default search action
Michael E. Whitman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Herbert J. Mattord, Kathleen Kotwica, Michael E. Whitman, Evan Battaglia:
Organizational perspectives on converged security operations. Inf. Comput. Secur. 32(2): 218-235 (2024) - 2023
- [j15]Seema Sangari, Eric Dallal, Michael E. Whitman:
Modeling reporting delays in cyber incidents: an industry-level comparison. Int. J. Inf. Sec. 22(1): 63-76 (2023) - [c16]Mst. Shapna Akter, Hossain Shahriar, Dan Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu:
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy. COMPSAC 2023: 1010-1012 - [c15]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning on Machine Learning for Cybersecurity. SIGCSE (2) 2023: 1299 - 2022
- [c14]Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Michael E. Whitman, Alfredo Cuzzocrea, Fan Wu, Victor Clincy:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection. IEEE Big Data 2022: 5715-5720 - [c13]Dan Chia-Tien Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware. SIGCSE (2) 2022: 1153 - [i1]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan Chia-Tien Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. CoRR abs/2206.12770 (2022) - 2021
- [c12]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu:
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity. IEEE BigData 2021: 3311-3315 - [c11]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan C. Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. IEEE BigData 2021: 5369-5377 - 2020
- [c10]Zhuolin Li, Hao Zhang, Hossain Shahriar, Dan Lo, Kai Qian, Michael E. Whitman, Fan Wu:
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms. DASC/PiCom/CBDCom/CyberSciTech 2020: 469-474 - [c9]Hossain Shahriar, Michael E. Whitman, Dan Lo, Fan Wu, Cassandra Thomas:
Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity. SIGCSE 2020: 1273
2010 – 2019
- 2019
- [c8]Hossain Shahriar, Michael E. Whitman, Dan Chia-Tien Lo, Fan Wu, Cassandra Thomas, Alfredo Cuzzocrea:
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction. IEEE BigData 2019: 5814-5818 - 2018
- [c7]Michael E. Whitman:
Challenges in the Instruction of Risk Management. AMCIS 2018 - 2015
- [c6]Michael E. Whitman, Herbert J. Mattord:
Ongoing threats to information protection. InfoSecCD 2015: 4:1-4:2 - [e6]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015. ACM 2015, ISBN 978-1-4503-4049-6 [contents] - 2014
- [e5]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014. ACM 2014, ISBN 978-1-4503-3049-7 [contents] - 2013
- [j14]Michael E. Whitman, Humayun Zafar:
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited. Int. J. Interdiscip. Telecommun. Netw. 5(2): 43-50 (2013) - [e4]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013. ACM 2013, ISBN 978-1-4503-2547-9 [contents] - 2012
- [e3]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012. ACM 2012, ISBN 978-1-4503-1538-8 [contents] - 2011
- [e2]Michael E. Whitman, Humayun Zafar:
Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD 2011, Kennesaw, GA, USA, September 30 - October 1, 2011. ACM 2011, ISBN 978-1-4503-0812-0 [contents] - 2010
- [c5]Michael E. Whitman, Herbert J. Mattord:
The enemy is still at the gates: threats to information security revisited. InfoSecCD 2010: 95-96 - [e1]Michael E. Whitman, Herbert J. Mattord:
Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010. ACM 2010, ISBN 978-1-4503-0202-9 [contents]
2000 – 2009
- 2007
- [c4]Herbert J. Mattord, Michael E. Whitman:
Regulatory Compliance in Information Technology and Information Security. AMCIS 2007: 357 - 2006
- [c3]Michael E. Whitman, Herbert J. Mattord:
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. InfoSecCD 2006: 49-51 - 2005
- [c2]Michael E. Whitman, Herbert J. Mattord:
Workshop on designing and teaching information security curriculum. ACM Southeast Regional Conference (1) 2005: 16-17 - [c1]Michael E. Whitman, Herbert J. Mattord:
Developing and Implementing Information Security Programs: AMCIS 2005 Workshop Proposal. AMCIS 2005: 475 - [r1]Herbert J. Mattord, Michael E. Whitman:
INFOSEC Policy - The Foundation for an Effective Security Program. Encyclopedia of Information Science and Technology (III) 2005: 1518-1523 - 2004
- [j13]Michael E. Whitman:
In defense of the realm: understanding the threats to information security. Int. J. Inf. Manag. 24(1): 43-57 (2004) - 2003
- [j12]Michael E. Whitman:
Enemy at the gate: threats to information security. Commun. ACM 46(8): 91-95 (2003) - 2001
- [j11]Michael E. Whitman, Jorge Perez, Catherine M. Beise:
A Study of User Attitudes toward Persistent Cookies. J. Comput. Inf. Syst. 41(3): 1-7 (2001)
1990 – 1999
- 1999
- [j10]Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:
The Communications Decency Act Is not as Dead as You Think. Commun. ACM 42(1): 15-17 (1999) - [j9]Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:
Considerations for an Effective Telecommunications-Use Policy. Commun. ACM 42(6): 101-108 (1999) - [j8]Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:
Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas? Inf. Secur. J. A Glob. Perspect. 8(1): 11-14 (1999) - [j7]Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts:
The Communications Decency Act: An Update for is Management. Inf. Syst. Manag. 16(1): 91-94 (1999) - [j6]Michael E. Whitman, Anthony R. Hendrickson, Anthony M. Townsend:
Research Commentary. Academic Rewards for Teaching, Research, and Service: Data and Discourse. Inf. Syst. Res. 10(2): 99-109 (1999) - 1998
- [j5]Robert J. Aalberts, Anthony M. Townsend, Michael E. Whitman:
The Threat of Long-Arm Jurisdiction to Electronic Commerce. Commun. ACM 41(12): 15-20 (1998) - [j4]Michael E. Whitman, Anthony M. Townsend, Anthony R. Hendrickson, Dail Fields:
An examination of cross-national differences. SIGCAS Comput. Soc. 28(4): 22-28 (1998) - 1997
- [j3]Michael E. Whitman:
A Look at the Telecommunications ACT of 1996. Inf. Syst. Manag. 14(3): 82-86 (1997) - 1996
- [j2]Michael E. Whitman:
IT divergence in reengineering support: Performance expectations vs. perceptions. Inf. Manag. 30(5): 239-250 (1996) - [j1]Michael E. Whitman, Michael L. Gibson:
Enterprise Modeling for Strategic Support. Inf. Syst. Manag. 13(2): 64-72 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 21:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint