2007 |
12 | EE | Gregory B. White,
Stephen Jones:
Minitrack: E-Government Information Security.
HICSS 2007: 97 |
11 | EE | Like Zhang,
Gregory B. White:
Analysis of Payload Based Application level Network Anomaly Detection.
HICSS 2007: 99 |
10 | EE | Gregory B. White:
The Community Cyber Security Maturity Model.
HICSS 2007: 99 |
9 | EE | Like Zhang,
Gregory B. White:
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection.
IPDPS 2007: 1-8 |
2006 |
8 | EE | Gregory B. White,
Anthony M. Cresswell,
Stephen Jones:
Minitrack Introduction.
HICSS 2006 |
7 | EE | Art Conklin,
Gregory B. White:
e-Government and Cyber Security: The Role of Cyber Security Exercises.
HICSS 2006 |
2005 |
6 | EE | Gregory B. White,
David J. DiCenso:
Information Sharing Needs for National Security.
HICSS 2005 |
2004 |
5 | EE | Gregory B. White,
Glenn B. Dietrich,
Tim Goles:
Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events.
HICSS 2004 |
4 | EE | Gregory B. White,
Art Conklin:
The Appropriate Use of Force-on-Force Cyberexercises.
IEEE Security & Privacy 2(4): 33-37 (2004) |
1996 |
3 | EE | Gregory B. White,
Udo W. Pooch:
Cooperating security managers: Distributed intrusion detection systems.
Computers & Security 15(5): 441-450 (1996) |
1994 |
2 | EE | Gregory B. White,
Udo W. Pooch:
Computer ethics education: impact from societal norms.
Ethics in Computer Age 1994: 170-173 |
1989 |
1 | | Gregory B. White:
Review of A Comprehensive Guide to AI and Expert Systems: Turbo Pascal Edition.
AI Magazine 10(1): 86-87 (1989) |