The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG11.8 Publications (ifip11-8)
2007 (conf/ifip11-8/2007)

  1. Colin J. Armstrong
    An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:1-8 [Conf]
  2. Helen Armstrong, Louise Yngström
    Resubmit my Information Security Thesis? - You must be joking! [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:9-16 [Conf]
  3. Matt Bishop
    E-Voting as a Teaching Tool. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:17-24 [Conf]
  4. Alan Davidson, Kjell Näckros
    Practical Assignments in IT Security for Contemporary Higher Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:25-32 [Conf]
  5. Hennie Kruger, Lynette Drevin, Tjaart Steyn
    Email Security Awareness - a Practical Assessment of Employee Behaviour. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:33-40 [Conf]
  6. Lynn Futcher, Rossouw von Solms
    SecSDM: A Model for Integrating Security into the Software Development Life Cycle. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:41-48 [Conf]
  7. Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis
    A CBK for Information Security and Critical Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:49-56 [Conf]
  8. Suresh Kalathur, Lubomir T. Chitkushev, Stuart Jacobs, Tanya Zlateva, Anatoly Temkin
    A Course on Computer and Network Security: Teaching Online Versus Face-to-Face. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:57-64 [Conf]
  9. Clare Wilson, Vasilios Katos, Caroline Strevens
    An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:65-71 [Conf]
  10. Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner
    Experiences from Educating Practitioners in Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:73-80 [Conf]
  11. Jeffrey A. Mattson
    Cyber Defense Exercise: A Service Provider Model. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:81-86 [Conf]
  12. Andrey P. Kurilo, Natalia G. Miloslavskaya, Alexander I. Tolstoy
    Information Security Specialist Training for the Banking Sphere. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:87-93 [Conf]
  13. Kjell Näckros
    Learning Security through Computer Games: Studying user behavior in a real-world situation. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:95-103 [Conf]
  14. Matthew Simon, Jill Slay
    Forensic Computing Training, Certification and Accreditation: An Australian Overview. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:105-112 [Conf]
  15. Chris Steketee, Phillip Lock
    Software Assignments for a Course in Secure E-Commerce. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:113-120 [Conf]
  16. Anatoly Temkin
    Teaching Cryptography to Continuing Education Students. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:121-128 [Conf]
  17. Stephen D. Wolthusen
    The Role of Mathematics in Information Security Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:129-136 [Conf]
  18. Helen Armstrong, Colin J. Armstrong
    The Role of Information Security Industry Training and Accreditation in Tertiary Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:137-140 [Conf]
  19. Sean Peisert, Matt Bishop
    How to Design Computer Security Experiments. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:141-148 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002