Melissa Dark

According to our database1, Melissa Dark authored at least 28 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage.
Comput. Secur., 2021

High School Cybersecurity: Curriculum Concepts, Content, and Course Construction.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

2019
Learning Principles and the Secure Programming Clinic.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

2018
CLARK - The Cybersecurity Labs and Resource Knowledge-base - A Living Digital Library.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

2017
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research.
CoRR, 2017

Evaluating Secure Programming Knowledge.
Proceedings of the Information Security Education for a Global Digital Society, 2017

Agile Research for Cybersecurity: Creating Authoritative, Actionable Knowledge When Speed Matters.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2015
Evaluating Cybersecurity Education Interventions: Three Case Studies.
IEEE Secur. Priv., 2015

Evaluation Theory and Practice Applied to Cybersecurity Education.
IEEE Secur. Priv., 2015

Thinking about Cybersecurity.
IEEE Secur. Priv., 2015

Realism in Teaching Cybersecurity Research: The Agile Research Process.
Proceedings of the Information Security Education Across the Curriculum, 2015

Toward a Data Spillage Prevention Process in Hadoop using Data Provenance.
Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, 2015

2014
Advancing Cybersecurity Education.
IEEE Secur. Priv., 2014

Toward curricular guidelines for cybersecurity.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2009
An exploration of the current state of information assurance education.
ACM SIGCSE Bull., 2009

Risk Perceptions of Information Security: A Measurement Study.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Virtual Classroom Extension for Effective Distance Education.
IEEE Computer Graphics and Applications, 2008

2007
Pedagogical Framework for EthicalDevelopment.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class.
Int. J. Inf. Commun. Technol. Educ., 2007

A multi-expertise application-driven class.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Information Security Education and Foundational Research.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Privacy and the Public Educator.
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007

2006
Ethical attributes in computing and computing education: An exploratory study.
J. Inf. Commun. Ethics Soc., 2006

Designing a flexible, multipurpose remote lab for the IT curriculum.
Proceedings of the 7th Conference on Information Technology Education, 2006

Minitrack Introduction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2003
Teaching Students to Design Secure Systems.
IEEE Secur. Priv., 2003


  Loading...