Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Pedro Laboy |
Litigation support: complying with the law when handling electronic information during legal proceedings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 12:1-12:6, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Yang, Yien Wang |
Denial of service hands-on lab for information assurance education: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 2:1, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imano Williams, Xiaohong Yuan |
Evaluating the effectiveness of Microsoft threat modeling tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 9:1-9:6, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jimmy Vuong |
Disaster recovery planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 16:1-16:3, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Wilson |
Creation of a bootable Kali Linux USB drive with persistent storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 7:1, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | N. Paul Schembari |
From student research to intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 5:1, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0003, Hanan Al Obaidli, Mário Guimarães, Oliver Popov |
Sandboxing: aid in digital forensic research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 3:1-3:5, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Crystal Williams, Hongmei Chi |
An investigation of privacy protocols in location-based service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 15:1-15:7, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi |
Integrate mobile devices into CS security education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 1:1-1:4, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lindsay Simpkins, Xiaohong Yuan, Jwalit Modi, Justin Zhan, Li Yang 0001 |
A course module on web tracking and privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 10:1-10:7, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger |
A survey of university system of Georgia cyber security programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 14:1-14:3, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lee Epling, Brandon Hinkel, Yi Hu |
Penetration testing in a box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 6:1-6:4, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Deborah L. Cooper |
Data security: data breaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 13:1-13:3, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Herbert J. Mattord |
Ongoing threats to information protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 4:1-4:2, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Neil Light |
Encryption and privacy in the business environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 17:1-17:3, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 978-1-4503-4049-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Julio C. Rivera, Paul Michael Di Gangi, Allen C. Johnston, James L. Worrell |
Undergraduate student perceptions of personal social media risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 8:1, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sherly Abraham, Lifang Shih |
Towards an integrative learning approach in cybersecurity education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 11:1, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, David Angulo Rubio |
Design insider threat hands-on labs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 17:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Yang, Thomas Reddington |
Enhance learning through developing network security hands-on lab for online students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 11:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar |
Teaching privacy in an interactive fashion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 7:1-7:7, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ming Yang 0019, Becky Rutherfoord, Kai Qian |
Learning cloud computing and security through CloudSim simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 6:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Uchita Shah |
Important of security governance, its dependence on other forms of governance, and its diverse application among industries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 5:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kelly Moyle |
Importance of governance with human resources information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 9:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mauri Martin, Wasim A. Al-Hamdani |
Secure key management in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 12:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | H. Scott Dunn |
FERPA compliance in higher education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 3:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo A. Francia III, Jay Snellen III |
Laboratory projects for embedded and control systems security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 13:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 978-1-4503-3049-7 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Nazia Badar, Jaideep Vaidya, Vijay Atluri |
More data, more security challenges: integrating analytics in to the information security curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 8:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Labudiong, Wasim A. Al-Hamdani |
Network risk assessment base on multi-core processor architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 4:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
A comparison of different methods of instruction in cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 14:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Randall Craig Reid, Sherwood Lane Lambert |
Using contingency planning model to mitigate the impact of the inevitable disaster at the class level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 16:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | James M. Anderson |
VoIP security governance in small/medium organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 15:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lindsay Simpkins, Xiaohong Yuan, Jung Hee Kim |
A course module on clickjacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 2:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang 0001 |
A course module on mobile malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 10:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bryson R. Payne, Aaron R. Walker |
Motivating secure coding practices in a freshman-level programming course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014, pp. 1:1, 2014, ACM, 978-1-4503-3049-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Denise Pheils |
Applying a Community Project Approach to IT and Security Courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 79-87, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Todd R. Andel, Jeffrey Todd McDonald |
A Systems Approach to Cyber Assurance Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 13-19, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Duane Hunt, Wasim A. Al-Hamdani |
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 33-41, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jim Hoag |
Evolution of a Cybersecurity curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 94-99, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, Edward L. Jones, John Brown |
Teaching Secure Coding Practices to STEM Students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 42-48, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jane LeClair, Sherly Abraham, Lifang Shih |
An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 71-78, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nada Encisco |
Incident Response Planning for a Fortune-500 Consumer Products Manufacturer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 111-116, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 978-1-4503-2547-9 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Denise M. Ferebee, Zbigniew Michalewicz |
Applying Puzzle-Based Learning to Cyber-Security Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 20-26, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 8-12, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
Google Privacy: Something for Nothing? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 27-32, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | N. Paul Schembari, Mike Jochen |
The Assessment of Learning Outcomes in Information Assurance Curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 65-70, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Tilley |
The Role of the User in Social Media Incident Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 60-64, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, Basit Shafiq, David Lorenzi, Nazia Badar |
Incorporating Privacy into the Undergraduate Curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 1-7, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Stites, Ambareen Siraj, Eric L. Brown |
Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 105-110, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger, Guangzhi Zheng |
A Virtual Environment for Teaching Technical Aspects of Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 49-52, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mark Brown, Jeff Crawford, Steven Nordstrom, Fred Scholl, Fortune S. Mhlanga |
Understanding the Presence of Experiential Learning Opportunity Programs in the Information Security Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 53-59, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0003, Hanan Al Obaidli, Huwida Said, Mário A. M. Guimarães |
The Study of the Interrelation between Law Programs and Digital Forensics in UAE Academia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 100-104, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Diane R. Murphy, Richard H. Murphy |
Teaching Cybersecurity: Protecting the Business Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013, pp. 88-93, 2013, ACM, 978-1-4503-2547-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu 0001, Bao Tri-Tran |
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 40-45, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar K. Sethi, Ye Zhu 0001, Supeng Leng |
Attacks and countermeasures in wireless cellular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 46-52, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George P. Corser |
A tale of two CTs: IP packets rejected by a firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 16-20, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Evan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, Richard S. Weiss |
Hands-on denial of service lab exercises using SlowLoris and RUDY. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 21-29, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
The creation of a minor in cyber security: the sequel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 75-81, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
Lightening in a bottle: usable and secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 62-68, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rebecca LeFebvre |
The human element in cyber security: a study on student motivation to act. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 1-8, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore |
Forming a student information assurance club. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 30-32, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Simmons, Hongmei Chi |
Designing and implementing cloud-based digital forensics hands-on labs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 69-74, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George P. Corser |
Professional association membership of computer and information security professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 9-15, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
System evaluation lifecycle: chasing windmills. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 57-61, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kirk Inman, Humayun Zafar |
IR, DR and BC with wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 33-39, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 978-1-4503-1538-8 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Adam Howard, Yi Hu |
An approach for detecting malicious keyloggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012, pp. 53-56, 2012, ACM, 978-1-4503-1538-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Durga Vemuri, Wasim A. Al-Hamdani |
Measures to improve security in a microkernel operating system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 25-33, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![ACM, 978-1-4503-0812-0 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Andrew Rudeseal |
Contingency planning management for small to medium digital media producers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 104-108, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Myung Ah Park |
Embedding security into visual programming courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 84-93, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Woodward, Wasim A. Al-Hamdani |
PKI and access control in office environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 20-24, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mary DeVito, Christine Hofmeister, Michael Jochen, N. Paul Schembari |
Undergraduate research in computer forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 61-68, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John C. Roberts II, Wasim A. Al-Hamdani |
Who can you trust in the cloud?: a review of security issues within cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 15-19, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Larry Holt |
Increasing real-world security of user IDs and passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 34-41, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles Yates, Lydia Ray, Jianhua Yang |
An investigation into iPod Touch generation 2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 94-98, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Le Garen D. Toomer |
FISMA compliance and cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 99-103, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles E. Frank, Laurie Werner |
The value of the CISSP certification for educators and professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 50-53, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger |
Maintaining balance between theory and practice in information security courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 59-60, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zouheir Trabelsi |
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 74-83, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Elliptic curve for data protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 1-14, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rand A. Mahmood, Wasim A. Al-Hamdani |
Is RFID technology secure and private? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 42-49, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo A. Francia III |
Critical infrastructure security curriculum modules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 54-58, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore, Kathryn Baker, Virginia Krolczyk, Ann Saurbier |
Capstone, thesis, or practicum?: the state of the practice in IA education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011, pp. 69-73, 2011, ACM, 978-1-4503-0812-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore |
Designing a graduate Capstone course for an online information assurance program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 58-61, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ben Halpert |
Preschool information assurance curriculum development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 27-28, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Richard M. Schneider |
A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 107-116, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bennett Setzer |
A cryptographic programming assignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 40, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Cryptography based access control in healthcare web systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 66-79, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wyatt Sweat |
Integration questions: considerations that should be made when designing the specification of a software-based integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 126-130, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vladan M. Jovanovic, Timur Mirzoev |
Teaching storage infrastructure management and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 41-44, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christy Chatmon, Hongmei Chi, Will Davis III |
Active learning approaches to teaching information assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 1-7, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Trevor Lamis |
A forensic approach to incident response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 177-185, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Humayun Zafar |
A primer on carrying out a successful yet rigorous security risk management based case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 48, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Maynard Yates II |
Practical investigations of digital forensics tools for mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 156-162, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey P. Landry |
Risk assessment of voting systems for teaching the art of information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 36-39, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Max Landman |
Managing smart phone security risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 145-155, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu |
Case studies for teaching physical security and security policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 21-26, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|