Kara L. Nance

According to our database1, Kara L. Nance authored at least 35 papers between 1994 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Internet- and cloud-of-things cybersecurity research challenges and advances.
Comput. Secur., 2018

2017
Introduction to Deception, Digital Forensics, and Malware Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Reducing Complex Visualizations for Analysis.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introduction to Inside the Insider Threat Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Mitigating 0-Days through Heap Techniques - An Empirical Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Introduction to the Inside the Insider Threat Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2014
Introduction to Digital Forensics: Education, Research, and Practice Minitrack.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Teaching secure coding: the myths and the realities.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Introduction to Digital Forensics - Education, Research, and Practice Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Identifying Weaknesses in VM/Hypervisor Interfaces.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Circumventing cryptography in virtualized environments.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments.
IT Prof., 2011

Creating Shareable Security Modules.
Proceedings of the Information Assurance and Security Education and Training, 2011

The Strengths and Challenges of Analogical Approaches to Computer Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2011

Legal Aspects of Digital Forensics: A Research Agenda.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Storm Clouds Rising: Security Challenges for IaaS Cloud Computing.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Applying Formal Methods Informally.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Computer Forensics Investigators or Private Investigators: Who Is Investigating the Drive?.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

The PATH Project: Partnerships for Automated Transformations of Heterogeneous Datasets.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Teach Them When They Aren't Looking: Introducing Security in CS1.
IEEE Secur. Priv., 2009

Live Analysis: Progress and Challenges.
IEEE Secur. Priv., 2009

Replicating and Sharing Computer Security Laboratory Environments.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Digital Forensics: Defining a Research Agenda.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Investigating the Implications of Virtual Machine Introspection for Digital Forensics.
Proceedings of the The Forth International Conference on Availability, 2009

Standards-Based Cyber Exercises.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Virtualization and Digital Forensics: A Research and Education Agenda.
J. Digit. Forensic Pract., 2008

Virtual Machine Introspection: Observation or Interference?
IEEE Secur. Priv., 2008

Using Virtualization to Create and Deploy Computer Security Lab Exercises.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model.
Proceedings of the New Approaches for Security, 2007

Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2005
Automatic transformations between geoscience standards using XML.
Comput. Geosci., 2005

2004
Automating javascript-based test creation for client-side online testing.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2000
The Lattice Polynomial of a Graph.
Ars Comb., 2000

1994
Ethical accountability in the cyberspace.
Proceedings of the Conference on Ethics in Computer Age, 1994


  Loading...