


default search action
9. World Conference on Information Security Education 2015: Hamburg, Germany
- Matt Bishop

, Natalia G. Miloslavskaya
, Marianthi Theocharidou
:
Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 453, Springer 2015, ISBN 978-3-319-18499-9
Innovative Methods
- Melissa Dark, Matt Bishop

, Richard C. Linger, Luanne Goldrich:
Realism in Teaching Cybersecurity Research: The Agile Research Process. 3-14 - Roberto Gallo

, Ricardo Dahab
:
Assurance Cases as a Didactic Tool for Information Security. 15-26 - Zequn Huang, Chien-Chung Shen, Sheetal Doshi, Nimmi Thomas, Ha Duong:

Cognitive Task Analysis Based Training for Cyber Situation Awareness. 27-40 - Erik L. Moore

, Daniel M. Likarish:
A Cyber Security Multi Agency Collaboration for Rapid Response that Uses AGILE Methods on an Education Infrastructure. 41-50
Software Security Education
- Audun Jøsang

, Marte Ødegaard, Erlend Oftedal:
Cybersecurity Through Secure Software Development. 53-63 - Sagar Raina, Blair Taylor, Siddharth Kaza:

Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses. 64-74 - Johan Van Niekerk, Lynn Futcher:

The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach. 75-83
Tools and Applications for Teaching
- Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg:

Learn to Spot Phishing URLs with the Android NoPhish App. 87-100 - Primoz Cigoj, Borka Jerman Blazic:

An Innovative Approach in Digital Forensic Education and Training. 101-110 - Sergey Zapechnikov

, Natalia G. Miloslavskaya
, Vladimir Budzko:
On Experience of Using Distance Learning Technologies for Teaching Cryptology. 111-121
Syllabus Design
- Lynette Drevin

, Günther Drevin:
Reflections on the Ethical Content of the IT Honours Program Project Module. 125-134 - Natalia G. Miloslavskaya

, Alexander I. Tolstoy
:
Professional Competencies Level Assessment for Training of Masters in Information Security. 135-145 - Sergey Zapechnikov

, Alexander I. Tolstoy
, Sergey Nagibin:
History of Cryptography in Syllabus on Information Security Training. 146-157

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














