Is Information Security Under Control?: Investigating Quality in Information Security Management
IEEE Security and Privacy
Strategic planning for the computer science security
WSEAS Transactions on Computers
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Training ≠ education: putting secure software engineering back in the classroom
Proceedings of the 14th Western Canadian Conference on Computing Education
Optimizing a policy authoring framework for security and privacy policies
Proceedings of the Sixth Symposium on Usable Privacy and Security
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
Expanding security awareness in introductory computer science courses
2009 Information Security Curriculum Development Conference
Security of airborne network dynamics and algorithms: a graph-theoretic perspective
Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications
Formalization of design patterns for security anddependability
Proceedings of the 4th international ACM Sigsoft symposium on Architecting critical systems
Hi-index | 0.00 |
Security is not an add-on or merely an operational concept, it is a property that must be designed and built into every system. Our challenge as educators is to teach our students the science underlying computer security and the techniques to synthesize and evaluate real solutions for real problems.