Barbara Endicott-Popovsky, Ph.D.
Affiliations: | 2007 | University of Idaho, Moscow, ID, United States |
Area:
Computer ScienceGoogle:
"Barbara Endicott-Popovsky"Parents
Sign in to add mentorDeborah A. Frincke | grad student | 2007 | University of Idaho | |
(A methodology for calibrating forensic ready, low layer network devices.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Tweneboah-Koduah S, Tsetse A, Endicott-Popovsky B. (2014) Barriers To Government Cloud Adoption International Journal of Managing Information Technology. 6: 1-16 |
Miller JD, Chung S, Escrig T, et al. (2014) Accuracy, Security, and Architecture Impacts and Challenges of Mobile and Web Technologies:Geolocation Field Data Collection in Washington State Water Resources International Journal of Computer Applications. 92: 35-42 |
Armbruster G, Endicott-Popovsky B, Whittington J. (2013) Threats to municipal information systems posed by aging infrastructure International Journal of Critical Infrastructure Protection. 6: 123-131 |
Simpson JJ, Simpson MJ, Endicott-Popovsky B, et al. (2010) Secure Software Education: A Contextual Model-Based Approach International Journal of Secure Software Engineering. 1: 35-61 |
Duranti L, Endicott-Popovsky B. (2010) Digital Records Forensics: A New Science and Academic Program for Forensic Readiness The Journal of Digital Forensics, Security and Law. 5: 45-62 |
Narvaez J, Endicott-Popovsky B, Seifert C, et al. (2010) Drive-by-downloads Proceedings of the Annual Hawaii International Conference On System Sciences |
Endicott-Popovsky B, Narvaez J, Seifert C, et al. (2009) Use of deception to improve client honeypot detection of drive-by-download attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5638: 138-147 |
Bunge R, Chung S, Endicott-Popovsky B, et al. (2008) An operational framework for Service Oriented Architecture network security Proceedings of the Annual Hawaii International Conference On System Sciences |
Seifert C, Endicott-Popovsky B, Frincke D, et al. (2008) Identifying and analyzing web server attacks Ifip International Federation For Information Processing. 285: 151-161 |
Endicott-Popovsky B, Frincke DA, Taylor CA. (2007) A theoretical framework for organizational network forensic readiness Journal of Computers. 2: 1-11 |