Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/infoseccd/infoseccd2012.bht:"
@inproceedings{DBLP:conf/infoseccd/CaushajFBSZL12, author = {Eralda Caushaj and Huirong Fu and Haissam Badih and Ishwar K. Sethi and Ye Zhu and Supeng Leng}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Attacks and countermeasures in wireless cellular networks}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {46--52}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390325}, doi = {10.1145/2390317.2390325}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/CaushajFBSZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Corser12, author = {George P. Corser}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Professional association membership of computer and information security professionals}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {9--15}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390319}, doi = {10.1145/2390317.2390319}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Corser12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Corser12a, author = {George P. Corser}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A tale of two CTs: {IP} packets rejected by a firewall}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {16--20}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390320}, doi = {10.1145/2390317.2390320}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Corser12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/CroweA12, author = {David Crowe and Wasim A. Al{-}Hamdani}, editor = {Michael E. Whitman and Humayun Zafar}, title = {System evaluation lifecycle: chasing windmills}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {57--61}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390327}, doi = {10.1145/2390317.2390327}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/CroweA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/CroweA12a, author = {David Crowe and Wasim A. Al{-}Hamdani}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Lightening in a bottle: usable and secure}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {62--68}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390328}, doi = {10.1145/2390317.2390328}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/CroweA12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/DamonDLMLW12, author = {Evan Damon and Julian Dale and Evaristo Laron and Jens Mache and Nathan Land and Richard S. Weiss}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Hands-on denial of service lab exercises using SlowLoris and {RUDY}}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {21--29}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390321}, doi = {10.1145/2390317.2390321}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/DamonDLMLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/HowardH12, author = {Adam Howard and Yi Hu}, editor = {Michael E. Whitman and Humayun Zafar}, title = {An approach for detecting malicious keyloggers}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {53--56}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390326}, doi = {10.1145/2390317.2390326}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/HowardH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/InmanZ12, author = {Kirk Inman and Humayun Zafar}, editor = {Michael E. Whitman and Humayun Zafar}, title = {IR, {DR} and {BC} with wireless mesh networks}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {33--39}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390323}, doi = {10.1145/2390317.2390323}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/InmanZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Katz12, author = {Frank H. Katz}, editor = {Michael E. Whitman and Humayun Zafar}, title = {The creation of a minor in cyber security: the sequel}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {75--81}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390330}, doi = {10.1145/2390317.2390330}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Katz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/LeFebvre12, author = {Rebecca LeFebvre}, editor = {Michael E. Whitman and Humayun Zafar}, title = {The human element in cyber security: a study on student motivation to act}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {1--8}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390318}, doi = {10.1145/2390317.2390318}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/LeFebvre12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Livermore12, author = {Jeffrey A. Livermore}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Forming a student information assurance club}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {30--32}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390322}, doi = {10.1145/2390317.2390322}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Livermore12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/OluochFYZT12, author = {Jared Oluoch and Huirong Fu and Astrid Younang and Ye Zhu and Bao Tri{-}Tran}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs)}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {40--45}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390324}, doi = {10.1145/2390317.2390324}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/OluochFYZT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/SimmonsC12, author = {Michael Simmons and Hongmei Chi}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Designing and implementing cloud-based digital forensics hands-on labs}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {69--74}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390329}, doi = {10.1145/2390317.2390329}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/SimmonsC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infoseccd/2012, editor = {Michael E. Whitman and Humayun Zafar}, title = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2390317}, isbn = {978-1-4503-1538-8}, timestamp = {Tue, 08 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.