default search action
Gregory B. White
Person information
- affiliation: University of Texas at San Antonio, Department of Computer Sciences, TX, USA
- affiliation (former): US Air Force Academy, Colorado Springs, CO, USA
- affiliation (PhD 1995): Texas A&M University, Department of Computer Sciences, College Station, TX, USA
Other persons with the same name
- Gregory White 0002 — Rush University, Chicago, IL, USA
- Greg White 0001 — University of Sydney, School of Mathematics and Statistics, Computational Algebra Group, NSW, Australia
- Greg White 0002 — Cable Television Laboratories, Inc. (CableLabs)
- Greg White 0004 — austraLYSIS, Woolooware, NSW, Australia (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Keith Harrison, Greg White, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2024: 1880 - [c42]Gregory B. White, Natalie Sjelin, Jeremy West, Rajendra V. Boppana:
Academia Leadership in Improving the Cybersecurity Posture of Government and Local Communities. HICSS 2024: 1911-1920 - [c41]Stephanie Garay, Agnes H. Chan, Susanne Wetzel, Gregory White:
A Study on Exploring the Challenges of the CyberCorps®: Scholarship for Service Program to Support PhD Level Scholarships. World Conference on Information Security Education 2024: 180-190 - 2023
- [c40]Keith Harrison, Wm. Arthur Conklin, Greg White:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2023: 1673 - [c39]Greg White:
Reaching an Underserved Population in Communities: Project Xander - Cybersecurity for NonProfits. HICSS 2023: 1674-1683 - 2022
- [c38]Johanna Jacob, Greg White:
Is a Significant Demographic Left Out of the Equation? An Overview of Possible Inequitable Access to Cybersecurity Educational Programs in the United States. HICSS 2022: 1-12 - [c37]Gregory B. White, Keith Harrison, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2022: 1 - 2021
- [c36]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2021: 1 - 2020
- [c35]Gregory White, Keith Harrison, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2020: 1-2
2010 – 2019
- 2019
- [c34]Wm. Arthur Conklin, Gregory White, Keith Harrison:
Introduction to the Minitrack on Cybersecurity in Digital Government. HICSS 2019: 1 - [c33]Gregory White, Natalie Sjelin, Keith Harrison:
The Need for Information Sharing and Analysis Organizations to Combat Attacks on States and Community Public and Private Networks. HICSS 2019: 1-9 - [c32]Brita Munsinger, Greg White, John Quarles:
The Usability of the Microsoft HoloLens for an Augmented Reality Game to Teach Elementary School Children. VS-GAMES 2019: 1-4 - [c31]Bushra Tasnim Zahed, Gregory White, John Quarles:
Play It Safe: An Educational Cyber Safety Game for Children in Elementary School. VS-GAMES 2019: 1-4 - 2018
- [c30]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to the Minitrack on Cybersecurity and Government. HICSS 2018: 1 - 2017
- [c29]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to Cybersecurity and Government Minitrack. HICSS 2017: 1 - [c28]Gregory White, Keith Harrison:
State and Community Information Sharing and Analysis Organizations. HICSS 2017: 1-9 - [c27]Wanying Zhao, Gregory White:
An Evolution Roadmap for Community Cyber Security Information Sharing Maturity Model. HICSS 2017: 1-10 - 2016
- [c26]Wm. Arthur Conklin, Rayford B. Vaughn, Gregory B. White:
Introduction to the Cybersecurity Minitrack. HICSS 2016: 2615 - [c25]James Rutherford, Gregory B. White:
Using an Improved Cybersecurity Kill Chain to Develop an Improved Honey Community. HICSS 2016: 2624-2632 - 2015
- [c24]Gregory B. White, Wm. Arthur Conklin, Rayford B. Vaughn:
Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack. HICSS 2015: 2252 - [c23]Keith Harrison, James Rutherford, Gregory B. White:
The Honey Community: Use of Combined Organizational Data for Community Protection. HICSS 2015: 2288-2297 - 2014
- [c22]Wm. Arthur Conklin, Gregory B. White, Rayford B. Vaughn:
Introduction to Infrastructure Security Minitrack. HICSS 2014: 1986 - [c21]Wanying Zhao, Gregory White:
Designing a Formal Model Facilitating Collaborative Information Sharing for Community Cyber Security. HICSS 2014: 1987-1996 - 2013
- [j10]Keith Harrison, Gregory B. White:
Anonymous and Distributed Community Cyberincident Detection. IEEE Secur. Priv. 11(5): 20-27 (2013) - [c20]Rayford B. Vaughn Jr., Wm. Arthur Conklin, Gregory B. White:
Introduction to E-Government Infrastructure Security Minitrack. HICSS 2013: 1753 - 2012
- [c19]Gregory B. White:
A Grassroots Cyber Security Program to Protect the Nation. HICSS 2012: 2330-2337 - [c18]Areej Al-Bataineh, Gregory White:
Analysis and detection of malicious data exfiltration in web traffic. MALWARE 2012: 26-31 - 2011
- [c17]Keith Harrison, Gregory White:
A Taxonomy of Cyber Events Affecting Communities. HICSS 2011: 1-9 - 2010
- [j9]Gregory B. White, Dwayne Williams, Keith Harrison:
The CyberPatriot National High School Cyber Defense Competition. IEEE Secur. Priv. 8(5): 59-61 (2010) - [c16]Keith Harrison, Gregory White:
An Empirical Study on the Effectiveness of Common Security Measures. HICSS 2010: 1-7
2000 – 2009
- 2009
- [c15]Gregory White, Natalie Granado:
Developing a Community Cyber Security Incident Response Capability. HICSS 2009: 1-9 - 2008
- [c14]Natalie Granado, Gregory White:
Cyber Security and Government Fusion Centers. HICSS 2008: 205 - 2007
- [c13]Like Zhang, Gregory B. White:
Anomaly Detection for Application Level Network Attacks Using Payload Keywords. CISDA 2007: 178-185 - [c12]Gregory B. White, Stephen Jones:
Minitrack: E-Government Information Security. HICSS 2007: 97 - [c11]Gregory B. White:
The Community Cyber Security Maturity Model. HICSS 2007: 99 - [c10]Like Zhang, Gregory B. White:
Analysis of Payload Based Application level Network Anomaly Detection. HICSS 2007: 99 - [c9]Like Zhang, Gregory B. White:
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. IPDPS 2007: 1-8 - 2006
- [j8]Tim Goles, Gregory B. White, Nicole Beebe, Carlos Alberto Dorantes, Barbara Hewitt:
Moral intensity and ethical decision-making: a contextual extension. Data Base 37(2-3): 86-95 (2006) - [c8]Art Conklin, Gregory B. White:
e-Government and Cyber Security: The Role of Cyber Security Exercises. HICSS 2006 - [c7]Gregory B. White, Anthony M. Cresswell, Stephen Jones:
Minitrack Introduction. HICSS 2006 - 2005
- [j7]Tim Goles, Gregory B. White, Glenn B. Dietrich:
Dark Screen: An Exercise in Cyber Security. MIS Q. Executive 4(2): 5 (2005) - [c6]Gregory B. White, David J. DiCenso:
Information Sharing Needs for National Security. HICSS 2005 - 2004
- [j6]Gregory B. White, Art Conklin:
The Appropriate Use of Force-on-Force Cyberexercises. IEEE Secur. Priv. 2(4): 33-37 (2004) - [c5]Sriraman Ramachandran, Gregory White:
Methodology To Determine Security ROI. AMCIS 2004: 550 - [c4]Gregory B. White, Tim Goles:
The Role of Exercises in Training the Nation's Cyber First-Responders. AMCIS 2004: 560 - [c3]Gregory B. White, Glenn B. Dietrich, Tim Goles:
Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events. HICSS 2004
1990 – 1999
- 1997
- [j5]Gregory B. White, Eric A. Fisch, Udo W. Pooch:
Government-Based Security Standards. Inf. Secur. J. A Glob. Perspect. 6(3): 9-19 (1997) - 1996
- [j4]Gregory B. White, Udo W. Pooch:
Cooperating security managers: Distributed intrusion detection systems. Comput. Secur. 15(5): 441-450 (1996) - [j3]Gregory B. White, Eric A. Fisch, Udo W. Pooch:
Cooperating security managers: a peer-based intrusion detection system. IEEE Netw. 10(1): 20-23 (1996) - 1995
- [j2]Gregory B. White, Udo W. Pooch:
Problems with DCE security services. Comput. Commun. Rev. 25(5): 5-12 (1995) - 1994
- [c2]Eric A. Fisch, Gregory B. White, Udo W. Pooch:
The design of an audit trail analysis tool. ACSAC 1994: 126-132 - [c1]Gregory B. White, Udo W. Pooch:
Computer ethics education: impact from societal norms. Ethics in Computer Age 1994: 170-173
1980 – 1989
- 1989
- [j1]Gregory B. White:
Review of A Comprehensive Guide to AI and Expert Systems: Turbo Pascal Edition. AI Mag. 10(1): 86-87 (1989)
Coauthor Index
aka: Art Conklin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint