The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG11.8 Publications (ifip11-8)
2003 (conf/ifip11-8/2003)

  1. Dorothy E. Denning
    Cyber Security as an Emergent Infrastructure. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:1-2 [Conf]
  2. Giovanni Vigna
    Teaching Network Security Through Live Exercises. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:3-18 [Conf]
  3. Scott D. Lathrop, Gregory J. Conti, Daniel Ragsdale
    Information Warfare in the Trenches. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:19-39 [Conf]
  4. Teemupekka Virtanen
    Changes in the Profile of Security Managers. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:41-49 [Conf]
  5. Ji Hu, Michael Schmitt II, Christian Willems, Christoph Meinel
    A Tutoring System for IT Security. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:51-60 [Conf]
  6. Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich
    Design of a Laboratory for Information Security Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:61-73 [Conf]
  7. William Hutchinson
    Integrating Information Security and Intelligence Courses. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:75-83 [Conf]
  8. Helen L. Armstrong
    Internet Security Management. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:85-94 [Conf]
  9. Per Oscarson
    Information Security Fundamentals. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:95-108 [Conf]
  10. Matthew J. Warren
    Australia's Agenda for E-Security Education and Research. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:109-114 [Conf]
  11. Peter J. Denning
    Is Security a Great Principle of Computing? [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:115-116 [Conf]
  12. Respickius Casmir, Louise Yngström
    IT Security Readiness in Developing Countries. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:117-129 [Conf]
  13. Craig W. Rasmussen, Cynthia E. Irvine, George W. Dinolt, Timothy E. Levin, Karen L. Burke
    A Program for Education in Certification and Accreditation. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:131-149 [Conf]
  14. Colin J. Armstrong
    Mastering Computer Forensics. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:151-158 [Conf]
  15. Helen L. Armstrong, John Davey
    Assembling Competitive Intelligence Using Classroom Scenarios. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:159-168 [Conf]
  16. Matt Bishop
    Panel: Teaching Undergraduate Information Assurance. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:169-171 [Conf]
  17. Rayford B. Vaughn
    Panel: Teaching Undergraduate Information Assurance. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:173-174 [Conf]
  18. Anatoli Maljuk, Natalia Miloslavskaia, Alexander Tolstoi
    Panel: Teaching Undergraduate Information Assurance in Russia. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:175-177 [Conf]
  19. Susan Older, Shiu-Kai Chin
    Outcomes-based Assessment as an Assurance Education Tool. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:179-196 [Conf]
  20. Melissa Jane Dark
    Evaluation Theory and Practice as Applied to Security Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:197-214 [Conf]
  21. Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw
    Ten Years of Information Security Masters Programmes. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:215-230 [Conf]
  22. Natalia Miloslavskaia, Alexander Tolstoi
    Network Security Scientific and Research Laboratory. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:231-241 [Conf]
  23. Gregory J. Conti, John M. D. Hill, Scott Lathrop, Kenneth L. Alford, Daniel Ragsdale
    A Comprehensive Undergraduate Information Assurance Program. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:243-260 [Conf]
  24. J. D. Fulp
    Training the Cyber Warrior. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:261-274 [Conf]
  25. Jaroslav Dockal
    Security Education for Times of Netwar and Peace. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:275-286 [Conf]
  26. Steven Furnell, Alastair G. Warren, Paul Dowland
    Improving Security Awareness Through Computer-based Training. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:287-301 [Conf]
  27. Justin Brown
    Identification and Integration of Information Security Topics. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:303-317 [Conf]
  28. Shiva Azadegan, M. Lavine, Michael O'Leary, A. Wijesinha, Marius Zimand
    A Dedicated Undergraduate Track in Computer Security Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:319-332 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002