Sixth Workshop on Education in Computer Security (WECS6): Avoiding Fear, Uncertainty and Doubt Through Effective Security Education
暂无分享,去创建一个
Susan Older | Cynthia E. Irvine | Michael F. Thompson | Matt Bishop | Timothy E. Levin | Kamal Jabbour | Rahul V. Tikekar | William Hugh Murray | Paul C. Clark | Ronald Dodge | Daniel J. Ragsdale | Chris Eagle | John L. Clark | Everett L. Bull | Jim Griffin | Richard T. Brown | John D. Fulp | Corrinne Sande | Parker Swanson | Jill M. Snyder | Diane Pannell
[1] S. K. Chin. Using Outcomes-based Assessment as an Assurance Tool for Assurance Education , 2003 .
[2] Deborah A. Frincke,et al. Teaching robust programming , 2004, IEEE Security & Privacy Magazine.
[3] Vincent Tinto,et al. Building and Sustaining Learning Communities: The Syracuse University Experience , 2004 .
[4] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[5] E. Anderson,et al. A Demonstration of the subversion threat : facing a critical responsibility in the defense of cyberspace , 2002 .
[6] Fred B. Schneider,et al. A Language-Based Approach to Security , 2001, Informatics.
[7] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[8] Roger R. Schell,et al. Concepts and Terminology for Computer Security , 2006 .
[9] Cynthia E. Irvine,et al. Teaching Objectives of a Simulation Game for Computer Security , 2003 .
[10] Cynthia E. Irvine,et al. A cautionary note regarding the data integrity capacity of certain secure systems , 2001, IICIS.