Year |
Citation |
Score |
2014 |
Tweneboah-Koduah S, Tsetse A, Endicott-Popovsky B. Barriers To Government Cloud Adoption International Journal of Managing Information Technology. 6: 1-16. DOI: 10.5121/Ijmit.2014.6301 |
0.314 |
|
2014 |
Miller JD, Chung S, Escrig T, Bai Y, Endicott-popovsky B, Whittington J. Accuracy, Security, and Architecture Impacts and Challenges of Mobile and Web Technologies:Geolocation Field Data Collection in Washington State Water Resources International Journal of Computer Applications. 92: 35-42. DOI: 10.5120/16071-5267 |
0.337 |
|
2013 |
Armbruster G, Endicott-Popovsky B, Whittington J. Threats to municipal information systems posed by aging infrastructure International Journal of Critical Infrastructure Protection. 6: 123-131. DOI: 10.1016/J.Ijcip.2013.08.001 |
0.309 |
|
2010 |
Simpson JJ, Simpson MJ, Endicott-Popovsky B, Popovsky V. Secure Software Education: A Contextual Model-Based Approach International Journal of Secure Software Engineering. 1: 35-61. DOI: 10.4018/Jsse.2010100103 |
0.322 |
|
2010 |
Duranti L, Endicott-Popovsky B. Digital Records Forensics: A New Science and Academic Program for Forensic Readiness The Journal of Digital Forensics, Security and Law. 5: 45-62. DOI: 10.15394/Jdfsl.2010.1075 |
0.316 |
|
2010 |
Narvaez J, Endicott-Popovsky B, Seifert C, Aval C, Frincke DA. Drive-by-downloads Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2010.160 |
0.596 |
|
2009 |
Endicott-Popovsky B, Narvaez J, Seifert C, Frincke DA, O'Neil LR, Aval C. Use of deception to improve client honeypot detection of drive-by-download attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5638: 138-147. DOI: 10.1007/978-3-642-02812-0_17 |
0.616 |
|
2008 |
Bunge R, Chung S, Endicott-Popovsky B, McLane D. An operational framework for Service Oriented Architecture network security Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2008.64 |
0.341 |
|
2008 |
Seifert C, Endicott-Popovsky B, Frincke D, Komisarczuk P, Muschevici R, Welch I. Identifying and analyzing web server attacks Ifip International Federation For Information Processing. 285: 151-161. DOI: 10.1007/978-0-387-84927-0_13 |
0.332 |
|
2007 |
Endicott-Popovsky B, Frincke DA, Taylor CA. A theoretical framework for organizational network forensic readiness Journal of Computers. 2: 1-11. DOI: 10.4304/Jcp.2.3.1-11 |
0.687 |
|
2007 |
Erbacher RF, Endicott-Popovsky B, Frincke DA. Challenge paper: Validation of forensic techniques for criminal prosecution Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 150-151. DOI: 10.1109/SADFE.2007.5 |
0.619 |
|
2007 |
Endicott-Popovsky BE, Fluckiger JD, Frincke DA. Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration needs Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 131-144. DOI: 10.1109/SADFE.2007.10 |
0.661 |
|
2007 |
Endicott-Popovsky BE, Frincke DA. The observability calibration test development framework Proceedings of the 2007 Ieee Workshop On Information Assurance, Iaw. 61-66. DOI: 10.1109/IAW.2007.381915 |
0.67 |
|
2007 |
Taylor C, Endicott-Popovsky B, Frincke DA. Specifying digital forensics: A forensics policy approach Dfrws 2007 Annual Conference. DOI: 10.1016/j.diin.2007.06.006 |
0.626 |
|
2007 |
Endicott-Popovsky B, Frincke DA. Embedding hercule poirot in networks: Addressing inefficiencies in digital forensic investigations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4565: 364-372. |
0.68 |
|
2006 |
Endicott-Popovsky BE, Frincke DA. Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 133-139. |
0.673 |
|
2004 |
Endicott-Popovsky B, Frincke DA. A case study in rapid introduction of an information assurance track into a software engineering curriculum Software Engineering Education Conference, Proceedings. 17: 118-123. |
0.615 |
|
Low-probability matches (unlikely to be authored by this person) |
2012 |
Alva A, Endicott-Popovsky B. Digital Evidence Education in Schools of Law The Journal of Digital Forensics, Security and Law. 7: 75-88. DOI: 10.15394/Jdfsl.2012.1120 |
0.291 |
|
2012 |
Ferguson-Boucher K, Endicott-Popovsky B. Forensic readiness in the cloud (FRC): Integrating records management and digital forensics Cybercrime and Cloud Forensics: Applications For Investigation Processes. 105-128. DOI: 10.4018/978-1-4666-2662-1.ch005 |
0.282 |
|
2003 |
Endicott-Popovsky B. Ethics and teaching information assurance Ieee Security and Privacy. 1: 65-67. DOI: 10.1109/MSECP.2003.1219073 |
0.27 |
|
2007 |
Endicott-Popovsky B, Chee B, Frincke D. Calibration testing of network tap devices Ifip International Federation For Information Processing. 242: 3-19. DOI: 10.1007/978-0-387-73742-3_1 |
0.269 |
|
2012 |
Armbruster G, Endicott-Popovsky B, Whittington J. Are we prepared for the economic risk resulting from telecom hotel disruptions? International Journal of Critical Infrastructure Protection. 5: 55-65. DOI: 10.1016/J.Ijcip.2012.05.003 |
0.266 |
|
2015 |
Endicott-Popovsky B, Kuntze N, Rudolph C. Forensic readiness: Emerging discipline for creating reliable and secure digital evidence Journal of Harbin Institute of Technology (New Series). 22: 1-8. DOI: 10.11916/j.issn.1005-9113.2015.01.001 |
0.264 |
|
2013 |
Chung S, Escrig T, Bai Y, Endicott-Popovsky B. 2TAC: Distributed access control architecture for 'bring your own device' security Proceedings of the 2012 Ase International Conference On Biomedical Computing, Biomedcom 2012. 123-126. DOI: 10.1109/BioMedCom.2012.26 |
0.23 |
|
2014 |
Kuntze N, Rudolph C, Leivesley S, Manz D, Endicott-Popovsky B. Resilient core networks for energy distribution Ieee Power and Energy Society General Meeting. 2014. DOI: 10.1109/PESGM.2014.6939164 |
0.225 |
|
2012 |
Kuntze N, Rudolph C, Alva A, Endicott-Popovsky B, Christiansen J, Kemmerich T. On the creation of reliable digital evidence Ifip Advances in Information and Communication Technology. 383: 3-17. DOI: 10.1007/978-3-642-33962-2_1 |
0.222 |
|
2015 |
Theodore BR, Whittington J, Towle C, Tauben DJ, Endicott-Popovsky B, Cahana A, Doorenbos AZ. Transaction cost analysis of in-clinic versus telehealth consultations for chronic pain: preliminary evidence for rapid and affordable access to interdisciplinary collaborative consultation. Pain Medicine (Malden, Mass.). 16: 1045-56. PMID 25616057 DOI: 10.1111/Pme.12688 |
0.217 |
|
2008 |
Seifert C, Welch I, Komisarczuk P, Aval CU, Endicott-Popovsky B. Identification of malicious web pages through analysis of underlying DNS and web server relationships Proceedings - Conference On Local Computer Networks, Lcn. 935-941. DOI: 10.1109/LCN.2008.4664306 |
0.214 |
|
2016 |
Dupuis MJ, Crossler RE, Endicott-Popovsky B. Measuring the human factor in information security and privacy Proceedings of the Annual Hawaii International Conference On System Sciences. 2016: 3676-3685. DOI: 10.1109/HICSS.2016.459 |
0.208 |
|
2010 |
Malviya A, Fink GA, Sego L, Endicott-Popovsky B. Situational awareness as a measure of performance in cyber security collaborative work Proceedings - 2011 8th International Conference On Information Technology: New Generations, Itng 2011. 937-942. DOI: 10.1109/ITNG.2011.161 |
0.207 |
|
2013 |
Fink G, Best D, Manz D, Popovsky V, Endicott-Popovsky B. Gamification for measuring cyber security situational awareness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8027: 656-665. DOI: 10.1007/978-3-642-39454-6_70 |
0.198 |
|
2014 |
Kuntze N, Rudolph C, Schilling H, Alva A, Brisbois B, Endicott-Popovsky B. Seizure of digital data and 'selective suppression' of digital evidence Int. Workshop Syst. Approaches Digit. Forensics Eng., Sadfe. DOI: 10.1109/SADFE.2013.6911545 |
0.197 |
|
2013 |
Kim W, Moon CS, Chung S, Escrig T, Endicott-Popovsky B. Scalable and reusable attack aware software Proceedings of the 2012 Ase International Conference On Biomedical Computing, Biomedcom 2012. 101-104. DOI: 10.1109/BioMedCom.2012.23 |
0.184 |
|
2015 |
Kuntze N, Rudolph C, Brisbois GB, Boggess M, Endicott-Popovsky B, Leivesley S. Security vs. safety: Why do people die despite good safety? Icns 2015 - Innovation in Operations, Implementation Benefits and Integration of the Cns Infrastructure, Conference Proceedings. A41-A410. DOI: 10.1109/ICNSURV.2015.7121213 |
0.181 |
|
2010 |
Chung S, Endicott-Popovsky B. Software reengineering based security teaching Imeti 2010 - 3rd International Multi-Conference On Engineering and Technological Innovation, Proceedings. 2: 266-272. |
0.181 |
|
2014 |
Moon CS, Chung S, Endicott-Popovsky B. A cloud and in-memory based two-tier architecture of a database protection system from insider attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8267: 260-271. DOI: 10.1007/978-3-319-05149-9_17 |
0.179 |
|
2004 |
Endicott-Popovsky B, Dittrich D, Phillips A, Frincke D, Chavez J, Gibbons WJ, Nguyen D, Seifert C, Shephard A, Abate C, Loveland S. The Manuka Project Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 314-320. |
0.176 |
|
2007 |
Seifert C, Steenson R, Welch I, Komisarczuk P, Endicott-Popovsky B. Capture - A behavioral analysis tool for applications and documents Dfrws 2007 Annual Conference. DOI: 10.1016/j.diin.2007.06.003 |
0.175 |
|
2014 |
Kim W, Chung S, Endicott-Popovsky B. Software architecture model driven reverse engineering approach to open source software development Riit 2014 - Proceedings of the 3rd Annual Conference On Research in Information Technology. 9-14. DOI: 10.1145/2656434.2656440 |
0.172 |
|
2012 |
Orton I, Alva A, Endicott-Popovsky B. Legal process and requirements for cloud forensic investigations Cybercrime and Cloud Forensics: Applications For Investigation Processes. 186-229. DOI: 10.4018/978-1-4666-2662-1.ch008 |
0.169 |
|
2013 |
Chung S, Endicott-Popovsky B, Crompton C, Baeg SH, Bai Y, Park S. Analyses of evolving legacy software into secure service-oriented software using scrum and a visual model Software Design and Development: Concepts, Methodologies, Tools, and Applications. 4: 1764-1786. DOI: 10.4018/978-1-4666-4301-7.ch084 |
0.169 |
|
2010 |
Nagmoti R, Chung S, Endicott-Popovsky B. Game programmers with secure coding Cgat 2010 - Computer Games, Multimedia and Allied Technology, Proceedings. 210-216. |
0.164 |
|
2013 |
Alexander O, Chung S, Endicott-Popovsky B. Attack-aware supervisory control and data acquisition (SCADA) 8th International Conference On Information Warfare and Security, Iciw 2013. 251-254. |
0.159 |
|
2012 |
Endicott-Popovsky B, Horowitz DJ. Unintended consequences: Digital evidence in our legal system Ieee Security and Privacy. 10: 80-83. DOI: 10.1109/MSP.2012.54 |
0.15 |
|
2010 |
Simpson JJ, Endicott-Popovsky B. 3.2.1 System Security Capability Assessment Model Development and Application Incose International Symposium. 20: 323-338. DOI: 10.1002/J.2334-5837.2010.TB01073.X |
0.142 |
|
2015 |
Endicott-Popovsky B, David S, Crosby ME. Setting a privacy and security comfort zone in the internet of things Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9183: 722-734. DOI: 10.1007/978-3-319-20816-9_69 |
0.141 |
|
2014 |
Endicott-Popovsky BE, Popovsky VM. Application of pedagogical fundamentals for the holistic development of cybersecurity professionals Acm Inroads. 5: 57-68. DOI: 10.1145/2568195.2568214 |
0.139 |
|
2010 |
Endicott-Popovsky B, Lee W. 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010: Message from the program co-chairs 5th International Workshop On Systematic Approaches to Digital Forensic Engineering, Sadfe 2010. DOI: 10.1109/SADFE.2010.29 |
0.13 |
|
2011 |
Lemieux V, Endicott-Popovsky B, Eckler K, Dang T, Jansen A. Visualizing an information assurance risk taxonomy Vast 2011 - Ieee Conference On Visual Analytics Science and Technology 2011, Proceedings. 287-288. DOI: 10.1109/VAST.2011.6102477 |
0.121 |
|
2007 |
Taylor C, Endicott-Popovsky B, Phillips A. Forensics education: Assessment and measures of excellence Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 155-165. DOI: 10.1109/SADFE.2007.11 |
0.116 |
|
2013 |
Endicott-Popovsky B, Hinrichs RJ, Frincke D. Leveraging 2nd life as a communications media: An effective tool for security awareness training Ieee International Professional Communication Conference. DOI: 10.1109/IPCC.2013.6623945 |
0.097 |
|
2013 |
Lysenko V, Endicott-Popovsky B. Action and reaction: Strategies and tactics of the current political cyberwarfare in Russia 8th International Conference On Information Warfare and Security, Iciw 2013. 269-272. |
0.087 |
|
2008 |
Bonderud P, Chung S, Endicott-Popovsky B. Toward trustworthy service consumers and producers Proceedings - 3rd International Conference On Internet and Web Applications and Services, Iciw 2008. 451-456. DOI: 10.1109/ICIW.2008.108 |
0.081 |
|
2005 |
Endicott-Popovsky B, Orton I, Bailey K, Frincke D. Community security awareness training Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 373-379. DOI: 10.1109/IAW.2005.1495976 |
0.08 |
|
2004 |
Endicott-Popovsky B, Frincke D. Adding the fourth "R", Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 442-443. |
0.078 |
|
2015 |
Kuntze N, Rudolph C, Brisbois B, Boggess M, Endicott-Popovsky B, Leivesley S. Safety vs. Security: Why do people die despite good safety? Icns 2015 - Innovation in Operations, Implementation Benefits and Integration of the Cns Infrastructure, Conference Proceedings. DOI: 10.1109/ICNSURV.2015.7121276 |
0.069 |
|
2005 |
Endicott-Popovsky B, Seifert C, Frincke D. Adopting eXtreme programming on a graduate student project Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 454-455. DOI: 10.1109/IAW.2005.1495998 |
0.059 |
|
2011 |
Wainwright KJ, Endicott-Popovsky BE, Rajala SA. The honour house project: Reservist re-entry program Asee Annual Conference and Exposition, Conference Proceedings. |
0.045 |
|
2012 |
Lysenko V, Endicott-Popovsky B. Hackers at the state service: Cyberwars against Estonia and Georgia 7th International Conference On Information Warfare and Security, Iciw 2012. 404-407. |
0.033 |
|
Hide low-probability matches. |