Cooperating security managers: A peer-based intrusion detection system GB White, EA Fisch, UW Pooch IEEE network 10 (1), 20-23, 1996 | 405 | 1996 |
Computer system and network security W Wolf, GB White, EA Fisch, SP Crago, UW Pooch, JO McMahon, ... CRC press, 2017 | 136 | 2017 |
The community cyber security maturity model GB White 2011 IEEE international conference on technologies for homeland security …, 2011 | 115 | 2011 |
Principles of computer security: security+ and beyond A Conklin, G White, C Cothren, D Williams, RL Davis McGraw-Hill, Inc., 2004 | 101 | 2004 |
Secure computers and networks: analysis, design, and implementation EA Fisch, GB White CRC Press, 1999 | 76 | 1999 |
E-government and cyber security: the role of cyber security exercises A Conklin, GB White Proceedings of the 39th Annual Hawaii International Conference on System …, 2006 | 66 | 2006 |
A collaborative information sharing framework for community cyber security W Zhao, G White 2012 IEEE Conference on Technologies for Homeland Security (HST), 457-462, 2012 | 65 | 2012 |
Moral intensity and ethical decision-making: A contextual extension T Goles, GB White, N Beebe, CA Dorantes, B Hewitt ACM SIGMIS Database: the DATABASE for Advances in Information Systems 37 (2 …, 2006 | 64 | 2006 |
Cooperating security managers: Distributed intrusion detection systems G White, V Pooch Computers & Security 15 (5), 441-450, 1996 | 62 | 1996 |
An approach to detect executable content for anomaly based network intrusion detection L Zhang, GB White 2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007 | 58 | 2007 |
Analysis and detection of malicious data exfiltration in web traffic A Al-Bataineh, G White 2012 7th International Conference on Malicious and Unwanted Software, 26-31, 2012 | 57 | 2012 |
Security across the curriculum: using computer security to teach computer science principles G White, G Nordstrom Proceedings of the 19th National Information Systems Security Conference …, 1996 | 51 | 1996 |
Guide to test, training, and exercise programs for IT plans and capabilities T Grance, T Nolan, K Burke, R Dudley, G White, T Good Timothy Grance, Tamara Nolan, Kristin Burke, Rich Dudley, Gregory White …, 2006 | 50 | 2006 |
Principles of computer security: Comptia security+ and beyond WA Conklin, GW Arthur, C Cothren, RL Davis, D Williams Netw Secur 3 (18), 2009 | 48 | 2009 |
A taxonomy of cyber events affecting communities K Harrison, G White 2011 44th Hawaii International Conference on System Sciences, 1-9, 2011 | 40 | 2011 |
The collegiate cyber defense competition GB White, D Williams Proceedings of the 9th Colloquium for Information Systems Security Education …, 2005 | 35 | 2005 |
Anomaly detection for application level network attacks using payload keywords L Zhang, GB White 2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007 | 31 | 2007 |
Cyber security exercises: testing an organization's ability to prevent, detect, and respond to cyber security events GB White, G Dietrich, T Goles 37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004 | 30 | 2004 |
The usability of the Microsoft HoloLens for an augmented reality game to teach elementary school children B Munsinger, G White, J Quarles 2019 11th international conference on virtual worlds and games for serious …, 2019 | 29 | 2019 |
The CyberPatriot national high school cyber defense competition GB White, D Williams, K Harrison IEEE Security & Privacy 8 (5), 59-61, 2010 | 28 | 2010 |