Abstract is missing.
- A course module on clickjackingLindsay Simpkins, Xiaohong Yuan, Junghee Kim. [doi]
- Laboratory projects for embedded and control systems securityGuillermo A. Francia III, Jay Snellen III. [doi]
- VoIP security governance in small/medium organizationsJames M. Anderson. [doi]
- Using contingency planning model to mitigate the impact of the inevitable disaster at the class levelRandall Craig Reid, Sherwood Lane Lambert. [doi]
- Learning cloud computing and security through CloudSim simulationMing Yang, Becky Rutherfoord, Kai Qian. [doi]
- Design insider threat hands-on labsHongmei Chi, David Angulo Rubio. [doi]
- Enhance learning through developing network security hands-on lab for online studentsJianhua Yang, Thomas Reddington. [doi]
- A course module on mobile malwarePerron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang. [doi]
- More data, more security challenges: integrating analytics in to the information security curriculumNazia Badar, Jaideep Vaidya, Vijay Atluri. [doi]
- Secure key management in cloud computingMauri Martin, Wasim A. Al-Hamdani. [doi]
- Network risk assessment base on multi-core processor architectureCarlo Labudiong, Wasim A. Al-Hamdani. [doi]
- Teaching privacy in an interactive fashionJaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Ae Chun, Nazia Badar. [doi]
- Motivating secure coding practices in a freshman-level programming courseBryson R. Payne, Aaron R. Walker. [doi]
- A comparison of different methods of instruction in cryptographyFrank H. Katz. 14 [doi]