Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. [Citation Graph (, )][DBLP]
Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. [Citation Graph (, )][DBLP]
Incorporating certification and accreditation coursework into network security curriculum. [Citation Graph (, )][DBLP]
Is attack better than defense?: teaching information security the right way. [Citation Graph (, )][DBLP]
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. [Citation Graph (, )][DBLP]
Knowledge flow with information assurance track. [Citation Graph (, )][DBLP]
Information security and computer systems: an integrated approach. [Citation Graph (, )][DBLP]
New challenges in teaching database security. [Citation Graph (, )][DBLP]
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. [Citation Graph (, )][DBLP]
Some security alternatives for encrypting information on storage devices. [Citation Graph (, )][DBLP]
Steganography obliterator: an attack on the least significant bits. [Citation Graph (, )][DBLP]
Combining an e-commerce simulation with a cyber-survivor exercise. [Citation Graph (, )][DBLP]
Visualization and management of digital forensics data. [Citation Graph (, )][DBLP]
Assessment of need and method of delivery for information security awareness program. [Citation Graph (, )][DBLP]
Corporate management of computer forensics evidence. [Citation Graph (, )][DBLP]
The management of access controls/biometrics in organizations. [Citation Graph (, )][DBLP]
Engaging undergraduates in computer security research. [Citation Graph (, )][DBLP]
Social engineering in information assurance curricula. [Citation Graph (, )][DBLP]
A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. [Citation Graph (, )][DBLP]
Teaching students to hack: ethical implications in teaching students to hack at the university level. [Citation Graph (, )][DBLP]
Ethical hacking as a risk management technique. [Citation Graph (, )][DBLP]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP