The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "InfoSecCD"( http://dblp.L3S.de/Venues/InfoSecCD )

URL (DBLP): http://dblp.uni-trier.de/db/conf/infoseccd

Publication years (Num. hits)
2006 (40) 2007 (33) 2010 (31) 2011 (17) 2012-2013 (33) 2014 (18) 2015 (18)
Publication types (Num. hits)
inproceedings(182) proceedings(8)
Venues (Conferences, Journals, ...)
InfoSecCD(190)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 120 occurrences of 88 keywords

Results
Found 190 publication records. Showing 190 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mário A. M. Guimarães, Richard Austin, Huwida Said Database forensics. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wasim A. Al-Hamdani XML security in healthcare web systems. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Cory Q. Nguyen, James E. Goldman Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hongmei Chi, Felecia Dix-Richardson, Deidre W. Evans Designing a computer forensics concentration for cross-disciplinary undergraduate students. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bill Naber Cautionary tales from real world failures for managing security in the cyber world. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Philip Clark Contingency planning and strategies. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Frank H. Katz Curriculum and pedagogical effects of the creation of a minor in cyber security. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Crystal Edge, John W. Stamey Security education on a budget: getting the most "bang for the buck" with limited time and resources. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Brett W. Brubaker Sworn to protect...implementing the security systems development life cycle into local law enforcement. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hamza Amor Training general users on the non-policy side of the IS program. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Randall Craig Reid, Arthur H. Gilbert Using the Parkerian Hexad to introduce security in an information literacy class. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nathan Volk Threat based risk management in the federal sector. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elena Meehan The smart grid.: the smart choice? Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Herbert J. Mattord Online authentication: principles and practices. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Svetlana Peltsverger, Orlando Karam Is teaching with security in mind working? Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Herbert J. Mattord The enemy is still at the gates: threats to information security revisited. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael E. Whitman, Herbert J. Mattord (eds.) Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010 Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  BibTeX  RDF
1Randall Craig Reid, Arthur H. Gilbert Managing security from the perspective of the business executive. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mário A. M. Guimarães, Meg Murray, Richard Austin Incorporating database security courseware into a database security class. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yan Bai, Wayne Summers, Edward Bosworth Teaching network risk assessment to online graduate students. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins The design and implementation of an automated security compliance toolkit: a pedagogical exercise. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jonathan M. Graefe, Laurel Lashley, Mário A. M. Guimarães, Eghosa Guodabia, Amol K. Gupta, David Henry, Richard Austin Credit card transaction security. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Herbert J. Mattord Rethinking risk-based information security. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Stephen C. Gay An examination of virtualization's role in contingency planning. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Valerie J. H. Powell, Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, Ian W. Parker VLabNet: the integrated design of hands-on learning in information security and networking. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Robert C. Newman Covert computer and network communications. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Godwin Fumey-Nassah The management of economic ramification of information and network security on an organization. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alison Hedrick Cyberinsurance: a risk management tool? Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tammy Alexander Questionable qualifications: an in-depth look at diploma mills. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Dipti Patel, Xin Luo Take a close look at phishing. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Erwin Louis Carrow InfoSec technology management of user space and services through security threat gateways. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michael Bowman, Heath D. Brown, Paul Pitt An undergraduate rootkit research project: How available? How hard? How dangerous? Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wesley Spencer Teaching advanced network security concepts to high school students in a laboratory-based summer camp environment. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michael Fabian Endpoint security: managing USB-based removable devices with the advent of portable applications. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Robin M. Snyder Introducing Python programming into the data communications and security courses. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Eric S. Imsand, John A. Hamilton Jr. Impact of daily computer usage on GUI usage analysis. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Douglas P. Twitchell SecurityCom: a multi-player game for researching and teaching information security teams. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Andy Green Management of security policies for mobile devices. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Errol A. Blake Network security: VoIP security on data network-a guide. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michelle Boatwright, Xin Luo What do we know about biometrics authentication? Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wasim A. Al-Hamdani Education organization baseline control protection and trusted level security. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Brian C. Boynton Identification of process improvement methodologies with application in information security. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Scott Joubert Managing data access and voice service for remote workers. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Richard D. Austin Digital forensics on the cheap: teaching forensics using open source tools. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Erwin Louis Carrow Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kevin S. Floyd, Susan J. Harrington, Prachi Hivale The autotelic propensity of types of hackers. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Richard G. Taylor Making molehills out of mountains: bringing security research to the classroom. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Errol A. Blake Network and database security: regulatory compliance, network, and database security-a unified process and goal. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Robin M. Snyder Security programming using Python: man-in-the-middle attacks. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wasim A. Al-Hamdani Assessment of need and method of delivery for information security awareness program. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information assurance curriculum, information security curriculum, information security, curriculum development, information assurance
1James William Rust Corporate management of computer forensics evidence. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF management, information security, computer forensics, hackers, digital evidence, investigation, incident response
1Tammy Alexander Domain name registrars: are they part of the domain name fraud problem? Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cyber squatting, domain name fraud, domain name registrars, typosquatting
1Robin Snyder Combining an e-commerce simulation with a cyber-survivor exercise. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cyber-survivor exercises, e-commerce simulation
1Gerald Clevenger Incorporating certification and accreditation coursework into network security curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CNSS 4015, NIST standards, information systems certification, system accreditation, curriculum design
1Jason Hill The storm ahead: how CALEA will turn VoIP on its head. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CALEA, PATRIOT, communications assistance for law enforcement act, legal effects on VoIP, privacy of VoIP, structure of VoIP, VoIP, PSTN
1Kim Luong The other side of identity theft: not just a financial concern. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security, identity theft
1Mário Guimarães New challenges in teaching database security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, DBMS, data warehouse, MLS, SQL injection, DBA
1James Walden, Charles E. Frank Secure software engineering teaching modules. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure software engineering, software security, information security education
1Blair Taylor, Shiva Azadegan Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security curriculum development, risk management, computer science curriculum, security education
1John B. Bowles, Caroline M. Eastman, Csilla Farkas Engaging undergraduates in computer security research. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security research, security education
1Syed A. Saleem Ethical hacking as a risk management technique. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacker, white hat hacker, network security, information security, computer security, system security
1Michael E. Whitman, Herbert J. Mattord Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF curriculum instruction, information assurance curriculum, information security curriculum, information security, curriculum development, information assurance
1Cameron Jordan Law and privacy: the debate over Radio Frequency Identification (RFID) legislation. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AutoID labs, CASPIAN, anti terrorism, consumer rights, kill switch, progressive policy institute, smart shelf technology, transponders, privacy, RFID, radio frequency identification, tags, EPCGlobal
1Peter Phuong Vo, Chau Maggie Vo FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption using flipping, shifting operations, mapping
1Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
1Frank H. Katz Campus-wide spyware and virus removal as a method of teaching information security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security awareness programs, design, information security, information security education
1Wasim A. Al-Hamdani Knowledge flow with information assurance track. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information assurance curriculum, information security curriculum, information security, curriculum development, information assurance
1Errol A. Blake The management of access controls/biometrics in organizations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI)
1Chlotia Posey Garrison Encouraging good passwords. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer fluency, security training, user awareness, access control, active learning, computer security, passwords, students, computer literacy
1Laurence Holt A year affair with security: the development of a security program and manager. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McCumber cube, corporate risk profile, security program model, monitoring, controls, best practices, NIST
1Anne M. Payton Data security breach: seeking a prescription for adequate remedy. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach
1Martin Mink, Felix C. Freiling Is attack better than defense?: teaching information security the right way. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF offensive techniques, security lab, summerschool, computer forensics, security education, empirical measurement
1Thomas Baxley, Jinsheng Xu, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse LAN attacker: a visual education tool. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF visualization, network security, educational software, computers and education
1Robert E. Crossler, France Bélanger The effect of computer self-efficacy on security training effectiveness. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, training, computer self-efficacy
1Guillermo A. Francia III, Tyler S. Gomez Steganography obliterator: an attack on the least significant bits. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital copyright management, steganography, computer security, information hiding, digital forensics, intellectual property, enterprise application
1Mark A. Holliday, William C. Kreahling Information security and computer systems: an integrated approach. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, operating systems, information security, internet protocols, malicious software
1Guillermo A. Francia III, Monica A. Trifas, Dorothy Brown, Rahjima R. Francia, Chrissy Scott Visualization and management of digital forensics data. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, visualization, computer security, computer forensics, human perception
1Douglas P. Twitchell Social engineering in information assurance curricula. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security curriculum, social engineering
1Erik Hjelmås, Stephen D. Wolthusen Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security, curriculum development
1Charles Ohaya Managing phishing threats in an organization. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, phishing
1Robin Snyder Ethical hacking and password cracking: a pattern for individualized security exercises. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password cracking, patterns for security exercises
1 Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006 Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  BibTeX  RDF
1John C. Beachboard, Alma Cole, Mike Mellor, Steven Hernandez, Kregg Aytes, Nelson Massad A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF risk management, risk assessment, risk analysis
1Robert C. Newman Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet fraud, identity theft, cybercrime
1Michael D. Carroll Information security: examining and managing the insider threat. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF insider threat
1Robin Snyder Some security alternatives for encrypting information on storage devices. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypting file systems, storage devices
1Brian A. Pashel Teaching students to hack: ethical implications in teaching students to hack at the university level. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacking, student misuse, teaching hacking, hacking
1Janine DeWitt, Cynthia Della Torre Cicalese Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical reasoning, integrative learning, education, case studies, active learning, curriculum, computer security, ethics, information assurance, social context, situated learning, cognitive apprenticeship, authentic learning
1Ray Yeager Criminal computer forensics management. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF criminal computer forensics, criminal computer forensics management, forensic evidence, standard operating procedures, quality assurance
Displaying result #101 - #190 of 190 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license