![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/infoseccd/infoseccd2014.bht:"
@inproceedings{DBLP:conf/infoseccd/Anderson14, author = {James M. Anderson}, editor = {Michael E. Whitman and Humayun Zafar}, title = {VoIP security governance in small/medium organizations}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {15:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670746}, doi = {10.1145/2670739.2670746}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Anderson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BadarVA14, author = {Nazia Badar and Jaideep Vaidya and Vijay Atluri}, editor = {Michael E. Whitman and Humayun Zafar}, title = {More data, more security challenges: integrating analytics in to the information security curriculum}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {8:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670743}, doi = {10.1145/2670739.2670743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/BadarVA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/ChiR14, author = {Hongmei Chi and David Angulo Rubio}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Design insider threat hands-on labs}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {17:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670756}, doi = {10.1145/2670739.2670756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/ChiR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Dunn14, author = {H. Scott Dunn}, editor = {Michael E. Whitman and Humayun Zafar}, title = {{FERPA} compliance in higher education}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {3:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670740}, doi = {10.1145/2670739.2670740}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Dunn14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/FranciaS14, author = {Guillermo A. Francia III and Jay Snellen III}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Laboratory projects for embedded and control systems security}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {13:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670754}, doi = {10.1145/2670739.2670754}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/FranciaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/JohnsonHHYY14, author = {Perron Johnson and Philip Harris and Keheira Henderson and Xiaohong Yuan and Li Yang}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A course module on mobile malware}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {10:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670752}, doi = {10.1145/2670739.2670752}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/JohnsonHHYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Katz14, author = {Frank H. Katz}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A comparison of different methods of instruction in cryptography}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {14:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670755}, doi = {10.1145/2670739.2670755}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Katz14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/LabudiongA14, author = {Carlo Labudiong and Wasim A. Al{-}Hamdani}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Network risk assessment base on multi-core processor architecture}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {4:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670741}, doi = {10.1145/2670739.2670741}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/LabudiongA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/MartinA14, author = {Mauri Martin and Wasim A. Al{-}Hamdani}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Secure key management in cloud computing}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {12:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670745}, doi = {10.1145/2670739.2670745}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/MartinA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Moyle14, author = {Kelly Moyle}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Importance of governance with human resources information systems}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {9:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670744}, doi = {10.1145/2670739.2670744}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Moyle14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/PayneW14, author = {Bryson R. Payne and Aaron R. Walker}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Motivating secure coding practices in a freshman-level programming course}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {1:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670749}, doi = {10.1145/2670739.2670749}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/PayneW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/ReidL14, author = {Randall Craig Reid and Sherwood Lane Lambert}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Using contingency planning model to mitigate the impact of the inevitable disaster at the class level}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {16:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670748}, doi = {10.1145/2670739.2670748}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/ReidL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Shah14, author = {Uchita Shah}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Important of security governance, its dependence on other forms of governance, and its diverse application among industries}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {5:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670742}, doi = {10.1145/2670739.2670742}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Shah14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/SimpkinsYK14, author = {Lindsay Simpkins and Xiaohong Yuan and Jung Hee Kim}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A course module on clickjacking}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {2:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670750}, doi = {10.1145/2670739.2670750}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/SimpkinsYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/VaidyaLSCB14, author = {Jaideep Vaidya and David Lorenzi and Basit Shafiq and Soon Ae Chun and Nazia Badar}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Teaching privacy in an interactive fashion}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {7:1--7:7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670751}, doi = {10.1145/2670739.2670751}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/VaidyaLSCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/YangR14, author = {Jianhua Yang and Thomas Reddington}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Enhance learning through developing network security hands-on lab for online students}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {11:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670753}, doi = {10.1145/2670739.2670753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/YangR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/YangRQ14, author = {Ming Yang and Becky Rutherfoord and Kai Qian}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Learning cloud computing and security through CloudSim simulation}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {6:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670747}, doi = {10.1145/2670739.2670747}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/YangRQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infoseccd/2014, editor = {Michael E. Whitman and Humayun Zafar}, title = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2670739}, isbn = {978-1-4503-3049-7}, timestamp = {Tue, 08 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.