cart

Members

Join Login

Membership and collaboration facilitated by Member 365.

Members

Join Login

Membership and collaboration facilitated by Member 365.

Papers

A Clinic to Teach Good Programming Practices
Author:
Matt Bishop, B. J. Orvis
Date:
01 July 2006
A Framework for Information Security Ethics Education
Author:
Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose
Date:
01 July 2006
A University Course in Information System Risk Analysis / Security Certification and Accreditation
Author:
N. Paul Schembari, Ph.D.
Date:
01 July 2006
An Academic Perspective on the CNSS Standards: A Survey
Author:
Carol Taylor, Jim Alves-Foss, Valerie Freeman
Date:
01 July 2006
Automated Reverse Engineering Tool
Author:
Ramakrishnan Ravindran, Richard R. Brooks
Date:
01 July 2006
Best Software Assurance Practices in Acquisition of Trusted Systems
Author:
Mary L. Polydys, Daniel J. Ryan, Julie J. C. H. Ryan
Date:
01 July 2006
Bottom-Up meets Top-Down: A New Paradigm for Software Engineering Instruction
Author:
Wm. Arthur Conklin
Date:
01 July 2006
Cyber Defense Exercise: Meeting Learning Objectives thru Competition
Author:
Thomas Augustine, Ronald C. Dodge Jr.
Date:
01 July 2006
Development of a Security Education Program at a Minority Institution
Author:
Dr. Xiangdong Li, Dr. Lin Leung
Date:
01 July 2006
Dynamic Honeypot Construction
Author:
Christopher Hecker, Kara L. Nance, Brian Hay
Date:
01 July 2006
Evolution of the ASSERT Computer Security Lab
Author:
Brian Hay, Kara L. Nance
Date:
01 July 2006
Experience Implementing IT2005 IAS Curriculum in Existing Programs
Author:
Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lunt
Date:
01 July 2006
Forensic Computing: Developing Specialist Expertise within the CS Curriculum
Author:
Jason Beckett, Jill Slay, Benjamin Turnbull
Date:
01 July 2006
GRASP: A Visualization Tool for Teaching Security Protocols
Author:
Dino Schweitzer, Leemon Baird, Michael Collins, Wayne Brown, Michael Sherman
Date:
01 July 2006
Improving Outreach to Adult-Learners Through Online Degree Programs in Information Security: If You Build It, Will They Come?
Author:
Patricia Y. Logan, Ph.D.
Date:
01 July 2006
Meeting the Requirements of DoD 8570.1-M
Author:
Leigh Armistead, Ph.D., Edith Cowan
Date:
01 July 2006
One Professor's Odyssey into the Realm of Information Assurance
Author:
Richard G. Epstein
Date:
01 July 2006
Practical Curriculum for the Future ISSO
Author:
Gerald Clevenger
Date:
01 July 2006
Security: Valuing Increased Overhead Costs
Author:
Tony Coulson, Jake Zhu, Kurt Collins, Walter Stewart, C.E. Tapie Rohm
Date:
01 July 2006
Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum
Author:
Stephen S. Yau, Zhaoji Chen
Date:
01 July 2006
SWARM: Secure Wireless Ad hoc Robots on Mission A course where wireless security meets robotics
Author:
Guevara Noubir
Date:
01 July 2006
Teaching the Secure Development Lifecycle: Challenges and Experiences
Author:
Rose Shumba, James Walden, Stephanie Ludi, Carol Taylor, Andy Ju An Wang
Date:
01 July 2006
The CERT® Survivability and Information Assurance Curriculum: Education for First Defenders
Author:
Lawrence R. Rogers
Date:
01 July 2006
The National Collegiate Cyber Defense Competition
Author:
Gregory B. White, Ph.D., Ronald C. Dodge Jr.
Date:
01 July 2006
The Software Assurance CBK and University Curricula
Author:
Matt Bishop, Sophie Engle
Date:
01 July 2006
XML Intrusion Prevention A Comprehensive Threat
Author:
Newton Howard, Sergey Kanareykin
Date:
01 July 2006
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts