Barbara Endicott-Popovsky

According to our database1, Barbara Endicott-Popovsky authored at least 42 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy and Security Perceptions in Augmented Cognition Applications.
Proceedings of the Augmented Cognition, 2023

2019
Augmented Cognition for Socio-Technical Systems.
Proceedings of the Augmented Cognition, 2019

2018
Discovering a Profile for Protect and Defend: Penetration Testing.
Proceedings of the Learning and Collaboration Technologies. Learning and Teaching, 2018

Applications of Distributed Socio-technical Synthetic Intelligent (SI) Systems Using Hybrid "Compensating Controls" Architectures.
Proceedings of the Learning and Collaboration Technologies. Learning and Teaching, 2018

2017
Security Beyond Secrecy - Practical Strategies to Address Emerging Cybersecurity Paradoxes Through Professional and Stakeholder Education and Co-management Architectures Designed to Cultivate Community-Situated, Non-technical Structures of Group Synthetic Intelligence (aka "Neighborhood Watch").
Proceedings of the Learning and Collaboration Technologies. Novel Learning Ecosystems, 2017

2016
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System.
Proceedings of the 5th Annual Conference on Research in Information Technology, 2016

Measuring the Human Factor in Information Security and Privacy.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Focus Group: Developing a Resilient, Agile Cybersecurity Educational System (RACES).
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

Setting a Privacy and Security Comfort Zone in the Internet of Things.
Proceedings of the Foundations of Augmented Cognition, 2015

2014
Application of pedagogical fundamentals for the holistic development of cybersecurity professionals.
Inroads, 2014

Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092).
Dagstuhl Reports, 2014

Software architecture model driven reverse engineering approach to open source software development.
Proceedings of the 3rd annual conference on Research in information technology, 2014

2013
Threats to municipal information systems posed by aging infrastructure.
Int. J. Crit. Infrastructure Prot., 2013

A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Seizure of digital data and "selective suppression" of digital evidence.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Leveraging 2<sup>nd</sup> life as a communications media: An effective tool for security awareness training.
Proceedings of the IEEE International Professonal Communication 2013 Conference, 2013

Gamification for Measuring Cyber Security Situational Awareness.
Proceedings of the Foundations of Augmented Cognition, 2013

2012
Digital Evidence Education in Schools of Law.
J. Digit. Forensics Secur. Law, 2012

Are we prepared for the economic risk resulting from telecom hotel disruptions?
Int. J. Crit. Infrastructure Prot., 2012

Unintended Consequences: Digital Evidence in Our Legal System.
IEEE Secur. Priv., 2012

On the Creation of Reliable Digital Evidence.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Visualizing an information assurance risk taxonomy.
Proceedings of the 6th IEEE Conference on Visual Analytics Science and Technology, 2011

2010
Digital Records Forensics: A New Science and Academic Program for Forensic Readiness.
J. Digit. Forensics Secur. Law, 2010

Secure Software Education: A Contextual Model-Based Approach.
Int. J. Secur. Softw. Eng., 2010

Assessment of Virtualization as a Sensor Technique.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Drive-by-Downloads.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.
Proceedings of the Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 2009

2008
Identification of malicious web pages through analysis of underlying DNS and web server relationships.
Proceedings of the LCN 2008, 2008

Identifying and Analyzing Web Server Attacks.
Proceedings of the Advances in Digital Forensics IV, 2008

Toward Trustworthy Service Consumers and Producers.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

An Operational Framework for Service Oriented Architecture Network Security.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
A Theoretical Framework for Organizational Network Forensic Readiness.
J. Comput., 2007

Specifying digital forensics: A forensics policy approach.
Digit. Investig., 2007

Capture - A behavioral analysis tool for applications and documents.
Digit. Investig., 2007

Forensics Education: Assessment and Measures of Excellence.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Calibration Testing Of Network Tap Devices.
Proceedings of the Advances in Digital Forensics III, 2007

Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations.
Proceedings of the Foundations of Augmented Cognition, 2007

2004
A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum.
Proceedings of the 17th Conference on Software Engineering Education and Training (CSEE&T 2004), 2004

2003
Ethics and Teaching Information Assurance.
IEEE Secur. Priv., 2003


  Loading...