| 2007 |
| 12 | EE | Gregory B. White,
Stephen Jones:
Minitrack: E-Government Information Security.
HICSS 2007: 97 |
| 11 | EE | Like Zhang,
Gregory B. White:
Analysis of Payload Based Application level Network Anomaly Detection.
HICSS 2007: 99 |
| 10 | EE | Gregory B. White:
The Community Cyber Security Maturity Model.
HICSS 2007: 99 |
| 9 | EE | Like Zhang,
Gregory B. White:
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection.
IPDPS 2007: 1-8 |
| 2006 |
| 8 | EE | Gregory B. White,
Anthony M. Cresswell,
Stephen Jones:
Minitrack Introduction.
HICSS 2006 |
| 7 | EE | Art Conklin,
Gregory B. White:
e-Government and Cyber Security: The Role of Cyber Security Exercises.
HICSS 2006 |
| 2005 |
| 6 | EE | Gregory B. White,
David J. DiCenso:
Information Sharing Needs for National Security.
HICSS 2005 |
| 2004 |
| 5 | EE | Gregory B. White,
Glenn B. Dietrich,
Tim Goles:
Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events.
HICSS 2004 |
| 4 | EE | Gregory B. White,
Art Conklin:
The Appropriate Use of Force-on-Force Cyberexercises.
IEEE Security & Privacy 2(4): 33-37 (2004) |
| 1996 |
| 3 | EE | Gregory B. White,
Udo W. Pooch:
Cooperating security managers: Distributed intrusion detection systems.
Computers & Security 15(5): 441-450 (1996) |
| 1994 |
| 2 | EE | Gregory B. White,
Udo W. Pooch:
Computer ethics education: impact from societal norms.
Ethics in Computer Age 1994: 170-173 |
| 1989 |
| 1 | | Gregory B. White:
Review of A Comprehensive Guide to AI and Expert Systems: Turbo Pascal Edition.
AI Magazine 10(1): 86-87 (1989) |