Michael E. Whitman

Orcid: 0000-0002-4075-0995

According to our database1, Michael E. Whitman authored at least 32 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Modeling reporting delays in cyber incidents: an industry-level comparison.
Int. J. Inf. Sec., 2023

Authentic Learning on Machine Learning for Cybersecurity.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Malware Detection and Prevention using Artificial Intelligence Techniques.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Challenges in the Instruction of Risk Management.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2015
Ongoing threats to information protection.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

2013
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited.
Int. J. Interdiscip. Telecommun. Netw., 2013

2010
The enemy is still at the gates: threats to information security revisited.
Proceedings of the Information Security Curriculum Development Conference, 2010

2007
Regulatory Compliance in Information Technology and Information Security.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

2005
Developing and Implementing Information Security Programs: AMCIS 2005 Workshop Proposal.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Workshop on designing and teaching information security curriculum.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

INFOSEC Policy - The Foundation for an Effective Security Program.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
In defense of the realm: understanding the threats to information security.
Int. J. Inf. Manag., 2004

2003
Enemy at the gate: threats to information security.
Commun. ACM, 2003

2001
A Study of User Attitudes toward Persistent Cookies.
J. Comput. Inf. Syst., 2001

1999
Research Commentary. Academic Rewards for Teaching, Research, and Service: Data and Discourse.
Inf. Syst. Res., 1999

The Communications Decency Act: An Update for is Management.
Inf. Syst. Manag., 1999

Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas?
Inf. Secur. J. A Glob. Perspect., 1999

Considerations for an Effective Telecommunications-Use Policy.
Commun. ACM, 1999

The Communications Decency Act Is not as Dead as You Think.
Commun. ACM, 1999

1998
An examination of cross-national differences.
SIGCAS Comput. Soc., 1998

The Threat of Long-Arm Jurisdiction to Electronic Commerce.
Commun. ACM, 1998

1997
A Look at the Telecommunications ACT of 1996.
Inf. Syst. Manag., 1997

1996
Enterprise Modeling for Strategic Support.
Inf. Syst. Manag., 1996

IT divergence in reengineering support: Performance expectations vs. perceptions.
Inf. Manag., 1996


  Loading...