Barbara Endicott-Popovsky, Ph.D. - Publications

Affiliations: 
2007 University of Idaho, Moscow, ID, United States 
Area:
Computer Science

17 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Tweneboah-Koduah S, Tsetse A, Endicott-Popovsky B. Barriers To Government Cloud Adoption International Journal of Managing Information Technology. 6: 1-16. DOI: 10.5121/Ijmit.2014.6301  0.314
2014 Miller JD, Chung S, Escrig T, Bai Y, Endicott-popovsky B, Whittington J. Accuracy, Security, and Architecture Impacts and Challenges of Mobile and Web Technologies:Geolocation Field Data Collection in Washington State Water Resources International Journal of Computer Applications. 92: 35-42. DOI: 10.5120/16071-5267  0.337
2013 Armbruster G, Endicott-Popovsky B, Whittington J. Threats to municipal information systems posed by aging infrastructure International Journal of Critical Infrastructure Protection. 6: 123-131. DOI: 10.1016/J.Ijcip.2013.08.001  0.309
2010 Simpson JJ, Simpson MJ, Endicott-Popovsky B, Popovsky V. Secure Software Education: A Contextual Model-Based Approach International Journal of Secure Software Engineering. 1: 35-61. DOI: 10.4018/Jsse.2010100103  0.322
2010 Duranti L, Endicott-Popovsky B. Digital Records Forensics: A New Science and Academic Program for Forensic Readiness The Journal of Digital Forensics, Security and Law. 5: 45-62. DOI: 10.15394/Jdfsl.2010.1075  0.316
2010 Narvaez J, Endicott-Popovsky B, Seifert C, Aval C, Frincke DA. Drive-by-downloads Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2010.160  0.596
2009 Endicott-Popovsky B, Narvaez J, Seifert C, Frincke DA, O'Neil LR, Aval C. Use of deception to improve client honeypot detection of drive-by-download attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5638: 138-147. DOI: 10.1007/978-3-642-02812-0_17  0.616
2008 Bunge R, Chung S, Endicott-Popovsky B, McLane D. An operational framework for Service Oriented Architecture network security Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2008.64  0.341
2008 Seifert C, Endicott-Popovsky B, Frincke D, Komisarczuk P, Muschevici R, Welch I. Identifying and analyzing web server attacks Ifip International Federation For Information Processing. 285: 151-161. DOI: 10.1007/978-0-387-84927-0_13  0.332
2007 Endicott-Popovsky B, Frincke DA, Taylor CA. A theoretical framework for organizational network forensic readiness Journal of Computers. 2: 1-11. DOI: 10.4304/Jcp.2.3.1-11  0.687
2007 Erbacher RF, Endicott-Popovsky B, Frincke DA. Challenge paper: Validation of forensic techniques for criminal prosecution Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 150-151. DOI: 10.1109/SADFE.2007.5  0.619
2007 Endicott-Popovsky BE, Fluckiger JD, Frincke DA. Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration needs Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 131-144. DOI: 10.1109/SADFE.2007.10  0.661
2007 Endicott-Popovsky BE, Frincke DA. The observability calibration test development framework Proceedings of the 2007 Ieee Workshop On Information Assurance, Iaw. 61-66. DOI: 10.1109/IAW.2007.381915  0.67
2007 Taylor C, Endicott-Popovsky B, Frincke DA. Specifying digital forensics: A forensics policy approach Dfrws 2007 Annual Conference. DOI: 10.1016/j.diin.2007.06.006  0.626
2007 Endicott-Popovsky B, Frincke DA. Embedding hercule poirot in networks: Addressing inefficiencies in digital forensic investigations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4565: 364-372.  0.68
2006 Endicott-Popovsky BE, Frincke DA. Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 133-139.  0.673
2004 Endicott-Popovsky B, Frincke DA. A case study in rapid introduction of an information assurance track into a software engineering curriculum Software Engineering Education Conference, Proceedings. 17: 118-123.  0.615
Show low-probability matches.