Password policy: the good, the bad, and the ugly
WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
Teaching principled and practical information security
Journal of Computing Sciences in Colleges
Survey of network weapons part 1: weapons for profiling
Journal of Computing Sciences in Colleges
Incorporating security components into database courses
Proceedings of the 1st annual conference on Information security curriculum development
Redefining computer literacy in the age of ubiquitous computing
Proceedings of the 6th conference on Information technology education
Curriculum development related to information security policies and procedures
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Knowledge flow with information assurance track
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
An animated learning tool for Kerberos authentication architecture
Journal of Computing Sciences in Colleges - Papers of the twelfth annual CCSC Northeastern Conference
User help techniques for usable security
Proceedings of the 2007 symposium on Computer human interaction for the management of information technology
Integrating a security awareness program into an information security course
Journal of Computing Sciences in Colleges
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Migration from traditional to web-based instruction for information assurance courses
WBED'07 Proceedings of the sixth conference on IASTED International Conference Web-Based Education - Volume 2
The development of an information assurance program
Journal of Computing Sciences in Colleges
Synthesis of trustworthy protocol specifications from service specifications
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A framework for engineering trustworthy computer systems
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Understanding security architecture
Proceedings of the 2008 Spring simulation multiconference
Biometrics and information security
Proceedings of the 5th annual conference on Information security curriculum development
Information Systems Research
Proceedings of the 46th Annual Southeast Regional Conference on XX
String Kernel Based SVM for Internet Security Implementation
ICONIP '09 Proceedings of the 16th International Conference on Neural Information Processing: Part II
A survey of factors influencing people's perception of information security
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: applications and services
Typing Biometrics: Impact of Human Learning on Performance Quality
Journal of Data and Information Quality (JDIQ)
Biometric keypads: Improving accuracy through optimal PIN selection
Decision Support Systems
A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements
International Journal of Information Security and Privacy
Evaluating the Quality and Usefulness of Data Breach Information Systems
International Journal of Information Security and Privacy
International Journal of Information Security and Privacy
Determining the antecedents of digital security practices in the general public dimension
Information Technology and Management
Hi-index | 0.00 |