Barbara Endicott-Popovsky, Ph.D. - Publications

Affiliations: 
2007 University of Idaho, Moscow, ID, United States 
Area:
Computer Science

17/59 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Tweneboah-Koduah S, Tsetse A, Endicott-Popovsky B. Barriers To Government Cloud Adoption International Journal of Managing Information Technology. 6: 1-16. DOI: 10.5121/Ijmit.2014.6301  0.314
2014 Miller JD, Chung S, Escrig T, Bai Y, Endicott-popovsky B, Whittington J. Accuracy, Security, and Architecture Impacts and Challenges of Mobile and Web Technologies:Geolocation Field Data Collection in Washington State Water Resources International Journal of Computer Applications. 92: 35-42. DOI: 10.5120/16071-5267  0.337
2013 Armbruster G, Endicott-Popovsky B, Whittington J. Threats to municipal information systems posed by aging infrastructure International Journal of Critical Infrastructure Protection. 6: 123-131. DOI: 10.1016/J.Ijcip.2013.08.001  0.309
2010 Simpson JJ, Simpson MJ, Endicott-Popovsky B, Popovsky V. Secure Software Education: A Contextual Model-Based Approach International Journal of Secure Software Engineering. 1: 35-61. DOI: 10.4018/Jsse.2010100103  0.322
2010 Duranti L, Endicott-Popovsky B. Digital Records Forensics: A New Science and Academic Program for Forensic Readiness The Journal of Digital Forensics, Security and Law. 5: 45-62. DOI: 10.15394/Jdfsl.2010.1075  0.316
2010 Narvaez J, Endicott-Popovsky B, Seifert C, Aval C, Frincke DA. Drive-by-downloads Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2010.160  0.596
2009 Endicott-Popovsky B, Narvaez J, Seifert C, Frincke DA, O'Neil LR, Aval C. Use of deception to improve client honeypot detection of drive-by-download attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5638: 138-147. DOI: 10.1007/978-3-642-02812-0_17  0.616
2008 Bunge R, Chung S, Endicott-Popovsky B, McLane D. An operational framework for Service Oriented Architecture network security Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2008.64  0.341
2008 Seifert C, Endicott-Popovsky B, Frincke D, Komisarczuk P, Muschevici R, Welch I. Identifying and analyzing web server attacks Ifip International Federation For Information Processing. 285: 151-161. DOI: 10.1007/978-0-387-84927-0_13  0.332
2007 Endicott-Popovsky B, Frincke DA, Taylor CA. A theoretical framework for organizational network forensic readiness Journal of Computers. 2: 1-11. DOI: 10.4304/Jcp.2.3.1-11  0.687
2007 Erbacher RF, Endicott-Popovsky B, Frincke DA. Challenge paper: Validation of forensic techniques for criminal prosecution Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 150-151. DOI: 10.1109/SADFE.2007.5  0.619
2007 Endicott-Popovsky BE, Fluckiger JD, Frincke DA. Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration needs Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 131-144. DOI: 10.1109/SADFE.2007.10  0.661
2007 Endicott-Popovsky BE, Frincke DA. The observability calibration test development framework Proceedings of the 2007 Ieee Workshop On Information Assurance, Iaw. 61-66. DOI: 10.1109/IAW.2007.381915  0.67
2007 Taylor C, Endicott-Popovsky B, Frincke DA. Specifying digital forensics: A forensics policy approach Dfrws 2007 Annual Conference. DOI: 10.1016/j.diin.2007.06.006  0.626
2007 Endicott-Popovsky B, Frincke DA. Embedding hercule poirot in networks: Addressing inefficiencies in digital forensic investigations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4565: 364-372.  0.68
2006 Endicott-Popovsky BE, Frincke DA. Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 133-139.  0.673
2004 Endicott-Popovsky B, Frincke DA. A case study in rapid introduction of an information assurance track into a software engineering curriculum Software Engineering Education Conference, Proceedings. 17: 118-123.  0.615
Low-probability matches (unlikely to be authored by this person)
2012 Alva A, Endicott-Popovsky B. Digital Evidence Education in Schools of Law The Journal of Digital Forensics, Security and Law. 7: 75-88. DOI: 10.15394/Jdfsl.2012.1120  0.291
2012 Ferguson-Boucher K, Endicott-Popovsky B. Forensic readiness in the cloud (FRC): Integrating records management and digital forensics Cybercrime and Cloud Forensics: Applications For Investigation Processes. 105-128. DOI: 10.4018/978-1-4666-2662-1.ch005  0.282
2003 Endicott-Popovsky B. Ethics and teaching information assurance Ieee Security and Privacy. 1: 65-67. DOI: 10.1109/MSECP.2003.1219073  0.27
2007 Endicott-Popovsky B, Chee B, Frincke D. Calibration testing of network tap devices Ifip International Federation For Information Processing. 242: 3-19. DOI: 10.1007/978-0-387-73742-3_1  0.269
2012 Armbruster G, Endicott-Popovsky B, Whittington J. Are we prepared for the economic risk resulting from telecom hotel disruptions? International Journal of Critical Infrastructure Protection. 5: 55-65. DOI: 10.1016/J.Ijcip.2012.05.003  0.266
2015 Endicott-Popovsky B, Kuntze N, Rudolph C. Forensic readiness: Emerging discipline for creating reliable and secure digital evidence Journal of Harbin Institute of Technology (New Series). 22: 1-8. DOI: 10.11916/j.issn.1005-9113.2015.01.001  0.264
2013 Chung S, Escrig T, Bai Y, Endicott-Popovsky B. 2TAC: Distributed access control architecture for 'bring your own device' security Proceedings of the 2012 Ase International Conference On Biomedical Computing, Biomedcom 2012. 123-126. DOI: 10.1109/BioMedCom.2012.26  0.23
2014 Kuntze N, Rudolph C, Leivesley S, Manz D, Endicott-Popovsky B. Resilient core networks for energy distribution Ieee Power and Energy Society General Meeting. 2014. DOI: 10.1109/PESGM.2014.6939164  0.225
2012 Kuntze N, Rudolph C, Alva A, Endicott-Popovsky B, Christiansen J, Kemmerich T. On the creation of reliable digital evidence Ifip Advances in Information and Communication Technology. 383: 3-17. DOI: 10.1007/978-3-642-33962-2_1  0.222
2015 Theodore BR, Whittington J, Towle C, Tauben DJ, Endicott-Popovsky B, Cahana A, Doorenbos AZ. Transaction cost analysis of in-clinic versus telehealth consultations for chronic pain: preliminary evidence for rapid and affordable access to interdisciplinary collaborative consultation. Pain Medicine (Malden, Mass.). 16: 1045-56. PMID 25616057 DOI: 10.1111/Pme.12688  0.217
2008 Seifert C, Welch I, Komisarczuk P, Aval CU, Endicott-Popovsky B. Identification of malicious web pages through analysis of underlying DNS and web server relationships Proceedings - Conference On Local Computer Networks, Lcn. 935-941. DOI: 10.1109/LCN.2008.4664306  0.214
2016 Dupuis MJ, Crossler RE, Endicott-Popovsky B. Measuring the human factor in information security and privacy Proceedings of the Annual Hawaii International Conference On System Sciences. 2016: 3676-3685. DOI: 10.1109/HICSS.2016.459  0.208
2010 Malviya A, Fink GA, Sego L, Endicott-Popovsky B. Situational awareness as a measure of performance in cyber security collaborative work Proceedings - 2011 8th International Conference On Information Technology: New Generations, Itng 2011. 937-942. DOI: 10.1109/ITNG.2011.161  0.207
2013 Fink G, Best D, Manz D, Popovsky V, Endicott-Popovsky B. Gamification for measuring cyber security situational awareness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8027: 656-665. DOI: 10.1007/978-3-642-39454-6_70  0.198
2014 Kuntze N, Rudolph C, Schilling H, Alva A, Brisbois B, Endicott-Popovsky B. Seizure of digital data and 'selective suppression' of digital evidence Int. Workshop Syst. Approaches Digit. Forensics Eng., Sadfe. DOI: 10.1109/SADFE.2013.6911545  0.197
2013 Kim W, Moon CS, Chung S, Escrig T, Endicott-Popovsky B. Scalable and reusable attack aware software Proceedings of the 2012 Ase International Conference On Biomedical Computing, Biomedcom 2012. 101-104. DOI: 10.1109/BioMedCom.2012.23  0.184
2015 Kuntze N, Rudolph C, Brisbois GB, Boggess M, Endicott-Popovsky B, Leivesley S. Security vs. safety: Why do people die despite good safety? Icns 2015 - Innovation in Operations, Implementation Benefits and Integration of the Cns Infrastructure, Conference Proceedings. A41-A410. DOI: 10.1109/ICNSURV.2015.7121213  0.181
2010 Chung S, Endicott-Popovsky B. Software reengineering based security teaching Imeti 2010 - 3rd International Multi-Conference On Engineering and Technological Innovation, Proceedings. 2: 266-272.  0.181
2014 Moon CS, Chung S, Endicott-Popovsky B. A cloud and in-memory based two-tier architecture of a database protection system from insider attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8267: 260-271. DOI: 10.1007/978-3-319-05149-9_17  0.179
2004 Endicott-Popovsky B, Dittrich D, Phillips A, Frincke D, Chavez J, Gibbons WJ, Nguyen D, Seifert C, Shephard A, Abate C, Loveland S. The Manuka Project Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 314-320.  0.176
2007 Seifert C, Steenson R, Welch I, Komisarczuk P, Endicott-Popovsky B. Capture - A behavioral analysis tool for applications and documents Dfrws 2007 Annual Conference. DOI: 10.1016/j.diin.2007.06.003  0.175
2014 Kim W, Chung S, Endicott-Popovsky B. Software architecture model driven reverse engineering approach to open source software development Riit 2014 - Proceedings of the 3rd Annual Conference On Research in Information Technology. 9-14. DOI: 10.1145/2656434.2656440  0.172
2012 Orton I, Alva A, Endicott-Popovsky B. Legal process and requirements for cloud forensic investigations Cybercrime and Cloud Forensics: Applications For Investigation Processes. 186-229. DOI: 10.4018/978-1-4666-2662-1.ch008  0.169
2013 Chung S, Endicott-Popovsky B, Crompton C, Baeg SH, Bai Y, Park S. Analyses of evolving legacy software into secure service-oriented software using scrum and a visual model Software Design and Development: Concepts, Methodologies, Tools, and Applications. 4: 1764-1786. DOI: 10.4018/978-1-4666-4301-7.ch084  0.169
2010 Nagmoti R, Chung S, Endicott-Popovsky B. Game programmers with secure coding Cgat 2010 - Computer Games, Multimedia and Allied Technology, Proceedings. 210-216.  0.164
2013 Alexander O, Chung S, Endicott-Popovsky B. Attack-aware supervisory control and data acquisition (SCADA) 8th International Conference On Information Warfare and Security, Iciw 2013. 251-254.  0.159
2012 Endicott-Popovsky B, Horowitz DJ. Unintended consequences: Digital evidence in our legal system Ieee Security and Privacy. 10: 80-83. DOI: 10.1109/MSP.2012.54  0.15
2010 Simpson JJ, Endicott-Popovsky B. 3.2.1 System Security Capability Assessment Model Development and Application Incose International Symposium. 20: 323-338. DOI: 10.1002/J.2334-5837.2010.TB01073.X  0.142
2015 Endicott-Popovsky B, David S, Crosby ME. Setting a privacy and security comfort zone in the internet of things Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9183: 722-734. DOI: 10.1007/978-3-319-20816-9_69  0.141
2014 Endicott-Popovsky BE, Popovsky VM. Application of pedagogical fundamentals for the holistic development of cybersecurity professionals Acm Inroads. 5: 57-68. DOI: 10.1145/2568195.2568214  0.139
2010 Endicott-Popovsky B, Lee W. 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010: Message from the program co-chairs 5th International Workshop On Systematic Approaches to Digital Forensic Engineering, Sadfe 2010. DOI: 10.1109/SADFE.2010.29  0.13
2011 Lemieux V, Endicott-Popovsky B, Eckler K, Dang T, Jansen A. Visualizing an information assurance risk taxonomy Vast 2011 - Ieee Conference On Visual Analytics Science and Technology 2011, Proceedings. 287-288. DOI: 10.1109/VAST.2011.6102477  0.121
2007 Taylor C, Endicott-Popovsky B, Phillips A. Forensics education: Assessment and measures of excellence Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 155-165. DOI: 10.1109/SADFE.2007.11  0.116
2013 Endicott-Popovsky B, Hinrichs RJ, Frincke D. Leveraging 2nd life as a communications media: An effective tool for security awareness training Ieee International Professional Communication Conference. DOI: 10.1109/IPCC.2013.6623945  0.097
2013 Lysenko V, Endicott-Popovsky B. Action and reaction: Strategies and tactics of the current political cyberwarfare in Russia 8th International Conference On Information Warfare and Security, Iciw 2013. 269-272.  0.087
2008 Bonderud P, Chung S, Endicott-Popovsky B. Toward trustworthy service consumers and producers Proceedings - 3rd International Conference On Internet and Web Applications and Services, Iciw 2008. 451-456. DOI: 10.1109/ICIW.2008.108  0.081
2005 Endicott-Popovsky B, Orton I, Bailey K, Frincke D. Community security awareness training Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 373-379. DOI: 10.1109/IAW.2005.1495976  0.08
2004 Endicott-Popovsky B, Frincke D. Adding the fourth "R", Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 442-443.  0.078
2015 Kuntze N, Rudolph C, Brisbois B, Boggess M, Endicott-Popovsky B, Leivesley S. Safety vs. Security: Why do people die despite good safety? Icns 2015 - Innovation in Operations, Implementation Benefits and Integration of the Cns Infrastructure, Conference Proceedings. DOI: 10.1109/ICNSURV.2015.7121276  0.069
2005 Endicott-Popovsky B, Seifert C, Frincke D. Adopting eXtreme programming on a graduate student project Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 454-455. DOI: 10.1109/IAW.2005.1495998  0.059
2011 Wainwright KJ, Endicott-Popovsky BE, Rajala SA. The honour house project: Reservist re-entry program Asee Annual Conference and Exposition, Conference Proceedings 0.045
2012 Lysenko V, Endicott-Popovsky B. Hackers at the state service: Cyberwars against Estonia and Georgia 7th International Conference On Information Warfare and Security, Iciw 2012. 404-407.  0.033
Hide low-probability matches.