Login / Signup
InfoSecCD
2006
2009
2012
2015
2006
2015
Keyphrases
Publications
2015
Ryan Wilson
Creation of a bootable Kali Linux USB drive with persistent storage.
InfoSecCD
(2015)
Lindsay Simpkins
,
Xiaohong Yuan
,
Jwalit Modi
,
Justin Zhan
,
Li Yang
A course module on web tracking and privacy.
InfoSecCD
(2015)
Jianhua Yang
,
Yien Wang
Denial of service hands-on lab for information assurance education: a case study.
InfoSecCD
(2015)
Neil Light
Encryption and privacy in the business environment.
InfoSecCD
(2015)
Hongmei Chi
Integrate mobile devices into CS security education.
InfoSecCD
(2015)
Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015
InfoSecCD
(2015)
Lee Epling
,
Brandon Hinkel
,
Yi Hu
Penetration testing in a box.
InfoSecCD
(2015)
Pedro Laboy
Litigation support: complying with the law when handling electronic information during legal proceedings.
InfoSecCD
(2015)
Sherly Abraham
,
Lifang Shih
Towards an integrative learning approach in cybersecurity education.
InfoSecCD
(2015)
Michael E. Whitman
,
Herbert J. Mattord
Ongoing threats to information protection.
InfoSecCD
(2015)
Jimmy Vuong
Disaster recovery planning.
InfoSecCD
(2015)
N. Paul Schembari
From student research to intrusion detection.
InfoSecCD
(2015)
Svetlana Peltsverger
A survey of university system of Georgia cyber security programs.
InfoSecCD
(2015)
Deborah L. Cooper
Data security: data breaches.
InfoSecCD
(2015)
Imano Williams
,
Xiaohong Yuan
Evaluating the effectiveness of Microsoft threat modeling tool.
InfoSecCD
(2015)
Asif Iqbal
,
Hanan Al Obaidli
,
Mário Guimarães
,
Oliver Popov
Sandboxing: aid in digital forensic research.
InfoSecCD
(2015)
Julio C. Rivera
,
Paul Michael Di Gangi
,
Allen C. Johnston
,
James L. Worrell
Undergraduate student perceptions of personal social media risk.
InfoSecCD
(2015)
Crystal Williams
,
Hongmei Chi
An investigation of privacy protocols in location-based service.
InfoSecCD
(2015)
2014
H. Scott Dunn
FERPA compliance in higher education.
InfoSecCD
(2014)
James M. Anderson
VoIP security governance in small/medium organizations.
InfoSecCD
(2014)
Hongmei Chi
,
David Angulo Rubio
Design insider threat hands-on labs.
InfoSecCD
(2014)
Uchita Shah
Important of security governance, its dependence on other forms of governance, and its diverse application among industries.
InfoSecCD
(2014)
Jianhua Yang
,
Thomas Reddington
Enhance learning through developing network security hands-on lab for online students.
InfoSecCD
(2014)
Kelly Moyle
Importance of governance with human resources information systems.
InfoSecCD
(2014)
Carlo Labudiong
,
Wasim A. Al-Hamdani
Network risk assessment base on multi-core processor architecture.
InfoSecCD
(2014)
Guillermo A. Francia III
,
Jay Snellen III
Laboratory projects for embedded and control systems security.
InfoSecCD
(2014)
Randall Craig Reid
,
Sherwood Lane Lambert
Using contingency planning model to mitigate the impact of the inevitable disaster at the class level.
InfoSecCD
(2014)
Jaideep Vaidya
,
David Lorenzi
,
Basit Shafiq
,
Soon Ae Chun
,
Nazia Badar
Teaching privacy in an interactive fashion.
InfoSecCD
(2014)
Mauri Martin
,
Wasim A. Al-Hamdani
Secure key management in cloud computing.
InfoSecCD
(2014)
Bryson R. Payne
,
Aaron R. Walker
Motivating secure coding practices in a freshman-level programming course.
InfoSecCD
(2014)
Perron Johnson
,
Philip Harris
,
Keheira Henderson
,
Xiaohong Yuan
,
Li Yang
A course module on mobile malware.
InfoSecCD
(2014)
Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014
InfoSecCD
(2014)
Frank H. Katz
A comparison of different methods of instruction in cryptography.
InfoSecCD
(2014)
Lindsay Simpkins
,
Xiaohong Yuan
,
Jung Hee Kim
A course module on clickjacking.
InfoSecCD
(2014)
Nazia Badar
,
Jaideep Vaidya
,
Vijay Atluri
More data, more security challenges: integrating analytics in to the information security curriculum.
InfoSecCD
(2014)
Ming Yang
,
Becky Rutherfoord
,
Kai Qian
Learning cloud computing and security through CloudSim simulation.
InfoSecCD
(2014)
2013
Jaideep Vaidya
,
Basit Shafiq
,
David Lorenzi
,
Nazia Badar
Incorporating Privacy into the Undergraduate Curriculum.
InfoSecCD
(2013)
Denise Pheils
Applying a Community Project Approach to IT and Security Courses.
InfoSecCD
(2013)
Duane Hunt
,
Wasim A. Al-Hamdani
Theoretical Analysis of using Identity Based PKI as the Authentication method in SQL.
InfoSecCD
(2013)
Joseph Stites
,
Ambareen Siraj
,
Eric L. Brown
Smart Grid Security Educational Training with ThunderCloud: A Virtual Security Test Bed.
InfoSecCD
(2013)
Dipankar Dasgupta
,
Denise M. Ferebee
,
Zbigniew Michalewicz
Applying Puzzle-Based Learning to Cyber-Security Education.
InfoSecCD
(2013)
Adam Tilley
The Role of the User in Social Media Incident Response.
InfoSecCD
(2013)
Svetlana Peltsverger
,
Guangzhi Zheng
A Virtual Environment for Teaching Technical Aspects of Privacy.
InfoSecCD
(2013)
Jim Hoag
Evolution of a Cybersecurity curriculum.
InfoSecCD
(2013)
Nada Encisco
Incident Response Planning for a Fortune-500 Consumer Products Manufacturer.
InfoSecCD
(2013)
Jane LeClair
,
Sherly Abraham
,
Lifang Shih
An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce.
InfoSecCD
(2013)
Todd R. Andel
,
Jeffrey Todd McDonald
A Systems Approach to Cyber Assurance Education.
InfoSecCD
(2013)
David Crowe
,
Wasim A. Al-Hamdani
Google Privacy: Something for Nothing?
InfoSecCD
(2013)
Frank H. Katz
Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance.
InfoSecCD
(2013)
Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSecCD 2013, Kennesaw, Georgia, USA, October 12, 2013
InfoSecCD
(2013)