Barbara Endicott-Popovsky
According to our database1,
Barbara Endicott-Popovsky
authored at least 43 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Augmented Cognition, 2024
2023
Proceedings of the Augmented Cognition, 2023
2019
Proceedings of the Augmented Cognition, 2019
2018
Proceedings of the Learning and Collaboration Technologies. Learning and Teaching, 2018
Applications of Distributed Socio-technical Synthetic Intelligent (SI) Systems Using Hybrid "Compensating Controls" Architectures.
Proceedings of the Learning and Collaboration Technologies. Learning and Teaching, 2018
2017
Security Beyond Secrecy - Practical Strategies to Address Emerging Cybersecurity Paradoxes Through Professional and Stakeholder Education and Co-management Architectures Designed to Cultivate Community-Situated, Non-technical Structures of Group Synthetic Intelligence (aka "Neighborhood Watch").
Proceedings of the Learning and Collaboration Technologies. Novel Learning Ecosystems, 2017
2016
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System.
Proceedings of the 5th Annual Conference on Research in Information Technology, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015
Proceedings of the Foundations of Augmented Cognition, 2015
2014
Application of pedagogical fundamentals for the holistic development of cybersecurity professionals.
Inroads, 2014
Dagstuhl Reports, 2014
Software architecture model driven reverse engineering approach to open source software development.
Proceedings of the 3rd annual conference on Research in information technology, 2014
2013
Int. J. Crit. Infrastructure Prot., 2013
A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks.
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013
Leveraging 2<sup>nd</sup> life as a communications media: An effective tool for security awareness training.
Proceedings of the IEEE International Professonal Communication 2013 Conference, 2013
Proceedings of the Foundations of Augmented Cognition, 2013
2012
Int. J. Crit. Infrastructure Prot., 2012
IEEE Secur. Priv., 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
2011
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Proceedings of the 6th IEEE Conference on Visual Analytics Science and Technology, 2011
2010
Digital Records Forensics: A New Science and Academic Program for Forensic Readiness.
J. Digit. Forensics Secur. Law, 2010
Int. J. Secur. Softw. Eng., 2010
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
Proceedings of the Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 2009
2008
Identification of malicious web pages through analysis of underlying DNS and web server relationships.
Proceedings of the LCN 2008, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
2007
J. Comput., 2007
Digit. Investig., 2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the Advances in Digital Forensics III, 2007
Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations.
Proceedings of the Foundations of Augmented Cognition, 2007
2004
A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum.
Proceedings of the 17th Conference on Software Engineering Education and Training (CSEE&T 2004), 2004
2003