Siddharth Kaza

According to our database1, Siddharth Kaza authored at least 69 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula.
IEEE Secur. Priv., 2021

Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

Minimizing Cognitive Overload in Cybersecurity Learning Materials: An Experimental Study Using Eye-Tracking.
Proceedings of the Information Security Education for Cyber Resilience, 2021

Minimizing Cognitive Load in Cyber Learning Materials - An Eye Tracking Study.
Proceedings of the 2021 Symposium on Eye Tracking Research and Applications, 2021

Is there a Security Mindset and Can it be Taught?
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Security Evaluation of Digital Libraries.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Cybersecurity Program Accreditation: Benefits and Challenges.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2018
Hello, World! - Code Responsibly.
IEEE Secur. Priv., 2018

CLARK - The Cybersecurity Labs and Resource Knowledge-base - A Living Digital Library.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Introducing Secure Coding in Undergraduate (CS0, CS1, and CS2) and High School (AP Computer Science A) Programming Courses: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Special Session: Joint Task Force on Cybersecurity Education.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

2017
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

ACM Joint Task Force on Cybersecurity Education.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Cybersecurity Curricular Guidelines.
Proceedings of the Information Security Education for a Global Digital Society, 2017

2016
Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses.
ACM Trans. Comput. Educ., 2016

Introducing Secure Coding in CS0, CS1, and CS2 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Security Injections 2.0: Increasing Ability to Apply Secure Coding Knowledge using Segmented and Interactive Modules in CS0.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Special Session: ACM Joint Task Force on Cyber Education.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Integrating security in the computer science curriculum.
Inroads, 2015

Security Injections 2.0: Using Segmentation, Instant-feedback, and Auto-grading to Enhance Secure Coding Modules for Lower-level Programming Courses (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Introducing Secure Coding in CS0, CS1, and CS2. (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses.
Proceedings of the Information Security Education Across the Curriculum, 2015

Preparing Industry-ready Analysts In the Classroom: A Module Injection Approach.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Interactive e-learning modules for teaching secure: a pilot study (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Incorporating mobile computing into the CS curriculum (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Revitalizing the computer science undergraduate curriculum inside and outside of the classroom using mobile computing platforms (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Segmented and Interactive Modules for Teaching Secure Coding: A Pilot Study.
Proceedings of the E-Learning, E-Education, and Online Training, 2014

2013
Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites.
CoRR, 2013

Introducing secure coding in CS0 and CS1 (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2012
Detecting Fake Medical Web Sites Using Recursive Trust Labeling.
ACM Trans. Inf. Syst., 2012

Exploratory experiments to identify fake websites by using features from the network stack.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Using burst detection techniques to identify suspicious vehicular traffic at border crossings.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Social networking in government: an exploration of the use of the Twitter micro-blogging service by U. S. state governors.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012

2011
Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India.
J. Assoc. Inf. Sci. Technol., 2011

Designing, Implementing, and Evaluating Information Systems for Law Enforcement - A Long-Term Design-Science Research Project.
Commun. Assoc. Inf. Syst., 2011

Security in computer literacy: a model for design, dissemination, and assessment.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

A model for piloting pathways for computational thinking in a general education curriculum.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Security injections: modules to help students remember, understand, and apply secure coding techniques.
Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2011

2010
Identifying High-Status Nodes in Knowledge Networks.
Proceedings of the Data Mining for Social Network Data, 2010

2009
Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security.
IEEE Trans. Intell. Transp. Syst., 2009

Identifying significant facilitators of dark network evolution.
J. Assoc. Inf. Sci. Technol., 2009

Effect of Inventor Status on Intra-Organizational Innovation Evolution.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Suspect Vehicle Identification for Border Safety.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Instance, Evolution, and Predictive Modeling of Social Networks.
PhD thesis, 2008

Using importance flooding to identify interesting networks of criminal activity.
J. Assoc. Inf. Sci. Technol., 2008

Evaluating ontology mapping techniques: An experiment in public safety information sharing.
Decis. Support Syst., 2008

Public Safety Information Sharing: An Ontological Perspective.
Proceedings of the Digital Government: E-Government Research, 2008

2007
Enhancing border security: Mutual information analysis to identify suspect vehicles.
Decis. Support Syst., 2007

The Arizona IDMatcher: A Probabilistic Identity Matching System.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

The Arizona IDMatcher: developing an identity matching tool for law enforcement.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007

Predicting criminal relationships using multivariate survival analysis.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007

2006
Suspect Vehicle Identification for Border Safety with Modified Mutual Information.
Proceedings of the Intelligence and Security Informatics, 2006

Target vehicle identification for border safety with modified mutual information.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

2005
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.
Proceedings of the Intelligence and Security Informatics, 2005

Topological analysis of criminal activity networks in multiple jurisdictions.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

BorderSafe: cross-jurisdictional information sharing, analysis, and visualization.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Visualization in law enforcement.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Analyzing and Visualizing Criminal Network Dynamics: A Case Study.
Proceedings of the Intelligence and Security Informatics, 2004

Cross-Jurisdictional Activity Networks to Support Criminal Investigations.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

2003
Identification of Deliberately Doctored Text Documents Using The Frequency Keyword Chain (FKC) Model.
Proceedings of the 2003 IEEE International Conference on Information Reuse and Integration, 2003


  Loading...