Search dblp for Publications

export results for "toc:db/conf/infoseccd/infoseccd2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/infoseccd/AbrahamS15,
  author       = {Sherly Abraham and
                  Lifang Shih},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Towards an integrative learning approach in cybersecurity education},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {11:1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886001},
  doi          = {10.1145/2885990.2886001},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/AbrahamS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Chi15,
  author       = {Hongmei Chi},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Integrate mobile devices into {CS} security education},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {1:1--1:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885991},
  doi          = {10.1145/2885990.2885991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Chi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Cooper15,
  author       = {Deborah L. Cooper},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Data security: data breaches},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {13:1--13:3},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886003},
  doi          = {10.1145/2885990.2886003},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Cooper15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/EplingHH15,
  author       = {Lee Epling and
                  Brandon Hinkel and
                  Yi Hu},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Penetration testing in a box},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {6:1--6:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885996},
  doi          = {10.1145/2885990.2885996},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/EplingHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/IqbalAGP15,
  author       = {Asif Iqbal and
                  Hanan Al Obaidli and
                  M{\'{a}}rio Guimar{\~{a}}es and
                  Oliver Popov},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Sandboxing: aid in digital forensic research},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {3:1--3:5},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885993},
  doi          = {10.1145/2885990.2885993},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/IqbalAGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Laboy15,
  author       = {Pedro Laboy},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Litigation support: complying with the law when handling electronic
                  information during legal proceedings},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {12:1--12:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886002},
  doi          = {10.1145/2885990.2886002},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Laboy15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Light15,
  author       = {Neil Light},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Encryption and privacy in the business environment},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {17:1--17:3},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886007},
  doi          = {10.1145/2885990.2886007},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Light15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Peltsverger15,
  author       = {Svetlana Peltsverger},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A survey of university system of Georgia cyber security programs},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {14:1--14:3},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886004},
  doi          = {10.1145/2885990.2886004},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Peltsverger15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/RiveraGJW15,
  author       = {Julio C. Rivera and
                  Paul Michael Di Gangi and
                  Allen C. Johnston and
                  James L. Worrell},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Undergraduate student perceptions of personal social media risk},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {8:1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885998},
  doi          = {10.1145/2885990.2885998},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/RiveraGJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Schembari15,
  author       = {N. Paul Schembari},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {From student research to intrusion detection},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {5:1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885995},
  doi          = {10.1145/2885990.2885995},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Schembari15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/SimpkinsYMZY15,
  author       = {Lindsay Simpkins and
                  Xiaohong Yuan and
                  Jwalit Modi and
                  Justin Zhan and
                  Li Yang},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A course module on web tracking and privacy},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {10:1--10:7},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886000},
  doi          = {10.1145/2885990.2886000},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/SimpkinsYMZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Vuong15,
  author       = {Jimmy Vuong},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Disaster recovery planning},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {16:1--16:3},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886006},
  doi          = {10.1145/2885990.2886006},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Vuong15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/WhitmanM15,
  author       = {Michael E. Whitman and
                  Herbert J. Mattord},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Ongoing threats to information protection},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {4:1--4:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885994},
  doi          = {10.1145/2885990.2885994},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/WhitmanM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/WilliamsC15,
  author       = {Crystal Williams and
                  Hongmei Chi},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {An investigation of privacy protocols in location-based service},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {15:1--15:7},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2886005},
  doi          = {10.1145/2885990.2886005},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/WilliamsC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/WilliamsY15,
  author       = {Imano Williams and
                  Xiaohong Yuan},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Evaluating the effectiveness of Microsoft threat modeling tool},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {9:1--9:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885999},
  doi          = {10.1145/2885990.2885999},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/WilliamsY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Wilson15,
  author       = {Ryan Wilson},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Creation of a bootable Kali Linux {USB} drive with persistent storage},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {7:1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885997},
  doi          = {10.1145/2885990.2885997},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Wilson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/YangW15,
  author       = {Jianhua Yang and
                  Yien Wang},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Denial of service hands-on lab for information assurance education:
                  a case study},
  booktitle    = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  pages        = {2:1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2885990.2885992},
  doi          = {10.1145/2885990.2885992},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/YangW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infoseccd/2015,
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Proceedings of the 2015 Information Security Curriculum Development
                  Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2885990},
  isbn         = {978-1-4503-4049-6},
  timestamp    = {Tue, 08 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}