Search dblp for Publications

export results for "toc:db/conf/infoseccd/infoseccd2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/infoseccd/CaushajFBSZL12,
  author       = {Eralda Caushaj and
                  Huirong Fu and
                  Haissam Badih and
                  Ishwar K. Sethi and
                  Ye Zhu and
                  Supeng Leng},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Attacks and countermeasures in wireless cellular networks},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {46--52},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390325},
  doi          = {10.1145/2390317.2390325},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/CaushajFBSZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Corser12,
  author       = {George P. Corser},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Professional association membership of computer and information security
                  professionals},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {9--15},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390319},
  doi          = {10.1145/2390317.2390319},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Corser12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Corser12a,
  author       = {George P. Corser},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A tale of two CTs: {IP} packets rejected by a firewall},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {16--20},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390320},
  doi          = {10.1145/2390317.2390320},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Corser12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/CroweA12,
  author       = {David Crowe and
                  Wasim A. Al{-}Hamdani},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {System evaluation lifecycle: chasing windmills},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {57--61},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390327},
  doi          = {10.1145/2390317.2390327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/CroweA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/CroweA12a,
  author       = {David Crowe and
                  Wasim A. Al{-}Hamdani},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Lightening in a bottle: usable and secure},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {62--68},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390328},
  doi          = {10.1145/2390317.2390328},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/CroweA12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/DamonDLMLW12,
  author       = {Evan Damon and
                  Julian Dale and
                  Evaristo Laron and
                  Jens Mache and
                  Nathan Land and
                  Richard S. Weiss},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Hands-on denial of service lab exercises using SlowLoris and {RUDY}},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390321},
  doi          = {10.1145/2390317.2390321},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/DamonDLMLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/HowardH12,
  author       = {Adam Howard and
                  Yi Hu},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {An approach for detecting malicious keyloggers},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {53--56},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390326},
  doi          = {10.1145/2390317.2390326},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/HowardH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/InmanZ12,
  author       = {Kirk Inman and
                  Humayun Zafar},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {IR, {DR} and {BC} with wireless mesh networks},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {33--39},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390323},
  doi          = {10.1145/2390317.2390323},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/InmanZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Katz12,
  author       = {Frank H. Katz},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {The creation of a minor in cyber security: the sequel},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {75--81},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390330},
  doi          = {10.1145/2390317.2390330},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Katz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/LeFebvre12,
  author       = {Rebecca LeFebvre},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {The human element in cyber security: a study on student motivation
                  to act},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390318},
  doi          = {10.1145/2390317.2390318},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/LeFebvre12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Livermore12,
  author       = {Jeffrey A. Livermore},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Forming a student information assurance club},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {30--32},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390322},
  doi          = {10.1145/2390317.2390322},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Livermore12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/OluochFYZT12,
  author       = {Jared Oluoch and
                  Huirong Fu and
                  Astrid Younang and
                  Ye Zhu and
                  Bao Tri{-}Tran},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A simulation study of impacts of collaborative worm hole attacks in
                  mobile ad hoc networks (MANETs)},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390324},
  doi          = {10.1145/2390317.2390324},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/OluochFYZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/SimmonsC12,
  author       = {Michael Simmons and
                  Hongmei Chi},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Designing and implementing cloud-based digital forensics hands-on
                  labs},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {69--74},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390329},
  doi          = {10.1145/2390317.2390329},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/SimmonsC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infoseccd/2012,
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2390317},
  isbn         = {978-1-4503-1538-8},
  timestamp    = {Tue, 08 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics