Siddharth Kaza
Orcid: 0000-0002-9561-6128
According to our database1,
Siddharth Kaza
authored at least 71 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Fine-Tuning AI to Assist in Building Curriculum for the CIA Triad and Cyber Kill Chain.
Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 2, 2024
2022
National Cybersecurity Curriculum Task Force: How you can contribute to and benefit from high-quality, high-impact cybersecurity curriculum.
Proceedings of the SIGITE '22: The 23rd Annual Conference on Information Technology Education, Chicago, IL, USA, September 21, 2022
2021
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula.
IEEE Secur. Priv., 2021
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021
Minimizing Cognitive Overload in Cybersecurity Learning Materials: An Experimental Study Using Eye-Tracking.
Proceedings of the Information Security Education for Cyber Resilience, 2021
Proceedings of the 2021 Symposium on Eye Tracking Research and Applications, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
2018
CLARK - The Cybersecurity Labs and Resource Knowledge-base - A Living Digital Library.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Introducing Secure Coding in Undergraduate (CS0, CS1, and CS2) and High School (AP Computer Science A) Programming Courses: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
2017
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the Information Security Education for a Global Digital Society, 2017
2016
Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses.
ACM Trans. Comput. Educ., 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Security Injections 2.0: Increasing Ability to Apply Secure Coding Knowledge using Segmented and Interactive Modules in CS0.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
2015
Security Injections 2.0: Using Segmentation, Instant-feedback, and Auto-grading to Enhance Secure Coding Modules for Lower-level Programming Courses (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses.
Proceedings of the Information Security Education Across the Curriculum, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Revitalizing the computer science undergraduate curriculum inside and outside of the classroom using mobile computing platforms (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the E-Learning, E-Education, and Online Training, 2014
2013
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
2012
ACM Trans. Inf. Syst., 2012
Exploratory experiments to identify fake websites by using features from the network stack.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Using burst detection techniques to identify suspicious vehicular traffic at border crossings.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Social networking in government: an exploration of the use of the Twitter micro-blogging service by U. S. state governors.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012
2011
Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India.
J. Assoc. Inf. Sci. Technol., 2011
Designing, Implementing, and Evaluating Information Systems for Law Enforcement - A Long-Term Design-Science Research Project.
Commun. Assoc. Inf. Syst., 2011
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011
A model for piloting pathways for computational thinking in a general education curriculum.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011
Security injections: modules to help students remember, understand, and apply secure coding techniques.
Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2011
2010
Proceedings of the Data Mining for Social Network Data, 2010
2009
Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security.
IEEE Trans. Intell. Transp. Syst., 2009
J. Assoc. Inf. Sci. Technol., 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
2008
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008
J. Assoc. Inf. Sci. Technol., 2008
Evaluating ontology mapping techniques: An experiment in public safety information sharing.
Decis. Support Syst., 2008
Proceedings of the Digital Government: E-Government Research, 2008
2007
Decis. Support Syst., 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007
2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006
COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006
2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the 2005 National Conference on Digital Government Research, 2005
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 2005 National Conference on Digital Government Research, 2005
Proceedings of the 2005 National Conference on Digital Government Research, 2005
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005
2004
Proceedings of the Intelligence and Security Informatics, 2004
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004
2003
Identification of Deliberately Doctored Text Documents Using The Frequency Keyword Chain (FKC) Model.
Proceedings of the 2003 IEEE International Conference on Information Reuse and Integration, 2003