Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Pedro Laboy |
Litigation support: complying with the law when handling electronic information during legal proceedings. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Yang, Yien Wang |
Denial of service hands-on lab for information assurance education: a case study. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imano Williams, Xiaohong Yuan |
Evaluating the effectiveness of Microsoft threat modeling tool. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jimmy Vuong |
Disaster recovery planning. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Wilson |
Creation of a bootable Kali Linux USB drive with persistent storage. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | N. Paul Schembari |
From student research to intrusion detection. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0003, Hanan Al Obaidli, Mário Guimarães, Oliver Popov |
Sandboxing: aid in digital forensic research. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Crystal Williams, Hongmei Chi |
An investigation of privacy protocols in location-based service. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi |
Integrate mobile devices into CS security education. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lindsay Simpkins, Xiaohong Yuan, Jwalit Modi, Justin Zhan, Li Yang 0001 |
A course module on web tracking and privacy. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger |
A survey of university system of Georgia cyber security programs. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lee Epling, Brandon Hinkel, Yi Hu |
Penetration testing in a box. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Deborah L. Cooper |
Data security: data breaches. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Herbert J. Mattord |
Ongoing threats to information protection. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Neil Light |
Encryption and privacy in the business environment. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015 |
InfoSecCD |
2015 |
DBLP BibTeX RDF |
|
1 | Julio C. Rivera, Paul Michael Di Gangi, Allen C. Johnston, James L. Worrell |
Undergraduate student perceptions of personal social media risk. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sherly Abraham, Lifang Shih |
Towards an integrative learning approach in cybersecurity education. |
InfoSecCD |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, David Angulo Rubio |
Design insider threat hands-on labs. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Yang, Thomas Reddington |
Enhance learning through developing network security hands-on lab for online students. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar |
Teaching privacy in an interactive fashion. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ming Yang 0019, Becky Rutherfoord, Kai Qian |
Learning cloud computing and security through CloudSim simulation. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Uchita Shah |
Important of security governance, its dependence on other forms of governance, and its diverse application among industries. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kelly Moyle |
Importance of governance with human resources information systems. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mauri Martin, Wasim A. Al-Hamdani |
Secure key management in cloud computing. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | H. Scott Dunn |
FERPA compliance in higher education. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo A. Francia III, Jay Snellen III |
Laboratory projects for embedded and control systems security. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014 |
InfoSecCD |
2014 |
DBLP BibTeX RDF |
|
1 | Nazia Badar, Jaideep Vaidya, Vijay Atluri |
More data, more security challenges: integrating analytics in to the information security curriculum. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Labudiong, Wasim A. Al-Hamdani |
Network risk assessment base on multi-core processor architecture. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
A comparison of different methods of instruction in cryptography. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Randall Craig Reid, Sherwood Lane Lambert |
Using contingency planning model to mitigate the impact of the inevitable disaster at the class level. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | James M. Anderson |
VoIP security governance in small/medium organizations. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lindsay Simpkins, Xiaohong Yuan, Jung Hee Kim |
A course module on clickjacking. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang 0001 |
A course module on mobile malware. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bryson R. Payne, Aaron R. Walker |
Motivating secure coding practices in a freshman-level programming course. |
InfoSecCD |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Denise Pheils |
Applying a Community Project Approach to IT and Security Courses. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Todd R. Andel, Jeffrey Todd McDonald |
A Systems Approach to Cyber Assurance Education. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Duane Hunt, Wasim A. Al-Hamdani |
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jim Hoag |
Evolution of a Cybersecurity curriculum. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hongmei Chi, Edward L. Jones, John Brown |
Teaching Secure Coding Practices to STEM Students. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jane LeClair, Sherly Abraham, Lifang Shih |
An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nada Encisco |
Incident Response Planning for a Fortune-500 Consumer Products Manufacturer. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013 |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Denise M. Ferebee, Zbigniew Michalewicz |
Applying Puzzle-Based Learning to Cyber-Security Education. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
Google Privacy: Something for Nothing? |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | N. Paul Schembari, Mike Jochen |
The Assessment of Learning Outcomes in Information Assurance Curriculum. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Tilley |
The Role of the User in Social Media Incident Response. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, Basit Shafiq, David Lorenzi, Nazia Badar |
Incorporating Privacy into the Undergraduate Curriculum. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joseph Stites, Ambareen Siraj, Eric L. Brown |
Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger, Guangzhi Zheng |
A Virtual Environment for Teaching Technical Aspects of Privacy. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mark Brown, Jeff Crawford, Steven Nordstrom, Fred Scholl, Fortune S. Mhlanga |
Understanding the Presence of Experiential Learning Opportunity Programs in the Information Security Field. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0003, Hanan Al Obaidli, Huwida Said, Mário A. M. Guimarães |
The Study of the Interrelation between Law Programs and Digital Forensics in UAE Academia. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Diane R. Murphy, Richard H. Murphy |
Teaching Cybersecurity: Protecting the Business Environment. |
InfoSecCD |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu 0001, Bao Tri-Tran |
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs). |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar K. Sethi, Ye Zhu 0001, Supeng Leng |
Attacks and countermeasures in wireless cellular networks. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George P. Corser |
A tale of two CTs: IP packets rejected by a firewall. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Evan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, Richard S. Weiss |
Hands-on denial of service lab exercises using SlowLoris and RUDY. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Frank H. Katz |
The creation of a minor in cyber security: the sequel. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
Lightening in a bottle: usable and secure. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rebecca LeFebvre |
The human element in cyber security: a study on student motivation to act. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore |
Forming a student information assurance club. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Simmons, Hongmei Chi |
Designing and implementing cloud-based digital forensics hands-on labs. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | George P. Corser |
Professional association membership of computer and information security professionals. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Crowe, Wasim A. Al-Hamdani |
System evaluation lifecycle: chasing windmills. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kirk Inman, Humayun Zafar |
IR, DR and BC with wireless mesh networks. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012 |
InfoSecCD |
2012 |
DBLP BibTeX RDF |
|
1 | Adam Howard, Yi Hu |
An approach for detecting malicious keyloggers. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Durga Vemuri, Wasim A. Al-Hamdani |
Measures to improve security in a microkernel operating system. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Whitman, Humayun Zafar (eds.) |
Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011 |
InfoSecCD |
2011 |
DBLP BibTeX RDF |
|
1 | Andrew Rudeseal |
Contingency planning management for small to medium digital media producers. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Myung Ah Park |
Embedding security into visual programming courses. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Woodward, Wasim A. Al-Hamdani |
PKI and access control in office environments. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mary DeVito, Christine Hofmeister, Michael Jochen, N. Paul Schembari |
Undergraduate research in computer forensics. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John C. Roberts II, Wasim A. Al-Hamdani |
Who can you trust in the cloud?: a review of security issues within cloud computing. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Larry Holt |
Increasing real-world security of user IDs and passwords. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles Yates, Lydia Ray, Jianhua Yang |
An investigation into iPod Touch generation 2. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Le Garen D. Toomer |
FISMA compliance and cloud computing. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Charles E. Frank, Laurie Werner |
The value of the CISSP certification for educators and professionals. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Svetlana Peltsverger |
Maintaining balance between theory and practice in information security courses. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zouheir Trabelsi |
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Elliptic curve for data protection. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rand A. Mahmood, Wasim A. Al-Hamdani |
Is RFID technology secure and private? |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo A. Francia III |
Critical infrastructure security curriculum modules. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore, Kathryn Baker, Virginia Krolczyk, Ann Saurbier |
Capstone, thesis, or practicum?: the state of the practice in IA education. |
InfoSecCD |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Livermore |
Designing a graduate Capstone course for an online information assurance program. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ben Halpert |
Preschool information assurance curriculum development. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Richard M. Schneider |
A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bennett Setzer |
A cryptographic programming assignment. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wasim A. Al-Hamdani |
Cryptography based access control in healthcare web systems. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wyatt Sweat |
Integration questions: considerations that should be made when designing the specification of a software-based integration. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vladan M. Jovanovic, Timur Mirzoev |
Teaching storage infrastructure management and security. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christy Chatmon, Hongmei Chi, Will Davis III |
Active learning approaches to teaching information assurance. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Trevor Lamis |
A forensic approach to incident response. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Humayun Zafar |
A primer on carrying out a successful yet rigorous security risk management based case study. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Maynard Yates II |
Practical investigations of digital forensics tools for mobile devices. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey P. Landry |
Risk assessment of voting systems for teaching the art of information security. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Max Landman |
Managing smart phone security risks. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohong Yuan, Sahana Murthy, Jinsheng Xu, Huiming Yu |
Case studies for teaching physical security and security policy. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|