Seguir
Siddharth Kaza
Siddharth Kaza
Dirección de correo verificada de towson.edu
Título
Citado por
Citado por
Año
Analyzing and visualizing criminal network dynamics: A case study
J Xu, B Marshall, S Kaza, H Chen
Intelligence and Security Informatics: Second Symposium on Intelligence and …, 2004
1042004
Detecting fake medical web sites using recursive trust labeling
A Abbasi, FM Zahedi, S Kaza
ACM Transactions on Information Systems (TOIS) 30 (4), 1-36, 2012
872012
Evaluating ontology mapping techniques: An experiment in public safety information sharing
S Kaza, H Chen
Decision support systems 45 (4), 714-728, 2008
782008
Security injections: modules to help students remember, understand, and apply secure coding techniques
B Taylor, S Kaza
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
602011
Identifying significant facilitators of dark network evolution
D Hu, S Kaza, H Chen
Journal of the American Society for Information Science and Technology 60 (4 …, 2009
492009
Visualization in law enforcement
H Chen, H Atabakhsh, C Tseng, B Marshall, S Kaza, S Eggers, H Gowda, ...
CHI'05 extended abstracts on Human factors in computing systems, 1268-1271, 2005
492005
A model for piloting pathways for computational thinking in a general education curriculum
C Dierbach, H Hochheiser, S Collins, G Jerome, C Ariza, T Kelleher, ...
Proceedings of the 42nd ACM technical symposium on Computer science …, 2011
462011
Cross-jurisdictional criminal activity networks to support border and transportation security
B Marshall, S Kaza, J Xu, H Atabakhsh, T Petersen, C Violette, H Chen
Proceedings. The 7th International IEEE Conference on Intelligent …, 2004
412004
Topological analysis of criminal activity networks: Enhancing transportation security
S Kaza, J Xu, B Marshall, H Chen
IEEE Transactions on Intelligent Transportation Systems 10 (1), 83-91, 2009
352009
Security in computer literacy: a model for design, dissemination, and assessment
CF Turner, B Taylor, S Kaza
Proceedings of the 42nd ACM technical symposium on Computer science …, 2011
342011
Enhancing border security: Mutual information analysis to identify suspect vehicles
S Kaza, Y Wang, H Chen
Decision Support Systems 43 (1), 199-210, 2007
312007
Cybersecurity curricular guidelines
M Bishop, D Burley, S Buck, JJ Ekstrom, L Futcher, D Gibson, ...
Information Security Education for a Global Digital Society: 10th IFIP WG 11 …, 2017
252017
Dynamic social network analysis of a dark network: Identifying significant facilitators
S Kaza, D Hu, H Chen
2007 IEEE Intelligence and Security Informatics, 40-46, 2007
242007
Security injections@ towson: Integrating secure coding into introductory computer science courses
B Taylor, S Kaza
ACM Transactions on Computing Education (TOCE) 16 (4), 1-20, 2016
222016
Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India
X Liu, S Kaza, P Zhang, H Chen
Journal of the American Society for Information Science and Technology 62 (6 …, 2011
222011
ACM Joint task force on cybersecurity education
D Burley, M Bishop, S Kaza, DS Gibson, E Hawthorne, S Buck
Proceedings of the 2017 ACM SIGCSE technical symposium on computer science …, 2017
212017
Integrating security in the computer science curriculum
A Siraj, B Taylor, S Kaza, S Ghafoor
ACM Inroads 6 (2), 77-81, 2015
202015
Target vehicle identification for border safety using mutual information
S Kaza, T Wang, H Gowda, H Chen
Proceedings. 2005 IEEE Intelligent Transportation Systems, 2005., 1141-1146, 2005
172005
Injecting security in the curriculum–experiences in effective dissemination and assessment design
S Kaza, B Taylor, H Hochheiser, S Azadegan, M O’Leary, CF Turner
The Colloquium for Information Systems Security Education (CISSE) 8, 2010
162010
Using importance flooding to identify interesting networks of criminal activity
B Marshall, H Chen, S Kaza
Journal of the American Society for Information Science and Technology 59 …, 2008
152008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20