Author of the publication

Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.

, , , , , , , and . J. Inf. Syst. Educ., 28 (1): 11-20 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TMAS A Capstone Project., , , and . FECS, page 226-231. CSREA Press, (2006)Teaching cryptography using hands-on labs (abstract only)., , , and . SIGCSE, page 673. ACM, (2012)Social History of Computing and Online Social Communities., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Design and Configuration of a Network Security and Forensics Lab., , and . International Conference on Internet Computing, page 242-246. CSREA Press, (2005)Network Intrusion Detection Based on Bayesian Networks., , and . SEKE, page 791-794. Knowledge Systems Institute Graduate School, (2008)A Flexible Context-Aware Authorization Framework for Mediation Systems., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 684-685. Springer, (2006)Discovering topics from dark websites., , , and . CICS, page 175-179. IEEE, (2009)Ethical and Social Issues in the Information Age, Fifth Edition.. Texts in Computer Science Springer, (2013)Guide to Computer Network Security, Second Edition.. Computer Communications and Networks Springer, (2013)Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks., , , and . ISI, page 75-78. IEEE, (2007)