default search action
Barbara Endicott-Popovsky
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Michael-Brian Ogawa, Rita M. Vick, Barbara Endicott-Popovsky, Randy J. Hinrichs, Alejandro D. Ayala, Sean Mosier, Martha E. Crosby:
Enhancing Cognition Through Cooperative Learning and Augmented Mentorship. HCI (11) 2024: 220-232 - 2023
- [c30]Michael-Brian Ogawa, Brent Auernheimer, Barbara Endicott-Popovsky, Randy J. Hinrichs, Martha E. Crosby:
Privacy and Security Perceptions in Augmented Cognition Applications. HCI (9) 2023: 429-440
2010 – 2019
- 2019
- [c29]Scott L. David, Barbara Endicott-Popovsky:
Augmented Cognition for Socio-Technical Systems. HCI (15) 2019: 133-142 - 2018
- [c28]Barbara Endicott-Popovsky:
Applications of Distributed Socio-technical Synthetic Intelligent (SI) Systems Using Hybrid "Compensating Controls" Architectures. HCI (25) 2018: 276-285 - [c27]Morgan A. Zantua, Viatcheslav Popovsky, Barbara Endicott-Popovsky, Fred B. Holt:
Discovering a Profile for Protect and Defend: Penetration Testing. HCI (25) 2018: 530-540 - 2017
- [c26]Scott L. David, Barbara Endicott-Popovsky:
Security Beyond Secrecy - Practical Strategies to Address Emerging Cybersecurity Paradoxes Through Professional and Stakeholder Education and Co-management Architectures Designed to Cultivate Community-Situated, Non-technical Structures of Group Synthetic Intelligence (aka "Neighborhood Watch"). HCI (25) 2017: 305-323 - 2016
- [c25]Marc J. Dupuis, Robert E. Crossler, Barbara Endicott-Popovsky:
Measuring the Human Factor in Information Security and Privacy. HICSS 2016: 3676-3685 - [c24]Sam Chung, Cheolmin Sky Moon, Barbara Endicott-Popovsky:
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System. RIIT 2016: 13-18 - 2015
- [c23]Barbara Endicott-Popovsky, Scott L. David, Martha E. Crosby:
Setting a Privacy and Security Comfort Zone in the Internet of Things. HCI (15) 2015: 722-734 - [c22]Diana L. Burley, Barbara Endicott-Popovsky:
Focus Group: Developing a Resilient, Agile Cybersecurity Educational System (RACES). CPR 2015: 13-14 - 2014
- [j11]Barbara Endicott-Popovsky, Viatcheslav Popovsky:
Application of pedagogical fundamentals for the holistic development of cybersecurity professionals. Inroads 5(1): 57-68 (2014) - [c21]William Kim, Sam Chung, Barbara Endicott-Popovsky:
Software architecture model driven reverse engineering approach to open source software development. RIIT 2014: 9-14 - [i1]Glenn S. Dardick, Barbara Endicott-Popovsky, Pavel Gladyshev, Thomas Kemmerich, Carsten Rudolph:
Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092). Dagstuhl Reports 4(2): 150-190 (2014) - 2013
- [j10]Ginger Armbruster, Barbara Endicott-Popovsky, Jan Whittington:
Threats to municipal information systems posed by aging infrastructure. Int. J. Crit. Infrastructure Prot. 6(3-4): 123-131 (2013) - [c20]Glenn A. Fink, Daniel M. Best, David O. Manz, Viatcheslav Popovsky, Barbara Endicott-Popovsky:
Gamification for Measuring Cyber Security Situational Awareness. HCI (24) 2013: 656-665 - [c19]Barbara Endicott-Popovsky, Randy J. Hinrichs, Deborah A. Frincke:
Leveraging 2nd life as a communications media: An effective tool for security awareness training. IPCC 2013: 1-7 - [c18]Nicolai Kuntze, Carsten Rudolph, Hellen Schilling, Aaron Alva, Brooke Brisbois, Barbara Endicott-Popovsky:
Seizure of digital data and "selective suppression" of digital evidence. SADFE 2013: 1-6 - [c17]Cheolmin Sky Moon, Sam Chung, Barbara Endicott-Popovsky:
A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks. WISA 2013: 260-271 - 2012
- [j9]Barbara Endicott-Popovsky, Donald J. Horowitz:
Unintended Consequences: Digital Evidence in Our Legal System. IEEE Secur. Priv. 10(2): 80-83 (2012) - [j8]Ginger Armbruster, Barbara Endicott-Popovsky, Jan Whittington:
Are we prepared for the economic risk resulting from telecom hotel disruptions? Int. J. Crit. Infrastructure Prot. 5(2): 55-65 (2012) - [j7]Aaron Alva, Barbara Endicott-Popovsky:
Digital Evidence Education in Schools of Law. J. Digit. Forensics Secur. Law 7(2): 75-88 (2012) - [c16]Nicolai Kuntze, Carsten Rudolph, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen, Thomas Kemmerich:
On the Creation of Reliable Digital Evidence. IFIP Int. Conf. Digital Forensics 2012: 3-17 - 2011
- [c15]Victoria L. Lemieux, Barbara Endicott-Popovsky, Karl Eckler, Thomas Dang, Adam Jansen:
Visualizing an information assurance risk taxonomy. IEEE VAST 2011: 287-288 - [c14]Ashish Malviya, Glenn A. Fink, Landon Sego, Barbara Endicott-Popovsky:
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work. ITNG 2011: 937-942 - 2010
- [j6]Joseph J. Simpson, Mary J. Simpson, Barbara Endicott-Popovsky, Viatcheslav Popovsky:
Secure Software Education: A Contextual Model-Based Approach. Int. J. Secur. Softw. Eng. 1(4): 35-61 (2010) - [j5]Luciana Duranti, Barbara Endicott-Popovsky:
Digital Records Forensics: A New Science and Academic Program for Forensic Readiness. J. Digit. Forensics Secur. Law 5(2): 45-62 (2010) - [c13]Julia Narvaez, Barbara Endicott-Popovsky, Christian Seifert, Chiraag Uday Aval, Deborah A. Frincke:
Drive-by-Downloads. HICSS 2010: 1-10 - [c12]Julia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall:
Assessment of Virtualization as a Sensor Technique. SADFE 2010: 61-65
2000 – 2009
- 2009
- [c11]Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval:
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. HCI (16) 2009: 138-147 - 2008
- [c10]Robert Bunge, Sam Chung, Barbara Endicott-Popovsky, Don McLane:
An Operational Framework for Service Oriented Architecture Network Security. HICSS 2008: 312 - [c9]Phil Bonderud, Sam Chung, Barbara Endicott-Popovsky:
Toward Trustworthy Service Consumers and Producers. ICIW 2008: 451-456 - [c8]Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch:
Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161 - [c7]Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky:
Identification of malicious web pages through analysis of underlying DNS and web server relationships. LCN 2008: 935-941 - 2007
- [j4]Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Barbara Endicott-Popovsky:
Capture - A behavioral analysis tool for applications and documents. Digit. Investig. 4(Supplement): 23-30 (2007) - [j3]Carol A. Taylor, Barbara Endicott-Popovsky, Deborah A. Frincke:
Specifying digital forensics: A forensics policy approach. Digit. Investig. 4(Supplement): 101-104 (2007) - [j2]Barbara Endicott-Popovsky, Deborah A. Frincke, Carol A. Taylor:
A Theoretical Framework for Organizational Network Forensic Readiness. J. Comput. 2(3): 1-11 (2007) - [c6]Barbara Endicott-Popovsky, Deborah A. Frincke:
Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations. HCI (16) 2007: 364-372 - [c5]Barbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke:
Calibration Testing Of Network Tap Devices. IFIP Int. Conf. Digital Forensics 2007: 3-19 - [c4]Barbara Endicott-Popovsky, J. D. Fluckiger, Deborah A. Frincke:
Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs. SADFE 2007: 131-146 - [c3]Robert F. Erbacher, Barbara Endicott-Popovsky, Deborah A. Frincke:
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution. SADFE 2007: 150-154 - [c2]Carol A. Taylor, Barbara Endicott-Popovsky, Amelia Phillips:
Forensics Education: Assessment and Measures of Excellence. SADFE 2007: 155-165 - 2004
- [c1]Barbara Endicott-Popovsky, Deborah A. Frincke:
A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum. CSEE&T 2004: 118-123 - 2003
- [j1]Barbara Endicott-Popovsky:
Ethics and Teaching Information Assurance. IEEE Secur. Priv. 1(4): 65-67 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint