Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mário A. M. Guimarães, Richard Austin, Huwida Said |
Database forensics. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
XML security in healthcare web systems. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cory Q. Nguyen, James E. Goldman |
Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, Felecia Dix-Richardson, Deidre W. Evans |
Designing a computer forensics concentration for cross-disciplinary undergraduate students. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bill Naber |
Cautionary tales from real world failures for managing security in the cyber world. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Philip Clark |
Contingency planning and strategies. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
Curriculum and pedagogical effects of the creation of a minor in cyber security. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Crystal Edge, John W. Stamey |
Security education on a budget: getting the most "bang for the buck" with limited time and resources. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brett W. Brubaker |
Sworn to protect...implementing the security systems development life cycle into local law enforcement. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hamza Amor |
Training general users on the non-policy side of the IS program. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Randall Craig Reid, Arthur H. Gilbert |
Using the Parkerian Hexad to introduce security in an information literacy class. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nathan Volk |
Threat based risk management in the federal sector. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elena Meehan |
The smart grid.: the smart choice? |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Herbert J. Mattord |
Online authentication: principles and practices. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger, Orlando Karam |
Is teaching with security in mind working? |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Herbert J. Mattord |
The enemy is still at the gates: threats to information security revisited. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Herbert J. Mattord (eds.) |
Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010 |
InfoSecCD |
2010 |
DBLP BibTeX RDF |
|
1 | Randall Craig Reid, Arthur H. Gilbert |
Managing security from the perspective of the business executive. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mário A. M. Guimarães, Meg Murray, Richard Austin |
Incorporating database security courseware into a database security class. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yan Bai, Wayne Summers, Edward Bosworth |
Teaching network risk assessment to online graduate students. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins |
The design and implementation of an automated security compliance toolkit: a pedagogical exercise. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. Graefe, Laurel Lashley, Mário A. M. Guimarães, Eghosa Guodabia, Amol K. Gupta, David Henry, Richard Austin |
Credit card transaction security. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Herbert J. Mattord |
Rethinking risk-based information security. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Stephen C. Gay |
An examination of virtualization's role in contingency planning. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Valerie J. H. Powell, Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, Ian W. Parker |
VLabNet: the integrated design of hands-on learning in information security and networking. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Robert C. Newman |
Covert computer and network communications. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Godwin Fumey-Nassah |
The management of economic ramification of information and network security on an organization. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alison Hedrick |
Cyberinsurance: a risk management tool? |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Tammy Alexander |
Questionable qualifications: an in-depth look at diploma mills. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dipti Patel, Xin Luo |
Take a close look at phishing. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Erwin Louis Carrow |
InfoSec technology management of user space and services through security threat gateways. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bowman, Heath D. Brown, Paul Pitt |
An undergraduate rootkit research project: How available? How hard? How dangerous? |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wesley Spencer |
Teaching advanced network security concepts to high school students in a laboratory-based summer camp environment. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael Fabian |
Endpoint security: managing USB-based removable devices with the advent of portable applications. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Robin M. Snyder |
Introducing Python programming into the data communications and security courses. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eric S. Imsand, John A. Hamilton Jr. |
Impact of daily computer usage on GUI usage analysis. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Douglas P. Twitchell |
SecurityCom: a multi-player game for researching and teaching information security teams. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Andy Green |
Management of security policies for mobile devices. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Errol A. Blake |
Network security: VoIP security on data network-a guide. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michelle Boatwright, Xin Luo |
What do we know about biometrics authentication? |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Education organization baseline control protection and trusted level security. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Brian C. Boynton |
Identification of process improvement methodologies with application in information security. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Scott Joubert |
Managing data access and voice service for remote workers. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Richard D. Austin |
Digital forensics on the cheap: teaching forensics using open source tools. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Erwin Louis Carrow |
Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kevin S. Floyd, Susan J. Harrington, Prachi Hivale |
The autotelic propensity of types of hackers. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Richard G. Taylor |
Making molehills out of mountains: bringing security research to the classroom. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Errol A. Blake |
Network and database security: regulatory compliance, network, and database security-a unified process and goal. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Robin M. Snyder |
Security programming using Python: man-in-the-middle attacks. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Assessment of need and method of delivery for information security awareness program. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
1 | James William Rust |
Corporate management of computer forensics evidence. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
management, information security, computer forensics, hackers, digital evidence, investigation, incident response |
1 | Tammy Alexander |
Domain name registrars: are they part of the domain name fraud problem? |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
cyber squatting, domain name fraud, domain name registrars, typosquatting |
1 | Robin Snyder |
Combining an e-commerce simulation with a cyber-survivor exercise. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
cyber-survivor exercises, e-commerce simulation |
1 | Gerald Clevenger |
Incorporating certification and accreditation coursework into network security curriculum. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
CNSS 4015, NIST standards, information systems certification, system accreditation, curriculum design |
1 | Jason Hill |
The storm ahead: how CALEA will turn VoIP on its head. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
CALEA, PATRIOT, communications assistance for law enforcement act, legal effects on VoIP, privacy of VoIP, structure of VoIP, VoIP, PSTN |
1 | Kim Luong |
The other side of identity theft: not just a financial concern. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security, identity theft |
1 | Mário Guimarães |
New challenges in teaching database security. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
data mining, DBMS, data warehouse, MLS, SQL injection, DBA |
1 | James Walden, Charles E. Frank |
Secure software engineering teaching modules. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
secure software engineering, software security, information security education |
1 | Blair Taylor, Shiva Azadegan |
Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security curriculum development, risk management, computer science curriculum, security education |
1 | John B. Bowles, Caroline M. Eastman, Csilla Farkas |
Engaging undergraduates in computer security research. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
security research, security education |
1 | Syed A. Saleem |
Ethical hacking as a risk management technique. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
1 | Michael E. Whitman, Herbert J. Mattord |
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
curriculum instruction, information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
1 | Cameron Jordan |
Law and privacy: the debate over Radio Frequency Identification (RFID) legislation. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
AutoID labs, CASPIAN, anti terrorism, consumer rights, kill switch, progressive policy institute, smart shelf technology, transponders, privacy, RFID, radio frequency identification, tags, EPCGlobal |
1 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
1 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
1 | Frank H. Katz |
Campus-wide spyware and virus removal as a method of teaching information security. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security awareness programs, design, information security, information security education |
1 | Wasim A. Al-Hamdani |
Knowledge flow with information assurance track. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information assurance curriculum, information security curriculum, information security, curriculum development, information assurance |
1 | Errol A. Blake |
The management of access controls/biometrics in organizations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI) |
1 | Chlotia Posey Garrison |
Encouraging good passwords. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
computer fluency, security training, user awareness, access control, active learning, computer security, passwords, students, computer literacy |
1 | Laurence Holt |
A year affair with security: the development of a security program and manager. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
McCumber cube, corporate risk profile, security program model, monitoring, controls, best practices, NIST |
1 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
1 | Martin Mink, Felix C. Freiling |
Is attack better than defense?: teaching information security the right way. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
offensive techniques, security lab, summerschool, computer forensics, security education, empirical measurement |
1 | Thomas Baxley, Jinsheng Xu, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse |
LAN attacker: a visual education tool. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
visualization, network security, educational software, computers and education |
1 | Robert E. Crossler, France Bélanger |
The effect of computer self-efficacy on security training effectiveness. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
security, training, computer self-efficacy |
1 | Guillermo A. Francia III, Tyler S. Gomez |
Steganography obliterator: an attack on the least significant bits. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
digital copyright management, steganography, computer security, information hiding, digital forensics, intellectual property, enterprise application |
1 | Mark A. Holliday, William C. Kreahling |
Information security and computer systems: an integrated approach. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
cryptography, operating systems, information security, internet protocols, malicious software |
1 | Guillermo A. Francia III, Monica A. Trifas, Dorothy Brown, Rahjima R. Francia, Chrissy Scott |
Visualization and management of digital forensics data. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
data mining, visualization, computer security, computer forensics, human perception |
1 | Douglas P. Twitchell |
Social engineering in information assurance curricula. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security curriculum, social engineering |
1 | Erik Hjelmås, Stephen D. Wolthusen |
Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security, curriculum development |
1 | Charles Ohaya |
Managing phishing threats in an organization. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
security, phishing |
1 | Robin Snyder |
Ethical hacking and password cracking: a pattern for individualized security exercises. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
password cracking, patterns for security exercises |
1 | |
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006 |
InfoSecCD |
2006 |
DBLP BibTeX RDF |
|
1 | John C. Beachboard, Alma Cole, Mike Mellor, Steven Hernandez, Kregg Aytes, Nelson Massad |
A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
risk management, risk assessment, risk analysis |
1 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
1 | Michael D. Carroll |
Information security: examining and managing the insider threat. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
insider threat |
1 | Robin Snyder |
Some security alternatives for encrypting information on storage devices. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
encrypting file systems, storage devices |
1 | Brian A. Pashel |
Teaching students to hack: ethical implications in teaching students to hack at the university level. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
ethical hacking, student misuse, teaching hacking, hacking |
1 | Janine DeWitt, Cynthia Della Torre Cicalese |
Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
ethical reasoning, integrative learning, education, case studies, active learning, curriculum, computer security, ethics, information assurance, social context, situated learning, cognitive apprenticeship, authentic learning |
1 | Ray Yeager |
Criminal computer forensics management. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
criminal computer forensics, criminal computer forensics management, forensic evidence, standard operating procedures, quality assurance |