A Survey of SCADA and Critical Infrastructure Incidents B Miller, DC Rowe Proceedings of the First Annual Conference on Research in Information …, 2012 | 516 | 2012 |
Teaching natural user interaction using OpenNI and the Microsoft Kinect sensor N Villaroman, D Rowe, B Swan Proceedings of the 2011 conference on Information technology education, 227-232, 2011 | 221 | 2011 |
The role of cyber-security in information technology education DC Rowe, BM Lunt, JJ Ekstrom Proceedings of the 2011 conference on Information technology education, 113-122, 2011 | 159 | 2011 |
Starships and cybersecurity: Teaching security concepts through immersive gaming experiences CJ Cornel, DC Rowe, CM Cornel Proceedings of the 18th Annual Conference on Information Technology …, 2017 | 19 | 2017 |
Physical security and cybersecurity: Reducing risk by enhancing physical security posture through multi-factor authentication and other techniques S Moses, DC Rowe International Journal for Information Security Research (IJISR) 6 (2), 667-676, 2016 | 13 | 2016 |
An assessment framework for identifying information technology programs DC Rowe, BM Lunt, RG Helps Proceedings of the 2011 conference on Information technology education, 123-128, 2011 | 12 | 2011 |
Training future cybersecurity professionals in spear phishing using SiEVE JJ Meyers, DL Hansen, JS Giboney, DC Rowe Proceedings of the 19th Annual SIG Conference on Information Technology …, 2018 | 10 | 2018 |
Touch interface and keylogging malware S Moses, J Mercado, A Larson, D Rowe 2015 11th international conference on innovations in information technology …, 2015 | 10 | 2015 |
Improving the learning experience for the deaf through augment reality innovations K Kercher, DC Rowe 2012 18th International ICE Conference on Engineering, Technology and …, 2012 | 9 | 2012 |
Risks, Rewards and Raising Awareness: Training a Cyber Workforce Using Student Red Teams K Kercher, DC Rowe Proceedings of the 13th Annual Conference on Information Technology …, 2012 | 8 | 2012 |
Addressing the Inadequacies of Role Based Access Control (RBAC) models for highly privileged administrators: introducing the SNAP principle for mitigating privileged account … S Moses, DC Rowe, SA Cunha International Journal of Intelligent Computing Research 6 (3), 583-591, 2015 | 7 | 2015 |
Cyber-Security, IAS and the Cyber Warrior DC Rowe The Colloquium for Information Systems Security Education, 2012 | 6 | 2012 |
A Comprehensive and Open Framework for Classifying Incidents Involving Cyber-Physical Systems WB Miller, DC Rowe, R Helps, R Woodside Technology Interfaces International Journal 15 (1), 35-43, 2015 | 5 | 2015 |
A Comprehensive and Open Framework for Classifying Incidents Involving Cyber-Physical Systems WB Miller, DC Rowe, R Helps, R Woodside 4th IAJC/ISAM Joint International Conference 2014 (September), 2014 | 5 | 2014 |
Improving Accuracy in Face Tracking User Interfaces using Consumer Devices N Villaroman, D Rowe Proceedings of the First Annual Conference on Research in Information …, 2012 | 5 | 2012 |
The untrustables: How underclassmen evolved our approach to student red-teaming S Cunha, W Winders, DC Rowe, C Cornel Proceedings of the 17th Annual Conference on Information Technology …, 2016 | 4 | 2016 |
Building a Vulnerability Testing Lab in an Educational Environment A Whipple, KB Smith, DC Rowe, S Moses 2015 ASEE Annual Conference and Exposition 2015 (June), 10.18260/p.23640, 2015 | 4 | 2015 |
Mapping the Cyber Security Terrain in a Research Context DC Rowe, B Lunt Proceedings of the First Annual Conference on Research in Information …, 2012 | 4 | 2012 |
Competitions and gamification in cybersecurity education and workforce development and evaluation of real world skills R Jorgensen, D Rowe, N Wyler Journal of Computing Sciences in Colleges 33 (2), 155-156, 2017 | 3 | 2017 |
A cybersecurity camp for girls C Cornel, CM Cornel, DC Rowe, S Moses 2016 ASEE Annual Conference & Exposition, 2016 | 3 | 2016 |