Year |
Citation |
Score |
2014 |
Tweneboah-Koduah S, Tsetse A, Endicott-Popovsky B. Barriers To Government Cloud Adoption International Journal of Managing Information Technology. 6: 1-16. DOI: 10.5121/Ijmit.2014.6301 |
0.314 |
|
2014 |
Miller JD, Chung S, Escrig T, Bai Y, Endicott-popovsky B, Whittington J. Accuracy, Security, and Architecture Impacts and Challenges of Mobile and Web Technologies:Geolocation Field Data Collection in Washington State Water Resources International Journal of Computer Applications. 92: 35-42. DOI: 10.5120/16071-5267 |
0.337 |
|
2013 |
Armbruster G, Endicott-Popovsky B, Whittington J. Threats to municipal information systems posed by aging infrastructure International Journal of Critical Infrastructure Protection. 6: 123-131. DOI: 10.1016/J.Ijcip.2013.08.001 |
0.309 |
|
2010 |
Simpson JJ, Simpson MJ, Endicott-Popovsky B, Popovsky V. Secure Software Education: A Contextual Model-Based Approach International Journal of Secure Software Engineering. 1: 35-61. DOI: 10.4018/Jsse.2010100103 |
0.322 |
|
2010 |
Duranti L, Endicott-Popovsky B. Digital Records Forensics: A New Science and Academic Program for Forensic Readiness The Journal of Digital Forensics, Security and Law. 5: 45-62. DOI: 10.15394/Jdfsl.2010.1075 |
0.316 |
|
2010 |
Narvaez J, Endicott-Popovsky B, Seifert C, Aval C, Frincke DA. Drive-by-downloads Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2010.160 |
0.596 |
|
2009 |
Endicott-Popovsky B, Narvaez J, Seifert C, Frincke DA, O'Neil LR, Aval C. Use of deception to improve client honeypot detection of drive-by-download attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5638: 138-147. DOI: 10.1007/978-3-642-02812-0_17 |
0.616 |
|
2008 |
Bunge R, Chung S, Endicott-Popovsky B, McLane D. An operational framework for Service Oriented Architecture network security Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2008.64 |
0.341 |
|
2008 |
Seifert C, Endicott-Popovsky B, Frincke D, Komisarczuk P, Muschevici R, Welch I. Identifying and analyzing web server attacks Ifip International Federation For Information Processing. 285: 151-161. DOI: 10.1007/978-0-387-84927-0_13 |
0.332 |
|
2007 |
Endicott-Popovsky B, Frincke DA, Taylor CA. A theoretical framework for organizational network forensic readiness Journal of Computers. 2: 1-11. DOI: 10.4304/Jcp.2.3.1-11 |
0.687 |
|
2007 |
Erbacher RF, Endicott-Popovsky B, Frincke DA. Challenge paper: Validation of forensic techniques for criminal prosecution Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 150-151. DOI: 10.1109/SADFE.2007.5 |
0.619 |
|
2007 |
Endicott-Popovsky BE, Fluckiger JD, Frincke DA. Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration needs Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 131-144. DOI: 10.1109/SADFE.2007.10 |
0.661 |
|
2007 |
Endicott-Popovsky BE, Frincke DA. The observability calibration test development framework Proceedings of the 2007 Ieee Workshop On Information Assurance, Iaw. 61-66. DOI: 10.1109/IAW.2007.381915 |
0.67 |
|
2007 |
Taylor C, Endicott-Popovsky B, Frincke DA. Specifying digital forensics: A forensics policy approach Dfrws 2007 Annual Conference. DOI: 10.1016/j.diin.2007.06.006 |
0.626 |
|
2007 |
Endicott-Popovsky B, Frincke DA. Embedding hercule poirot in networks: Addressing inefficiencies in digital forensic investigations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4565: 364-372. |
0.68 |
|
2006 |
Endicott-Popovsky BE, Frincke DA. Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 133-139. |
0.673 |
|
2004 |
Endicott-Popovsky B, Frincke DA. A case study in rapid introduction of an information assurance track into a software engineering curriculum Software Engineering Education Conference, Proceedings. 17: 118-123. |
0.615 |
|
Show low-probability matches. |