Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Government-Based Security Standards., , and . Information Systems Security, 6 (3): 9-19 (1997)The Role of Exercises in Training the Nation's Cyber First-Responders., and . AMCIS, page 560. Association for Information Systems, (2004)Academia Leadership in Improving the Cybersecurity Posture of Government and Local Communities., , , and . HICSS, page 1911-1920. ScholarSpace, (2024)An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection., and . IPDPS, page 1-8. IEEE, (2007)Analysis of Payload Based Application level Network Anomaly Detection., and . HICSS, page 99. IEEE Computer Society, (2007)e-Government and Cyber Security: The Role of Cyber Security Exercises., and . HICSS, IEEE Computer Society, (2006)Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events., , and . HICSS, IEEE Computer Society, (2004)Introduction to Infrastructure Security Minitrack., , and . HICSS, page 1986. IEEE Computer Society, (2014)Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack., , and . HICSS, page 2252. IEEE Computer Society, (2015)The Honey Community: Use of Combined Organizational Data for Community Protection., , and . HICSS, page 2288-2297. IEEE Computer Society, (2015)