The SCEAS System
Navigation Menu

Conferences in DBLP

(infoseccd)
2006 (conf/infoseccd/2006)


  1. Campus-wide spyware and virus removal as a method of teaching information security. [Citation Graph (, )][DBLP]


  2. Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. [Citation Graph (, )][DBLP]


  3. Ethical hacking and password cracking: a pattern for individualized security exercises. [Citation Graph (, )][DBLP]


  4. Secure software engineering teaching modules. [Citation Graph (, )][DBLP]


  5. Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. [Citation Graph (, )][DBLP]


  6. Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. [Citation Graph (, )][DBLP]


  7. Incorporating certification and accreditation coursework into network security curriculum. [Citation Graph (, )][DBLP]


  8. Is attack better than defense?: teaching information security the right way. [Citation Graph (, )][DBLP]


  9. Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. [Citation Graph (, )][DBLP]


  10. Knowledge flow with information assurance track. [Citation Graph (, )][DBLP]


  11. Information security and computer systems: an integrated approach. [Citation Graph (, )][DBLP]


  12. New challenges in teaching database security. [Citation Graph (, )][DBLP]


  13. Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. [Citation Graph (, )][DBLP]


  14. Some security alternatives for encrypting information on storage devices. [Citation Graph (, )][DBLP]


  15. Steganography obliterator: an attack on the least significant bits. [Citation Graph (, )][DBLP]


  16. Combining an e-commerce simulation with a cyber-survivor exercise. [Citation Graph (, )][DBLP]


  17. Visualization and management of digital forensics data. [Citation Graph (, )][DBLP]


  18. Assessment of need and method of delivery for information security awareness program. [Citation Graph (, )][DBLP]


  19. Encouraging good passwords. [Citation Graph (, )][DBLP]


  20. Domain name registrars: are they part of the domain name fraud problem? [Citation Graph (, )][DBLP]


  21. LAN attacker: a visual education tool. [Citation Graph (, )][DBLP]


  22. The effect of computer self-efficacy on security training effectiveness. [Citation Graph (, )][DBLP]


  23. A year affair with security: the development of a security program and manager. [Citation Graph (, )][DBLP]


  24. A review of spyware campaigns and strategies to combat them. [Citation Graph (, )][DBLP]


  25. FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. [Citation Graph (, )][DBLP]


  26. The storm ahead: how CALEA will turn VoIP on its head. [Citation Graph (, )][DBLP]


  27. Law and privacy: the debate over Radio Frequency Identification (RFID) legislation. [Citation Graph (, )][DBLP]


  28. The other side of identity theft: not just a financial concern. [Citation Graph (, )][DBLP]


  29. Information security: examining and managing the insider threat. [Citation Graph (, )][DBLP]


  30. Managing phishing threats in an organization. [Citation Graph (, )][DBLP]


  31. Data security breach: seeking a prescription for adequate remedy. [Citation Graph (, )][DBLP]


  32. Criminal computer forensics management. [Citation Graph (, )][DBLP]


  33. Corporate management of computer forensics evidence. [Citation Graph (, )][DBLP]


  34. The management of access controls/biometrics in organizations. [Citation Graph (, )][DBLP]


  35. Engaging undergraduates in computer security research. [Citation Graph (, )][DBLP]


  36. Social engineering in information assurance curricula. [Citation Graph (, )][DBLP]


  37. A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. [Citation Graph (, )][DBLP]


  38. Teaching students to hack: ethical implications in teaching students to hack at the university level. [Citation Graph (, )][DBLP]


  39. Ethical hacking as a risk management technique. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002