  RDF
1Andrew Rudeseal Contingency planning management for small to medium digital media producers. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Myung Ah Park Embedding security into visual programming courses. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christopher Woodward, Wasim A. Al-Hamdani PKI and access control in office environments. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mary DeVito, Christine Hofmeister, Michael Jochen, N. Paul Schembari Undergraduate research in computer forensics. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1John C. Roberts II, Wasim A. Al-Hamdani Who can you trust in the cloud?: a review of security issues within cloud computing. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Larry Holt Increasing real-world security of user IDs and passwords. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Charles Yates, Lydia Ray, Jianhua Yang An investigation into iPod Touch generation 2. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Le Garen D. Toomer FISMA compliance and cloud computing. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Charles E. Frank, Laurie Werner The value of the CISSP certification for educators and professionals. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Svetlana Peltsverger Maintaining balance between theory and practice in information security courses. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zouheir Trabelsi Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wasim A. Al-Hamdani Elliptic curve for data protection. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rand A. Mahmood, Wasim A. Al-Hamdani Is RFID technology secure and private? Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guillermo A. Francia III Critical infrastructure security curriculum modules. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jeffrey A. Livermore, Kathryn Baker, Virginia Krolczyk, Ann Saurbier Capstone, thesis, or practicum?: the state of the practice in IA education. Search on Bibsonomy InfoSecCD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jeffrey A. Livermore Designing a graduate Capstone course for an online information assurance program. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ben Halpert Preschool information assurance curriculum development. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Richard M. Schneider A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bennett Setzer A cryptographic programming assignment. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wasim A. Al-Hamdani Cryptography based access control in healthcare web systems. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wyatt Sweat Integration questions: considerations that should be made when designing the specification of a software-based integration. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vladan M. Jovanovic, Timur Mirzoev Teaching storage infrastructure management and security. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christy Chatmon, Hongmei Chi, Will Davis III Active learning approaches to teaching information assurance. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Trevor Lamis A forensic approach to incident response. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Humayun Zafar A primer on carrying out a successful yet rigorous security risk management based case study. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Maynard Yates II Practical investigations of digital forensics tools for mobile devices. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jeffrey P. Landry Risk assessment of voting systems for teaching the art of information security. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Max Landman Managing smart phone security risks. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu Case studies for teaching physical security and security policy. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 190 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license