


default search action
Ronald C. Dodge
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c24]Geoffrey L. Herman
, Ronald Dodge:
Creating Assessment Tools for Cybersecurity Education (Abstract Only). SIGCSE 2015: 696 - 2013
- [c23]Ronald C. Dodge Jr., Aaron J. Ferguson, Dawn M. Cappelli:
Introduction to Insider Threat Modeling, Detection, and Mitigation Minitrack. HICSS 2013: 1812 - [c22]Brian Hay, Ronald Dodge:
Introduction to Virtualization: Environments, Research, and Education Minitrack. HICSS 2013: 5068 - [c21]Ronald C. Dodge:
Information Assurance and Security in the ACM/IEEE CS2013. World Conference on Information Security Education 2013: 48-57 - [e3]Ronald C. Dodge Jr., Lynn Futcher:
Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 406, Springer 2013, ISBN 978-3-642-39376-1 [contents] - 2012
- [c20]Ronald Dodge, Costis Toregas, Lance J. Hoffman:
Cybersecurity Workforce Development Directions. HAISA 2012: 1-12 - [c19]Kathryn Coronges, Ronald Dodge, Cort Mukina, Zachary Radwick, Joseph Shevchik, Ericka Rovira:
The Influences of Social Networks on Phishing Vulnerability. HICSS 2012: 2366-2373 - [c18]Ronald Dodge, Kathryn Coronges, Ericka Rovira:
Empirical Benefits of Training to Phishing Susceptibility. SEC 2012: 457-464 - [c17]Blair Taylor, Matt Bishop
, Diana L. Burley, Steve Cooper, Ronald C. Dodge, Robert C. Seacord
:
Teaching secure coding: report from summit on education in secure software. SIGCSE 2012: 581-582 - [e2]Nathan L. Clarke, Theodore Tryfonas, Ronald Dodge:
7th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2012, Crete, Greece, June 6-8, 2012. Proceedings. Plymouth University, UK 2012, ISBN 978-1-84102-316-8 [contents] - 2011
- [c16]Kara L. Nance, Blair Taylor, Ronald Dodge, Brian Hay:
Creating Shareable Security Modules. World Conference on Information Security Education 2011: 156-163
2000 – 2009
- 2009
- [c15]Ronald C. Dodge, Brian Hay, Kara L. Nance:
Standards-Based Cyber Exercises. ARES 2009: 738-743 - [c14]Kara L. Nance, Brian Hay, Ronald Dodge, James Wrubel, Stephen D. Burd, Alessandro F. Seazzu:
Replicating and Sharing Computer Security Laboratory Environments. HICSS 2009: 1-10 - [c13]Helen Armstrong, Ronald C. Dodge, Colin J. Armstrong:
Reaching Today's Information Security Students. World Conference on Information Security Education 2009: 218-225 - 2008
- [j5]Mark Pollitt, Kara L. Nance, Brian Hay, Ronald C. Dodge, Philip Craiger, Paul Burke, Christopher Marberry, Bryan Brubaker:
Virtualization and Digital Forensics: A Research and Education Agenda. J. Digit. Forensic Pract. 2(2): 62-73 (2008) - [c12]Ronald C. Dodge Jr.:
Skype Fingerprint. HICSS 2008: 484 - [c11]Brian Hay, Ronald Dodge, Kara L. Nance:
Using Virtualization to Create and Deploy Computer Security Lab Exercises. SEC 2008: 621-635 - 2007
- [j4]Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson:
Phishing for user security awareness. Comput. Secur. 26(1): 73-80 (2007) - [c10]Ronald C. Dodge, Dave Cook:
"Out of the Box" Forensics Labs. HICSS 2007: 265 - [c9]Ronald C. Dodge, Corey Bertram, Daniel Ragsdale:
Remote Virtual Information Assurance Network. SEC 2007: 485-490 - [e1]Lynn Futcher, Ronald Dodge:
Fifth World Conference on Information Security Education, Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA. IFIP 237, Springer 2007, ISBN 978-0-387-73268-8 [contents] - 2006
- [c8]Ronald C. Dodge, Aaron J. Ferguson:
Using Phishing for User Email Security Awareness. SEC 2006: 454-459 - 2005
- [j3]Ronald Dodge, Daniel Ragsdale:
Technology Education at the US Military Academy. IEEE Secur. Priv. 3(2): 49-53 (2005) - [j2]Lance J. Hoffman, Timothy Rosenberg, Ronald Dodge, Daniel Ragsdale:
Exploring a National Cybersecurity Exercise for Universities. IEEE Secur. Priv. 3(5): 27-33 (2005) - 2004
- [c7]Ronald Dodge, Daniel Ragsdale:
Organized Cyber Defense Competitions. ICALT 2004 - [c6]Ronald Dodge:
Do Military Forces Need Ph.D.s? International Information Security Workshops 2004: 165-172 - 2003
- [j1]Daniel Ragsdale, Donald J. Welch, Ronald Dodge:
Information Assurance the West Point Way. IEEE Secur. Priv. 1(5): 64-67 (2003) - [c5]Daniel Ragsdale, Scott D. Lathrop, Ronald Dodge:
A Virtual Environment for IA Education. IAW 2003: 17-23 - [c4]Ronald C. Dodge Jr., Daniel Ragsdale, Charles W. Reynolds:
Organization and training of a cyber security team. SMC 2003: 4311-4316 - [c3]Ronald C. Dodge Jr., Terrance Wilson:
Network traffic analysis from the Cyber Defense Exercise. SMC 2003: 4317-4321 - 2001
- [c2]Daniel A. Menascé, Daniel Barbará, Ronald Dodge:
Preserving QoS of e-commerce sites through self-tuning: a performance model approach. EC 2001: 224-234
1990 – 1999
- 1998
- [c1]Ronald Dodge, Daniel A. Menascé:
Prefetching Inlines to Improve Web Server Latency. Int. CMG Conference 1998: 780-788
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint