default search action
Search dblp for Publications
export results for "toc:db/conf/infoseccd/infoseccd2010.bht:"
@inproceedings{DBLP:conf/infoseccd/Al-Hamdani10, author = {Wasim A. Al{-}Hamdani}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Cryptography based access control in healthcare web systems}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {66--79}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940960}, doi = {10.1145/1940941.1940960}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Al-Hamdani10a, author = {Wasim A. Al{-}Hamdani}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {{XML} security in healthcare web systems}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {80--93}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940961}, doi = {10.1145/1940941.1940961}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Amor10, author = {Hamza Amor}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Training general users on the non-policy side of the {IS} program}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {141--144}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940970}, doi = {10.1145/1940941.1940970}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Amor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Brubaker10, author = {Brett W. Brubaker}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Sworn to protect...implementing the security systems development life cycle into local law enforcement}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {163--172}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940973}, doi = {10.1145/1940941.1940973}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Brubaker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/ChatmonCD10, author = {Christy Chatmon and Hongmei Chi and Will Davis III}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Active learning approaches to teaching information assurance}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {1--7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940943}, doi = {10.1145/1940941.1940943}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/ChatmonCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/ChiDE10, author = {Hongmei Chi and Felecia Dix{-}Richardson and Deidre W. Evans}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Designing a computer forensics concentration for cross-disciplinary undergraduate students}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {52--57}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940956}, doi = {10.1145/1940941.1940956}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/ChiDE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Clark10, author = {Philip Clark}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Contingency planning and strategies}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {131--140}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940969}, doi = {10.1145/1940941.1940969}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Clark10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/EdgeS10, author = {Crystal Edge and John W. Stamey}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Security education on a budget: getting the most "bang for the buck" with limited time and resources}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {29--35}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940949}, doi = {10.1145/1940941.1940949}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/EdgeS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/GuimaraesAS10, author = {M{\'{a}}rio A. M. Guimar{\~{a}}es and Richard Austin and Huwida Said}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Database forensics}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {62--65}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940958}, doi = {10.1145/1940941.1940958}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/GuimaraesAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Halpert10, author = {Ben Halpert}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Preschool information assurance curriculum development}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {27--28}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940948}, doi = {10.1145/1940941.1940948}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Halpert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/JovanovicM10, author = {Vladan M. Jovanovic and Timur Mirzoev}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Teaching storage infrastructure management and security}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {41--44}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940952}, doi = {10.1145/1940941.1940952}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/JovanovicM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Katz10, author = {Frank H. Katz}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Curriculum and pedagogical effects of the creation of a minor in cyber security}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {49--51}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940955}, doi = {10.1145/1940941.1940955}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Katz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Lamis10, author = {Trevor Lamis}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {A forensic approach to incident response}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {177--185}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940975}, doi = {10.1145/1940941.1940975}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Lamis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Landman10, author = {Max Landman}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Managing smart phone security risks}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {145--155}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940971}, doi = {10.1145/1940941.1940971}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Landman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Landry10, author = {Jeffrey P. Landry}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Risk assessment of voting systems for teaching the art of information security}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {36--39}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940950}, doi = {10.1145/1940941.1940950}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Landry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Livermore10, author = {Jeffrey A. Livermore}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Designing a graduate Capstone course for an online information assurance program}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {58--61}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940957}, doi = {10.1145/1940941.1940957}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Livermore10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Mattord10, author = {Herbert J. Mattord}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Online authentication: principles and practices}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {94}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940962}, doi = {10.1145/1940941.1940962}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Mattord10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Meehan10, author = {Elena Meehan}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {The smart grid.: the smart choice?}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {173--176}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940974}, doi = {10.1145/1940941.1940974}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Meehan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Naber10, author = {Bill Naber}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Cautionary tales from real world failures for managing security in the cyber world}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {117--125}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940967}, doi = {10.1145/1940941.1940967}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Naber10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/NguyenG10, author = {Cory Q. Nguyen and James E. Goldman}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Malware analysis reverse engineering {(MARE)} methodology {\&} malware defense {(M.D.)} timeline}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {8--14}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940944}, doi = {10.1145/1940941.1940944}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/NguyenG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/PeltsvergerK10, author = {Svetlana Peltsverger and Orlando Karam}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Is teaching with security in mind working?}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {15--20}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940946}, doi = {10.1145/1940941.1940946}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/PeltsvergerK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/ReidG10, author = {Randall Craig Reid and Arthur H. Gilbert}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Using the Parkerian Hexad to introduce security in an information literacy class}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {45--47}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940953}, doi = {10.1145/1940941.1940953}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/ReidG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Schneider10, author = {Richard M. Schneider}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {A comparison of information security risk analysis in the context of e-government to criminological threat assessment techniques}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {107--116}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940966}, doi = {10.1145/1940941.1940966}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Schneider10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Setzer10, author = {Bennett Setzer}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {A cryptographic programming assignment}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {40}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940951}, doi = {10.1145/1940941.1940951}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Setzer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Sweat10, author = {Wyatt Sweat}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Integration questions: considerations that should be made when designing the specification of a software-based integration}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {126--130}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940968}, doi = {10.1145/1940941.1940968}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Sweat10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Volk10, author = {Nathan Volk}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Threat based risk management in the federal sector}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {97--106}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940964}, doi = {10.1145/1940941.1940964}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Volk10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/WhitmanM10, author = {Michael E. Whitman and Herbert J. Mattord}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {The enemy is still at the gates: threats to information security revisited}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {95--96}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940963}, doi = {10.1145/1940941.1940963}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/WhitmanM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Yates10, author = {Maynard Yates II}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Practical investigations of digital forensics tools for mobile devices}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {156--162}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940972}, doi = {10.1145/1940941.1940972}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Yates10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/YuanMXY10, author = {Xiaohong Yuan and Sahana Murthy and Jinsheng Xu and Huiming Yu}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Case studies for teaching physical security and security policy}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {21--26}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940947}, doi = {10.1145/1940941.1940947}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/YuanMXY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Zafar10, author = {Humayun Zafar}, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {A primer on carrying out a successful yet rigorous security risk management based case study}, booktitle = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, pages = {48}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940941.1940954}, doi = {10.1145/1940941.1940954}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Zafar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infoseccd/2010, editor = {Michael E. Whitman and Herbert J. Mattord}, title = {Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1940941}, isbn = {978-1-4503-0202-9}, timestamp = {Fri, 15 Apr 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.