Search dblp for Publications

export results for "toc:db/conf/infoseccd/infoseccd2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/infoseccd/Al-Hamdani10,
  author       = {Wasim A. Al{-}Hamdani},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Cryptography based access control in healthcare web systems},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {66--79},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940960},
  doi          = {10.1145/1940941.1940960},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Al-Hamdani10a,
  author       = {Wasim A. Al{-}Hamdani},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {{XML} security in healthcare web systems},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {80--93},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940961},
  doi          = {10.1145/1940941.1940961},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Amor10,
  author       = {Hamza Amor},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Training general users on the non-policy side of the {IS} program},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {141--144},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940970},
  doi          = {10.1145/1940941.1940970},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Amor10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Brubaker10,
  author       = {Brett W. Brubaker},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Sworn to protect...implementing the security systems development life
                  cycle into local law enforcement},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {163--172},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940973},
  doi          = {10.1145/1940941.1940973},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Brubaker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/ChatmonCD10,
  author       = {Christy Chatmon and
                  Hongmei Chi and
                  Will Davis III},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Active learning approaches to teaching information assurance},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940943},
  doi          = {10.1145/1940941.1940943},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/ChatmonCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/ChiDE10,
  author       = {Hongmei Chi and
                  Felecia Dix{-}Richardson and
                  Deidre W. Evans},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Designing a computer forensics concentration for cross-disciplinary
                  undergraduate students},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {52--57},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940956},
  doi          = {10.1145/1940941.1940956},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/ChiDE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Clark10,
  author       = {Philip Clark},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Contingency planning and strategies},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {131--140},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940969},
  doi          = {10.1145/1940941.1940969},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Clark10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/EdgeS10,
  author       = {Crystal Edge and
                  John W. Stamey},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Security education on a budget: getting the most "bang for the buck"
                  with limited time and resources},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {29--35},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940949},
  doi          = {10.1145/1940941.1940949},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/EdgeS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/GuimaraesAS10,
  author       = {M{\'{a}}rio A. M. Guimar{\~{a}}es and
                  Richard Austin and
                  Huwida Said},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Database forensics},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {62--65},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940958},
  doi          = {10.1145/1940941.1940958},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/GuimaraesAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Halpert10,
  author       = {Ben Halpert},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Preschool information assurance curriculum development},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {27--28},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940948},
  doi          = {10.1145/1940941.1940948},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Halpert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/JovanovicM10,
  author       = {Vladan M. Jovanovic and
                  Timur Mirzoev},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Teaching storage infrastructure management and security},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {41--44},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940952},
  doi          = {10.1145/1940941.1940952},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/JovanovicM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Katz10,
  author       = {Frank H. Katz},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Curriculum and pedagogical effects of the creation of a minor in cyber
                  security},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {49--51},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940955},
  doi          = {10.1145/1940941.1940955},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Katz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Lamis10,
  author       = {Trevor Lamis},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {A forensic approach to incident response},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {177--185},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940975},
  doi          = {10.1145/1940941.1940975},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Lamis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Landman10,
  author       = {Max Landman},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Managing smart phone security risks},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {145--155},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940971},
  doi          = {10.1145/1940941.1940971},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Landman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Landry10,
  author       = {Jeffrey P. Landry},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Risk assessment of voting systems for teaching the art of information
                  security},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {36--39},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940950},
  doi          = {10.1145/1940941.1940950},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Landry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Livermore10,
  author       = {Jeffrey A. Livermore},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Designing a graduate Capstone course for an online information assurance
                  program},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {58--61},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940957},
  doi          = {10.1145/1940941.1940957},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Livermore10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Mattord10,
  author       = {Herbert J. Mattord},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Online authentication: principles and practices},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {94},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940962},
  doi          = {10.1145/1940941.1940962},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Mattord10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Meehan10,
  author       = {Elena Meehan},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {The smart grid.: the smart choice?},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {173--176},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940974},
  doi          = {10.1145/1940941.1940974},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Meehan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Naber10,
  author       = {Bill Naber},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Cautionary tales from real world failures for managing security in
                  the cyber world},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {117--125},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940967},
  doi          = {10.1145/1940941.1940967},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Naber10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/NguyenG10,
  author       = {Cory Q. Nguyen and
                  James E. Goldman},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Malware analysis reverse engineering {(MARE)} methodology {\&}
                  malware defense {(M.D.)} timeline},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {8--14},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940944},
  doi          = {10.1145/1940941.1940944},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/NguyenG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/PeltsvergerK10,
  author       = {Svetlana Peltsverger and
                  Orlando Karam},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Is teaching with security in mind working?},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940946},
  doi          = {10.1145/1940941.1940946},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/PeltsvergerK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/ReidG10,
  author       = {Randall Craig Reid and
                  Arthur H. Gilbert},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Using the Parkerian Hexad to introduce security in an information
                  literacy class},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {45--47},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940953},
  doi          = {10.1145/1940941.1940953},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/ReidG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Schneider10,
  author       = {Richard M. Schneider},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {A comparison of information security risk analysis in the context
                  of e-government to criminological threat assessment techniques},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940966},
  doi          = {10.1145/1940941.1940966},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Schneider10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Setzer10,
  author       = {Bennett Setzer},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {A cryptographic programming assignment},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {40},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940951},
  doi          = {10.1145/1940941.1940951},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Setzer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Sweat10,
  author       = {Wyatt Sweat},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Integration questions: considerations that should be made when designing
                  the specification of a software-based integration},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {126--130},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940968},
  doi          = {10.1145/1940941.1940968},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Sweat10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Volk10,
  author       = {Nathan Volk},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Threat based risk management in the federal sector},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {97--106},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940964},
  doi          = {10.1145/1940941.1940964},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Volk10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/WhitmanM10,
  author       = {Michael E. Whitman and
                  Herbert J. Mattord},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {The enemy is still at the gates: threats to information security revisited},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {95--96},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940963},
  doi          = {10.1145/1940941.1940963},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/WhitmanM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Yates10,
  author       = {Maynard Yates II},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Practical investigations of digital forensics tools for mobile devices},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {156--162},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940972},
  doi          = {10.1145/1940941.1940972},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Yates10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/YuanMXY10,
  author       = {Xiaohong Yuan and
                  Sahana Murthy and
                  Jinsheng Xu and
                  Huiming Yu},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Case studies for teaching physical security and security policy},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940947},
  doi          = {10.1145/1940941.1940947},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/YuanMXY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Zafar10,
  author       = {Humayun Zafar},
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {A primer on carrying out a successful yet rigorous security risk management
                  based case study},
  booktitle    = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  pages        = {48},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940941.1940954},
  doi          = {10.1145/1940941.1940954},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Zafar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infoseccd/2010,
  editor       = {Michael E. Whitman and
                  Herbert J. Mattord},
  title        = {Information Security Curriculum Development Conference, InfoSecCD
                  2010, Kennesaw, GA, USA, October 1-3, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1940941},
  isbn         = {978-1-4503-0202-9},
  timestamp    = {Fri, 15 Apr 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}