cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Highly Scalable and Reduced-Risk Approach to Learning Network Man-in-the-Middle (MITM) and Client-Side Exploitation (CSE)
Author:
Dale C. Rowe, Ph.D., Sarah Cunha, Cara Cornel
Date:
01 February 2017
A Holistic Approach to Cybersecurity: Mapping the NICE Workforce Framework to the Critical Infrastructure Cybersecurity Framework
Author:
Anne Kohnke, Ph.D.
Date:
01 July 2016
An Experiment Platform for Security Education in Advanced Manufacturing Systems: Infrastructure and Materials
Author:
Weichao Wang, Wesley Williams, Aidan Browne
Date:
01 February 2017
Assessing Java Coding Vulnerabilities in Undergraduate Software Engineering Education by Using Open Source Vulnerability Analysis Tools
Author:
Yen-Hung Hu, Thomas Kofi Annan
Date:
01 February 2017
Cyber law in developing countries: An Indian Perspective
Author:
Dr. Swarupa N. Dholam
Date:
01 July 2016
Cybersecurity for MBAs: Pi-shaped Course Design
Author:
William W. Agresti
Date:
01 July 2016
Effect of the Secure Programming Clinic on Learners’ Secure Programming Practices
Author:
Melissa Dark, Lauren Stuart, Ida Ngambeki
Date:
01 July 2016
Effects of a Four-Week Cyber Security Summer Program on the Attitudes and College Interests of High School Students
Author:
Melissa Danforth, Charles Lam
Date:
01 February 2017
Encryption at Birth through Trusted Platform Modules
Author:
Waldemar Pabon
Date:
01 July 2016
Enhancing Cybersecurity: Applying Advanced Analytic Techniques
Author:
Gregory Laidlaw
Date:
01 July 2016
Evidential Reasoning in Real-time Monitoring of Computing Systems
Author:
Bel G. Raggad, Alyssa Akermi
Date:
01 July 2016
Fight Identity Theft (FIT) A Comparison of Text-based and Game-based Learning
Author:
Susan Helser
Date:
01 February 2017
Implications of Traffic Analysis to Homeland Security
Author:
Bob Duhainy, Ph.D.
Date:
01 July 2016
It’s hard to be the only girl: Obstacles facing adolescent girls in computer science contexts
Author:
Monique Jethwani, Nasir Memon, Ariel Richer, Won Seo
Date:
01 July 2016
Malicious Insiders: Who Might Be the Ephialtes in Your Organization?
Author:
Nan (Peter) Liang
Date:
01 July 2016
Mobile Health Information Security in the eHealth Cloud
Author:
Hongmei Chi
Date:
01 February 2017
Modeling Cyber Crimes and Investigations for Digital Forensics Education
Author:
James Palmer, Brea Llorens, Sarah Kaufman, Christopher Gibbons, MdGayas Chowdhury, Cindy Chen, Xinwen Fu
Date:
01 July 2016
Promising Practices for Building Cybersecurity Knowledge, Confidence and Capacity among College Professors
Author:
Monique Jethwani, Nasir Memon
Date:
01 February 2017
Raising Cybersecurity Awareness among College Students
Author:
Yesem Kurt Peker, Lydia Ray, Stephanie Da Silva, Nathaniel Gibson
Date:
01 July 2016
Security by Design: Defense-in-Depth IoT Architecture
Author:
Shuangbao (Paul) Wang, Rose Shumba, William Kelly
Date:
01 February 2017
Teaching Adversarial Thinking for Cybersecurity
Author:
Seth T. Hamman, Kenneth M. Hopkinson
Date:
01 July 2016
Teaching Students to be Internet Stalkers - Experiences from an Open Source Intelligence Class Project
Author:
Mark Shaneck, Gwen Shaneck
Date:
01 July 2016
The Collaboratory Experience: The Human Factor in Cybersecurity
Author:
Dahlia Handman, Ph.D., Raymond Albert, Ph.D.
Date:
01 February 2017
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts