default search action
Search dblp for Publications
export results for "toc:db/conf/infoseccd/infoseccd2015.bht:"
@inproceedings{DBLP:conf/infoseccd/AbrahamS15, author = {Sherly Abraham and Lifang Shih}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Towards an integrative learning approach in cybersecurity education}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {11:1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886001}, doi = {10.1145/2885990.2886001}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/AbrahamS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Chi15, author = {Hongmei Chi}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Integrate mobile devices into {CS} security education}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {1:1--1:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885991}, doi = {10.1145/2885990.2885991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Chi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Cooper15, author = {Deborah L. Cooper}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Data security: data breaches}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {13:1--13:3}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886003}, doi = {10.1145/2885990.2886003}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Cooper15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/EplingHH15, author = {Lee Epling and Brandon Hinkel and Yi Hu}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Penetration testing in a box}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {6:1--6:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885996}, doi = {10.1145/2885990.2885996}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/EplingHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/IqbalAGP15, author = {Asif Iqbal and Hanan Al Obaidli and M{\'{a}}rio Guimar{\~{a}}es and Oliver Popov}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Sandboxing: aid in digital forensic research}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {3:1--3:5}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885993}, doi = {10.1145/2885990.2885993}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/IqbalAGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Laboy15, author = {Pedro Laboy}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Litigation support: complying with the law when handling electronic information during legal proceedings}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {12:1--12:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886002}, doi = {10.1145/2885990.2886002}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Laboy15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Light15, author = {Neil Light}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Encryption and privacy in the business environment}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {17:1--17:3}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886007}, doi = {10.1145/2885990.2886007}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Light15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Peltsverger15, author = {Svetlana Peltsverger}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A survey of university system of Georgia cyber security programs}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {14:1--14:3}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886004}, doi = {10.1145/2885990.2886004}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Peltsverger15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/RiveraGJW15, author = {Julio C. Rivera and Paul Michael Di Gangi and Allen C. Johnston and James L. Worrell}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Undergraduate student perceptions of personal social media risk}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {8:1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885998}, doi = {10.1145/2885990.2885998}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/RiveraGJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Schembari15, author = {N. Paul Schembari}, editor = {Michael E. Whitman and Humayun Zafar}, title = {From student research to intrusion detection}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {5:1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885995}, doi = {10.1145/2885990.2885995}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Schembari15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/SimpkinsYMZY15, author = {Lindsay Simpkins and Xiaohong Yuan and Jwalit Modi and Justin Zhan and Li Yang}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A course module on web tracking and privacy}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {10:1--10:7}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886000}, doi = {10.1145/2885990.2886000}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/SimpkinsYMZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Vuong15, author = {Jimmy Vuong}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Disaster recovery planning}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {16:1--16:3}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886006}, doi = {10.1145/2885990.2886006}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Vuong15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/WhitmanM15, author = {Michael E. Whitman and Herbert J. Mattord}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Ongoing threats to information protection}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {4:1--4:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885994}, doi = {10.1145/2885990.2885994}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/WhitmanM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/WilliamsC15, author = {Crystal Williams and Hongmei Chi}, editor = {Michael E. Whitman and Humayun Zafar}, title = {An investigation of privacy protocols in location-based service}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {15:1--15:7}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2886005}, doi = {10.1145/2885990.2886005}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/WilliamsC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/WilliamsY15, author = {Imano Williams and Xiaohong Yuan}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Evaluating the effectiveness of Microsoft threat modeling tool}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {9:1--9:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885999}, doi = {10.1145/2885990.2885999}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/WilliamsY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Wilson15, author = {Ryan Wilson}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Creation of a bootable Kali Linux {USB} drive with persistent storage}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {7:1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885997}, doi = {10.1145/2885990.2885997}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Wilson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/YangW15, author = {Jianhua Yang and Yien Wang}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Denial of service hands-on lab for information assurance education: a case study}, booktitle = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, pages = {2:1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2885990.2885992}, doi = {10.1145/2885990.2885992}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/YangW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infoseccd/2015, editor = {Michael E. Whitman and Humayun Zafar}, title = {Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2885990}, isbn = {978-1-4503-4049-6}, timestamp = {Tue, 08 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.