Edward Sobiesk

Orcid: 0000-0002-0866-7745

According to our database1, Edward Sobiesk authored at least 23 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Seeing the Whole Elephant - A Comprehensive Framework for Data Education.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2021
Creating a Multifarious Cyber Science Major.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

2020
Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum.
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, 2020

2019
Educating Future Multidisciplinary Cybersecurity Teams.
Computer, 2019

2017
Information Technology as a Cyber Science.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

Perspectives on the future of cybersecurity education.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
Evaluating Adversarial Interfaces: An Automated Approach.
IEEE Technol. Soc. Mag., 2016

A Capstone Design Project for Teaching Cybersecurity to Non-technical Users.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

What is Information Technology's Role in Cybersecurity?
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Developing ABET criteria for undergraduate cybersecurity programs.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2015
Cyber Education: A Multi-Level, Multi-Discipline Approach.
Proceedings of the 16th Annual Conference on Information Technology Education, 2015

2014
Meaningful assessment.
Proceedings of the 15th Annual Conference on Information Technology Education, 2014

2013
Should IT2008 be revised?
Proceedings of the 14th Annual ACM SIGITE Conference on Information Technology Education, 2013

Automated webpage evaluation.
Proceedings of the 2nd annual conference on Research in information technology, 2013

2010
Malicious interface design: exploiting the user.
Proceedings of the 19th International Conference on World Wide Web, 2010

2009
Malicious Interfaces and Personalization's Uninviting Future.
IEEE Secur. Priv., 2009

2007
The Cost of Free Web Tools.
IEEE Secur. Priv., 2007

Self-monitoring of web-based information disclosure.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

An honest man has nothing to fear: user perceptions on web-based information disclosure.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

2006
Strengthening the Weakest Link in Digital Protection.
IEEE Secur. Priv., 2006

Designing an interdisciplinary information technology program.
Proceedings of the 7th Conference on Information Technology Education, 2006

2004
Using Group Knowledge for Multitarget Terrain-Based State Estimation.
Proceedings of the Distributed Autonomous Robotic Systems 6, 2004

1998
Tracking multiple objects in terrain.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998


  Loading...