秘密会议 发表于 2025-3-26 22:33:24

1868-4238 WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Gonçalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011. The 34 revised papers presented were carefully reviewed and s

thrombosis 发表于 2025-3-27 04:44:47

http://reply.papertrans.cn/47/4650/464999/464999_32.png

柔声地说 发表于 2025-3-27 05:21:14

Fostering Content Relevant Information Security Awareness through Browser Extensionseen raised in research that addresses information security awareness and how it is conveyed to users. Additional to these common key points, this paper suggests using browser integration as a medium to promote security values and provide security suggestions based on a specific user’s behavioural pattern.

sclera 发表于 2025-3-27 10:02:42

How to Secure the Cloud Based Enterprise Information Systemon the security education is absolutely necessary. These courses have laid down the critical foundation for students to correctly handle today’s ever growing real world Enterprise Information Systems’ challenges.

Heterodoxy 发表于 2025-3-27 14:29:27

http://reply.papertrans.cn/47/4650/464999/464999_35.png

合乎习俗 发表于 2025-3-27 21:19:57

1868-4238 elected for inclusion in this volume. They represent a cross section of applicable research as well as case studies in security education.978-3-642-43388-7978-3-642-39377-8Series ISSN 1868-4238 Series E-ISSN 1868-422X

NEXUS 发表于 2025-3-27 23:48:17

Developing Cyber Competition Infrastructure Using the SCRUM Frameworkhis paper will outline at a high level the event architecture and technical infrastructure details, a discussion on Agile development methodologies (specifically SCRUM) and how they can be applied to competition infrastructure development.

群岛 发表于 2025-3-28 05:11:42

http://reply.papertrans.cn/47/4650/464999/464999_38.png

tenuous 发表于 2025-3-28 07:32:38

http://reply.papertrans.cn/47/4650/464999/464999_39.png

字形刻痕 发表于 2025-3-28 11:04:47

A Review of IFIP TC 11 WG 11.8 Publications through the Agesd related events. In order to begin the process of addressing this need, this paper presents a review of the IFIP WG 11.8 publications through the ages. It also reflects briefly on the problems relating to the inaccessibility of these publications, the decline in paper submissions and the lack of citations.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Assurance and Security Education and Training; 8th IFIP WG 11.8 Wor Ronald C. Dodge,Lynn Futcher Conference proceedings 2013 IF