cart

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Breadth-First Approach to Computer Security
Author:
Kara L. Nance, Brian Hay
Date:
01 July 2008
A Digital Lego Set and Exercises for Teaching Security Protocols
Author:
Weichao Wang, Aidong Lu, Li Yu, Zhiwei Li
Date:
01 July 2008
And You Thought the Killer Robot was Bad
Author:
Richard Epstein
Date:
01 July 2008
Biological Systems and Models in Information Security
Author:
Julie J. C. H. Ryan, Daniel J. Ryan
Date:
01 July 2008
CANVAS: A Regional Assessment Exercise for Teaching Security Concepts
Author:
Michael Collins, Dino Schweitzer, Dan Massey
Date:
01 July 2008
Challenges of Establishing Centers Of Excellence In Information Assurance At An HBCU: A Case Study
Author:
Rajni Goel, Ayodele Mobolurin
Date:
01 July 2008
Course Modules for Software Security
Author:
Austin Frazier, Xiaohong Yuan, Yaohang Li, Stephan Hudson
Date:
01 July 2008
Designing a Security Thread in Computing Curricula
Author:
Ju An Wang, Max North, Sarah North
Date:
01 July 2008
Developing SCADA Systems Security Course within a Systems Engineering Program
Author:
Jill Slay, Elena Sitnikova
Date:
01 July 2008
Developing Standards for IO Using CNSS as a Model
Date:
01 July 2008
Engaging Millennials with Information Technology: A Case Study Using High School Cyber Defense Competitions
Author:
Doug Jacobson, Julie A. Rursch
Date:
01 July 2008
Information Assurance Education In A Specialist Defence Environment
Author:
Les Smith, Neil McNair
Date:
01 July 2008
Integrating a Capstone Project into an Information Assurance Program
Author:
Jeffrey A. Livermore, Nanette S. Poulios
Date:
01 July 2008
On Developing Tomorrow’s “Cyber Warriors”
Author:
David Dittrich
Date:
01 July 2008
Online Information Security Education through Anchored Instruction
Author:
Eric Imsand, Larry Howard, Ken Pence, Mike Byers, Dipankar Dasgupta
Date:
01 July 2008
Secure “Information at Your Fingertips” -- Just One Course can Help
Author:
Keyu Jiang, Mark Bannister
Date:
01 July 2008
Security Visualization Survey
Author:
Denise Ferebee, Dipankar Dasgupta
Date:
01 July 2008
Teaching IP Encryption and Decryption Using the OPNET Modeling and Simulation Tool
Author:
Jungwoo Ryoo, Tae Hwan Oh
Date:
01 July 2008
Teaching of Security in Cyber-Physical Systems
Author:
Ravi Akella, Bruce McMillin
Date:
01 July 2008
The Growth of the Mid-Atlantic CCDC: Public - Private Partnerships at Work
Author:
Tim Rosenberg, Casey O’Brien
Date:
01 July 2008
The Pennsylvania Workforce Leadership Program in Computer Security
Author:
N. Paul Schembari
Date:
01 July 2008
The Power of Simple Hands-On Cyberforensics Exercises: A Guide for Faculty
Author:
Gary C. Kessler, Jim Hoag
Date:
01 July 2008
Virtual Laboratories for Learning Real World Security
Author:
Tanya Zlateva, Leo Burstein, Anatoly Temkin, Andrew MacNeil, Lou Chitkushev
Date:
01 July 2008
What the Graduate Needs to Know about Cryptography
Author:
William Hugh Murray
Date:
01 July 2008
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts