Daniel Shoemaker

Affiliations:
  • University of Detroit Mercy, Center for Cybersecurity, MI, USA


According to our database1, Daniel Shoemaker authored at least 27 papers between 1994 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Teaching Secure Acquisition in Higher Education.
IEEE Secur. Priv., 2020

Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education.
Proceedings of the 32nd IEEE Conference on Software Engineering Education and Training, 2020

2016
Advances in Software Engineering and Software Assurance.
Adv. Comput., 2016

2014
The colloquium for information system security education (CISSE)-the adventure continues.
Inroads, 2014

Software Assurance.
Proceedings of the Computing Handbook, 2014

2013
Principles and Measurement Models for Software Assurance.
Int. J. Secur. Softw. Eng., 2013

The software assurance competency model: A roadmap to enhance individual professional capability.
Proceedings of the 26th International Conference on Software Engineering Education and Training, 2013

2012
Foundations for Software Assurance.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational Initiatives.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Defining the Discipline of Secure Software Assurance: Initial Findings from the National Software Assurance Repository.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Teaching Security Requirements Engineering Using SQUARE.
Proceedings of the Fourth International Workshop on Requirements Engineering Education and Training, 2009

Ensuring Cost Efficient and Secure Software through Student Case Studies in Risk and Requirements Prioritization.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Integrating Secure Software Assurance Content with SE2004 Recommendations.
Proceedings of the Proceedings 21st Conference on Software Engineering Education and Training, 2008

An Immersion Program to Help Students Understand the Impact of Cross Cultural Differences in Software Engineering Work.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Threat Modeling the Enterprise.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
A Comparison of the Software Assurance Common Body of Knowledge to Common Curricular Standards.
Proceedings of the 20th Conference on Software Engineering Education and Training (CSEE&T 2007), 2007

On the Feasibility of Specialization within Software Engineering Degree Programs.
Proceedings of the 20th Conference on Software Engineering Education and Training (CSEE&T 2007), 2007

2005
Data Mining and the Five Pillars of Information Assurance: Where Does Society Draw the Line?
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Navigating the Information Security Landscape: Mapping the Relationship Between ISO 15408: 1999 and ISO 17799: 2000.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
A Standard Methodology for Embedding Security Functionality Within Formal Specifications of Requirements.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
A case for the study of software management within a broad information technology curriculum.
Proceedings of the 4th conference on Information technology curriculum, 2003

2002
Panel 3: Software Engineering Masters Programs - Lessons Learned.
Proceedings of the 15th Conference on Software Engineering Education and Training (CSEET'02), 2002

2001
Independent Accreditation for Software Engineering Programs?
Proceedings of the 14th Conference on Software Engineering Education and Training, 2001

1996
Educating software executives: a doctorate in software management.
ACM SIGSOFT Softw. Eng. Notes, 1996

1994
The Case for the Study of Software Management.
J. Inf. Syst. Educ., 1994


  Loading...