Ronald C. Dodge

According to our database1, Ronald C. Dodge authored at least 29 papers between 1998 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Creating Assessment Tools for Cybersecurity Education (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

2013
Information Assurance and Security in the ACM/IEEE CS2013.
Proceedings of the Information Assurance and Security Education and Training, 2013

Introduction to Virtualization: Environments, Research, and Education Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Introduction to Insider Threat Modeling, Detection, and Mitigation Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Teaching secure coding: report from summit on education in secure software.
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Empirical Benefits of Training to Phishing Susceptibility.
Proceedings of the Information Security and Privacy Research, 2012

The Influences of Social Networks on Phishing Vulnerability.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Cybersecurity Workforce Development Directions.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
Creating Shareable Security Modules.
Proceedings of the Information Assurance and Security Education and Training, 2011

2009
Reaching Today's Information Security Students.
Proceedings of the Information Assurance and Security Education and Training, 2009

Replicating and Sharing Computer Security Laboratory Environments.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Standards-Based Cyber Exercises.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Virtualization and Digital Forensics: A Research and Education Agenda.
J. Digit. Forensic Pract., 2008

Using Virtualization to Create and Deploy Computer Security Lab Exercises.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Skype Fingerprint.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Phishing for user security awareness.
Comput. Secur., 2007

Remote Virtual Information Assurance Network.
Proceedings of the New Approaches for Security, 2007

"Out of the Box" Forensics Labs.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Using Phishing for User Email Security Awareness.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
Exploring a National Cybersecurity Exercise for Universities.
IEEE Secur. Priv., 2005

Technology Education at the US Military Academy.
IEEE Secur. Priv., 2005

2004
Do Military Forces Need Ph.D.s?
Proceedings of the Information Security Management, Education and Privacy, 2004

Organized Cyber Defense Competitions.
Proceedings of the IEEE International Conference on Advanced Learning Technologies, 2004

2003
Information Assurance the West Point Way.
IEEE Secur. Priv., 2003

Network traffic analysis from the Cyber Defense Exercise.
Proceedings of the IEEE International Conference on Systems, 2003

Organization and training of a cyber security team.
Proceedings of the IEEE International Conference on Systems, 2003

A Virtual Environment for IA Education.
Proceedings of the IEEE Systems, 2003

2001
Preserving QoS of e-commerce sites through self-tuning: a performance model approach.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

1998
Prefetching Inlines to Improve Web Server Latency.
Proceedings of the 24th International Computer Measurement Group Conference, 1998


  Loading...