Seguir
Geoff Stoker
Geoff Stoker
Dirección de correo verificada de uncw.edu
Título
Citado por
Citado por
Año
Toward Realizable Restricted Delegation in Computational Grids1
G Stoker, BS White, E Stackpole, TJ Highley, M Humphrey
International Conference on High-Performance Computing and Networking, 32-41, 2001
252001
Building a Cybersecurity Apprenticeship Program: Early-Stage Success and Some Lessons Learned.
G Stoker, U Clark, M Vanajakumari, W Wetherill
Information Systems Education Journal 19 (2), 35-44, 2021
122021
Using virtual machines to improve learning and save resources in an introductory IT course
G Stoker, T Arnold, P Maxwell
Proceedings of the 14th annual ACM SIGITE conference on Information …, 2013
92013
Cybersecurity maturity model certification initial impact on the defense industrial base
H Strohmier, G Stoker, M Vanajakumari, U Clark, J Cummings, ...
Journal of Information Systems Applied Research 15 (2), 22-25, 2022
72022
Fpinst: Floating point error analysis using dyninst
D An, R Blue, M Lam, S Piper, G Stoker
72008
Pandemic Shift: Impact of COVID-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes--Remote Testing and Lessons Learned.
CM Rebman Jr, G White, H Wimmer, LM Powell, QE Booker
Information Systems Education Journal 19 (6), 4-12, 2021
42021
Looking Ahead to CAE-CD Program Changes.
U Clark, G Stoker, R Vetter
Information Systems Education Journal 18 (1), 29-39, 2020
42020
Reflections on applying for cae-cde designation
U Clark, G Stoker
Proceedings of the EDSIG Conference 2473, 3857, 2018
42018
Towards a methodology for deliberate sample-based statistical performance analysis
G Stoker, JK Hollingsworth
2011 IEEE International Symposium on Parallel and Distributed Processing …, 2011
32011
Considering maritime cybersecurity at a non-maritime education and training institution
G Stoker, J Greer, U Clark, C Chiego
CYBERSECURITY PEDAGOGY & PRACTICE JOURNAL, 2023
22023
Towards a Leader-Driven Supply Chain Cybersecurity Framework
M Vanajakumari, S Mittal, G Stoker, U Clark, K Miller
JISAR 14 (2), 42, 2021
22021
Heuristic Evaluation of Vulnerability Risk Management Leaders’ Presentations of Cyber Threat and Cyber Risk
C Nichols, G Stoker, U Clark
International Conference on Human-Computer Interaction, 212-225, 2021
12021
Some analysis of common vulnerabilities and exposures (cve) data from the national vulnerability database (nvd)
J Glyder, AK Threatt, R Franks, L Adams, G Stoker
Proceedings of the Conference on Information Systems Applied Research ISSN …, 2021
12021
Novice Cybersecurity Students Encounter TracerFIRE: An Experience Report
NE Frost, G Stoker
Proceedings of the EDSIG Conference ISSN 2473, 4901, 2020
12020
JOURNAL OF INFORMATION SYSTEMS APPLIED RESEARCH
I D’Souza, S Mishra, R Haines, D Hodges, AS Mohammed, KS Hartzel, ...
2024
An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB)
Z Wood, G Stoker
JOURNAL OF INFORMATION SYSTEMS APPLIED RESEARCH, 2024
2024
Games and Cybersecurity: A Gamified Approach to Teaching CMMC Compliance
M Pierce, G Stoker, M Mondaresnezhad, E Ebrahimi, UY Clark
2024
A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use
U Clark, J Greer, R Rufus, G Stoker
International Conference on Human-Computer Interaction, 610-621, 2023
2023
The Dark Side of Trust: Impacts of User Behaviors and Trust on Perceptions of Security and Privacy
J Cummings, G Stoker, C Ozdinc
2023
Deepening Intrusion Detection Understanding via a Simple IDS Assignment
S McCarthy, G Stoker
Proceedings of the EDSIG Conference ISSN 2473, 4901, 2022
2022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20