Kara L. Nance
According to our database1,
Kara L. Nance
authored at least 35 papers
between 1994 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Comput. Secur., 2018
2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments.
IT Prof., 2011
Proceedings of the Information Assurance and Security Education and Training, 2011
The Strengths and Challenges of Analogical Approaches to Computer Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
2010
Computer Forensics Investigators or Private Investigators: Who Is Investigating the Drive?.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
The PATH Project: Partnerships for Automated Transformations of Heterogeneous Datasets.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Investigating the Implications of Virtual Machine Introspection for Digital Forensics.
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
J. Digit. Forensic Pract., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
2007
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model.
Proceedings of the New Approaches for Security, 2007
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
2005
Comput. Geosci., 2005
2004
Automating javascript-based test creation for client-side online testing.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
2000
The Lattice Polynomial of a Graph.
Ars Comb., 2000
1994
Proceedings of the Conference on Ethics in Computer Age, 1994