The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gregory B. White: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Art Conklin, Gregory B. White
    e-Government and Cyber Security: The Role of Cyber Security Exercises. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  2. Gregory B. White, Anthony M. Cresswell, Stephen Jones
    Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  3. Gregory B. White, David J. DiCenso
    Information Sharing Needs for National Security. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  4. Gregory B. White, Glenn B. Dietrich, Tim Goles
    Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  5. Like Zhang, Gregory B. White
    Analysis of Payload Based Application level Network Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:99- [Conf]
  6. Gregory B. White
    The Community Cyber Security Maturity Model. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:99- [Conf]
  7. Gregory B. White, Stephen Jones
    Minitrack: E-Government Information Security. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:97- [Conf]
  8. Gregory B. White
    Review of A Comprehensive Guide to AI and Expert Systems: Turbo Pascal Edition. [Citation Graph (0, 0)][DBLP]
    AI Magazine, 1989, v:10, n:1, pp:86-87 [Journal]
  9. Gregory B. White, Udo W. Pooch
    Cooperating security managers: Distributed intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:5, pp:441-450 [Journal]
  10. Gregory B. White, Art Conklin
    The Appropriate Use of Force-on-Force Cyberexercises. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:33-37 [Journal]
  11. Like Zhang, Gregory B. White
    An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-8 [Conf]

  12. Computer ethics education: impact from societal norms. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002