An Honest Man Has Nothing to Fear: User Perceptions on Web-Based Information Disclosure G Conti, E Sobiesk Proceedings of the Symposium on Usable Privacy and Security, 2007 | 63 | 2007 |
Malicious Interface Design: Exploiting the User G Conti, E Sobiesk Proceedings of the World Wide Web Conference, 2010 | 45 | 2010 |
Cyber Education: A Multi-Level, Multi-Discipline Approach E Sobiesk, J Blair, G Conti, M Lanham, H Taylor Proceedings of the ACM Conference on Information Technology Education, 2015 | 39 | 2015 |
Malicious Interfaces and Personalization's Uninviting Future GJ Conti, E Sobiesk IEEE Security and Privacy Magazine 7 (3), 2009 | 9* | 2009 |
Designing an Interdisciplinary Information Technology Program E Sobiesk, J Blair, J Cook, J Giordano, B Goda, C Reynolds Proceedings of the ACM Conference on Information Technology Education, 2006 | 9 | 2006 |
Educating Future Multidisciplinary Cybersecurity Teams JRS Blair, AO Hall, E Sobiesk Computer 52 (3), 58-66, 2019 | 8 | 2019 |
Information Technology as a Cyber Science J Ekstrom, B Lunt, R Raj, A Parrish, E Sobiesk Proceedings of the ACM Conference on Information Technology Education, 2017 | 8 | 2017 |
A Capstone Design Project for Teaching Cybersecurity to Non-technical Users T Estes, J Finocchiaro, J Blair, J Robison, J Dalme, M Emana, L Jenkins, ... Proceedings of the ACM Conference on Information Technology Education, 2016 | 8 | 2016 |
Redefining the Role of Information Warfare in Chinese Strategy E Sobiesk SANS Reading Room (Information Warfare), 2003 | 8 | 2003 |
Demand Response with Photovoltaic Energy Source and Time-of-Use Pricing A St. Leger, E Sobiesk, A Farmer, B Rulison Proceedings of the IEEE PES Transmission and Distribution Conference and …, 2014 | 6 | 2014 |
Self-monitoring of Web-based Information Disclosure K Abdullah, G Conti, E Sobiesk Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2007 | 6 | 2007 |
The Cost of Free Web Tools E Sobiesk, G Conti IEEE Security & Privacy 5 (3), 2007 | 5 | 2007 |
Integration of the Cyber Domain at the United States Military Academy A Hall, E Sobiesk Workshops: Realigning Cybersecurity Education, 2017 | 4 | 2017 |
Strengthening the Weakest Link in Digital Protection W Suchan, E Sobiesk IEEE Security and Privacy 4 (6), 2006 | 4 | 2006 |
Tracking Multiple Objects in Terrain E Sobiesk, J Hamilton, J Marin, D Brown, M Gini Proceedings of the IEEE International Conference on Systems, Man, and …, 1998 | 3 | 1998 |
Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum JRS Blair, CM Chewar, RK Raj, E Sobiesk Proceedings of the 2020 ACM Conference on Innovation and Technology in …, 2020 | 2 | 2020 |
Starting in the Middle: Design and Implementation in the Information Age E Sobiesk, W Suchan Proceedings of the American Society for Engineering Education New England …, 2006 | 2 | 2006 |
The Value of a One Semester Exposure to the Institutional Review Board Process T Estes, L Mallory, E Sobiesk Journal of Computing Sciences in Colleges 31 (6), 63-69, 2016 | 1 | 2016 |
Automated Webpage Evaluation R Tate, G Conti, E Sobiesk Proceedings of the ACM Conference on Research in Information Technology, 2013 | 1 | 2013 |
Unintended, Malicious, and Evil Applications of Augmented Reality G Conti, E Sobiesk, P Anderson, S Billington, C Kirk, A Farmer, P Shaffer, ... InSecure, 2012 | 1 | 2012 |