Dale C. Rowe

According to our database1, Dale C. Rowe authored at least 18 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Training Future Cybersecurity Professionals in Spear Phishing using SiEVE.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

2017
Starships and Cybersecurity: Teaching Security Concepts through Immersive Gaming Experiences.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

2016
Workshop: Capturing Students, by Capturing Flags.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

A Profile of SIGITE/RIIT Authors.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

The Untrustables: How Underclassmen Evolved Our Approach to Student Red-Teaming.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

2015
The SNAP principle for mitigating privileged account breaches: How secondary non-admin privileged accounts can reduce breach impact.
Proceedings of the 2015 World Congress on Internet Security, 2015

Systems Administration at the Graduate Level: Defining the Undefined.
Proceedings of the 16th Annual Conference on Information Technology Education, 2015

2014
Three-dimensional wireless heat mapping and security assessment using multi-rotor aerial drones.
Proceedings of the 3rd annual conference on Research in information technology, 2014

2013
Training cyber-defense and securing information assets using student blue teams.
Proceedings of the 14th Annual ACM SIGITE Conference on Information Technology Education, 2013

Design and evaluation of face tracking user interfaces for accessibility.
Proceedings of the 2nd annual conference on Research in information technology, 2013

Using agent technologies to correlate and compare anti-malware software.
Proceedings of the 2nd annual conference on Research in information technology, 2013

2012
Risks, rewards and raising awareness: training a cyber workforce using student red teams.
Proceedings of the ACM Special Interest Group for Information Technology Education Conference, 2012

Improving accuracy in face tracking user interfaces using consumer devices.
Proceedings of the 1st Annual conference on Research in information technology, 2012

Mapping the cyber security terrain in a research context.
Proceedings of the 1st Annual conference on Research in information technology, 2012

A survey SCADA of and critical infrastructure incidents.
Proceedings of the 1st Annual conference on Research in information technology, 2012

2011
Teaching natural user interaction using OpenNI and the Microsoft Kinect sensor.
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011

An assessment framework for identifying information technology programs.
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011

The role of cyber-security in information technology education.
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011


  Loading...