Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Pedro Laboy |
Litigation support: complying with the law when handling electronic information during legal proceedings.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Yang, Yien Wang |
Denial of service hands-on lab for information assurance education: a case study.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imano Williams, Xiaohong Yuan |
Evaluating the effectiveness of Microsoft threat modeling tool.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jimmy Vuong |
Disaster recovery planning.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Wilson |
Creation of a bootable Kali Linux USB drive with persistent storage.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | N. Paul Schembari |
From student research to intrusion detection.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0003, Hanan Al Obaidli, Mário Guimarães, Oliver Popov |
Sandboxing: aid in digital forensic research.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Crystal Williams, Hongmei Chi |
An investigation of privacy protocols in location-based service.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi |
Integrate mobile devices into CS security education.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lindsay Simpkins, Xiaohong Yuan, Jwalit Modi, Justin Zhan, Li Yang 0001 |
A course module on web tracking and privacy.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger |
A survey of university system of Georgia cyber security programs.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lee Epling, Brandon Hinkel, Yi Hu |
Penetration testing in a box.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Deborah L. Cooper |
Data security: data breaches.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Herbert J. Mattord |
Ongoing threats to information protection.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Neil Light |
Encryption and privacy in the business environment.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015  |
InfoSecCD  |
2015 |
DBLP BibTeX RDF |
|
1 | Julio C. Rivera, Paul Michael Di Gangi, Allen C. Johnston, James L. Worrell |
Undergraduate student perceptions of personal social media risk.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sherly Abraham, Lifang Shih |
Towards an integrative learning approach in cybersecurity education.  |
InfoSecCD  |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, David Angulo Rubio |
Design insider threat hands-on labs.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Yang, Thomas Reddington |
Enhance learning through developing network security hands-on lab for online students.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar |
Teaching privacy in an interactive fashion.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ming Yang 0019, Becky Rutherfoord, Kai Qian |
Learning cloud computing and security through CloudSim simulation.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Uchita Shah |
Important of security governance, its dependence on other forms of governance, and its diverse application among industries.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kelly Moyle |
Importance of governance with human resources information systems.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mauri Martin, Wasim A. Al-Hamdani |
Secure key management in cloud computing.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | H. Scott Dunn |
FERPA compliance in higher education.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo A. Francia III, Jay Snellen III |
Laboratory projects for embedded and control systems security.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014  |
InfoSecCD  |
2014 |
DBLP BibTeX RDF |
|
1 | Nazia Badar, Jaideep Vaidya, Vijay Atluri |
More data, more security challenges: integrating analytics in to the information security curriculum.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Labudiong, Wasim A. Al-Hamdani |
Network risk assessment base on multi-core processor architecture.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
A comparison of different methods of instruction in cryptography.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Randall Craig Reid, Sherwood Lane Lambert |
Using contingency planning model to mitigate the impact of the inevitable disaster at the class level.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | James M. Anderson |
VoIP security governance in small/medium organizations.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lindsay Simpkins, Xiaohong Yuan, Jung Hee Kim |
A course module on clickjacking.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang 0001 |
A course module on mobile malware.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bryson R. Payne, Aaron R. Walker |
Motivating secure coding practices in a freshman-level programming course.  |
InfoSecCD  |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Denise Pheils |
Applying a Community Project Approach to IT and Security Courses.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Todd R. Andel, Jeffrey Todd McDonald |
A Systems Approach to Cyber Assurance Education.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Duane Hunt, Wasim A. Al-Hamdani |
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jim Hoag |
Evolution of a Cybersecurity curriculum.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, Edward L. Jones, John Brown |
Teaching Secure Coding Practices to STEM Students.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jane LeClair, Sherly Abraham, Lifang Shih |
An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nada Encisco |
Incident Response Planning for a Fortune-500 Consumer Products Manufacturer.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Denise M. Ferebee, Zbigniew Michalewicz |
Applying Puzzle-Based Learning to Cyber-Security Education.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
Google Privacy: Something for Nothing?  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | N. Paul Schembari, Mike Jochen |
The Assessment of Learning Outcomes in Information Assurance Curriculum.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Tilley |
The Role of the User in Social Media Incident Response.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, Basit Shafiq, David Lorenzi, Nazia Badar |
Incorporating Privacy into the Undergraduate Curriculum.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Stites, Ambareen Siraj, Eric L. Brown |
Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger, Guangzhi Zheng |
A Virtual Environment for Teaching Technical Aspects of Privacy.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mark Brown, Jeff Crawford, Steven Nordstrom, Fred Scholl, Fortune S. Mhlanga |
Understanding the Presence of Experiential Learning Opportunity Programs in the Information Security Field.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0003, Hanan Al Obaidli, Huwida Said, Mário A. M. Guimarães |
The Study of the Interrelation between Law Programs and Digital Forensics in UAE Academia.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Diane R. Murphy, Richard H. Murphy |
Teaching Cybersecurity: Protecting the Business Environment.  |
InfoSecCD  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu 0001, Bao Tri-Tran |
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs).  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar K. Sethi, Ye Zhu 0001, Supeng Leng |
Attacks and countermeasures in wireless cellular networks.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George P. Corser |
A tale of two CTs: IP packets rejected by a firewall.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Evan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, Richard S. Weiss |
Hands-on denial of service lab exercises using SlowLoris and RUDY.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
The creation of a minor in cyber security: the sequel.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
Lightening in a bottle: usable and secure.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rebecca LeFebvre |
The human element in cyber security: a study on student motivation to act.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore |
Forming a student information assurance club.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Simmons, Hongmei Chi |
Designing and implementing cloud-based digital forensics hands-on labs.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George P. Corser |
Professional association membership of computer and information security professionals.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
System evaluation lifecycle: chasing windmills.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kirk Inman, Humayun Zafar |
IR, DR and BC with wireless mesh networks.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012  |
InfoSecCD  |
2012 |
DBLP BibTeX RDF |
|
1 | Adam Howard, Yi Hu |
An approach for detecting malicious keyloggers.  |
InfoSecCD  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Durga Vemuri, Wasim A. Al-Hamdani |
Measures to improve security in a microkernel operating system.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011  |
InfoSecCD  |
2011 |
DBLP BibTeX RDF |
|
1 | Andrew Rudeseal |
Contingency planning management for small to medium digital media producers.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Myung Ah Park |
Embedding security into visual programming courses.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Woodward, Wasim A. Al-Hamdani |
PKI and access control in office environments.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mary DeVito, Christine Hofmeister, Michael Jochen, N. Paul Schembari |
Undergraduate research in computer forensics.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John C. Roberts II, Wasim A. Al-Hamdani |
Who can you trust in the cloud?: a review of security issues within cloud computing.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Larry Holt |
Increasing real-world security of user IDs and passwords.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles Yates, Lydia Ray, Jianhua Yang |
An investigation into iPod Touch generation 2.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Le Garen D. Toomer |
FISMA compliance and cloud computing.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles E. Frank, Laurie Werner |
The value of the CISSP certification for educators and professionals.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger |
Maintaining balance between theory and practice in information security courses.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zouheir Trabelsi |
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Elliptic curve for data protection.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rand A. Mahmood, Wasim A. Al-Hamdani |
Is RFID technology secure and private?  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo A. Francia III |
Critical infrastructure security curriculum modules.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore, Kathryn Baker, Virginia Krolczyk, Ann Saurbier |
Capstone, thesis, or practicum?: the state of the practice in IA education.  |
InfoSecCD  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore |
Designing a graduate Capstone course for an online information assurance program.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ben Halpert |
Preschool information assurance curriculum development.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Richard M. Schneider |
A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bennett Setzer |
A cryptographic programming assignment.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Cryptography based access control in healthcare web systems.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wyatt Sweat |
Integration questions: considerations that should be made when designing the specification of a software-based integration.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vladan M. Jovanovic, Timur Mirzoev |
Teaching storage infrastructure management and security.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christy Chatmon, Hongmei Chi, Will Davis III |
Active learning approaches to teaching information assurance.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Trevor Lamis |
A forensic approach to incident response.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Humayun Zafar |
A primer on carrying out a successful yet rigorous security risk management based case study.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Maynard Yates II |
Practical investigations of digital forensics tools for mobile devices.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey P. Landry |
Risk assessment of voting systems for teaching the art of information security.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Max Landman |
Managing smart phone security risks.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu |
Case studies for teaching physical security and security policy.  |
InfoSecCD  |
2010 |
DBLP DOI BibTeX RDF |
|