Toward Realizable Restricted Delegation in Computational Grids1 G Stoker, BS White, E Stackpole, TJ Highley, M Humphrey International Conference on High-Performance Computing and Networking, 32-41, 2001 | 25 | 2001 |
Building a Cybersecurity Apprenticeship Program: Early-Stage Success and Some Lessons Learned. G Stoker, U Clark, M Vanajakumari, W Wetherill Information Systems Education Journal 19 (2), 35-44, 2021 | 11 | 2021 |
Using virtual machines to improve learning and save resources in an introductory IT course G Stoker, T Arnold, P Maxwell Proceedings of the 14th annual ACM SIGITE conference on Information …, 2013 | 8 | 2013 |
Cybersecurity maturity model certification initial impact on the defense industrial base H Strohmier, G Stoker, M Vanajakumari, U Clark, J Cummings, ... Journal of Information Systems Applied Research, 17-29, 2022 | 6 | 2022 |
Fpinst: Floating point error analysis using dyninst D An, R Blue, M Lam, S Piper, G Stoker | 6 | 2008 |
Pandemic Shift: Impact of COVID-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes--Remote Testing and Lessons Learned. CM Rebman Jr, G White, H Wimmer, LM Powell, QE Booker Information Systems Education Journal 19 (6), 4-12, 2021 | 4 | 2021 |
Looking Ahead to CAE-CD Program Changes. U Clark, G Stoker, R Vetter Information Systems Education Journal 18 (1), 29-39, 2020 | 4 | 2020 |
Reflections on applying for cae-cde designation U Clark, G Stoker Proceedings of the EDSIG Conference 2473, 3857, 2018 | 4 | 2018 |
Towards a methodology for deliberate sample-based statistical performance analysis G Stoker, JK Hollingsworth 2011 IEEE International Symposium on Parallel and Distributed Processing …, 2011 | 3 | 2011 |
Considering maritime cybersecurity at a non-maritime education and training institution G Stoker, J Greer, U Clark, C Chiego CYBERSECURITY PEDAGOGY & PRACTICE JOURNAL, 2023 | 2 | 2023 |
Towards a Leader-Driven Supply Chain Cybersecurity Framework M Vanajakumari, S Mittal, G Stoker, U Clark, K Miller JISAR 14 (2), 42, 2021 | 2 | 2021 |
Heuristic Evaluation of Vulnerability Risk Management Leaders’ Presentations of Cyber Threat and Cyber Risk C Nichols, G Stoker, U Clark International Conference on Human-Computer Interaction, 212-225, 2021 | 1 | 2021 |
Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) J Glyder, AK Threatt, R Franks, L Adams, G Stoker Proceedings of the Conference on Information Systems Applied Research ISSN …, 2021 | 1 | 2021 |
Novice Cybersecurity Students Encounter TracerFIRE: An Experience Report NE Frost, G Stoker Proceedings of the EDSIG Conference ISSN 2473, 4901, 2020 | 1 | 2020 |
JOURNAL OF INFORMATION SYSTEMS APPLIED RESEARCH I D’Souza, S Mishra, R Haines, D Hodges, AS Mohammed, KS Hartzel, ... | | 2024 |
A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use U Clark, J Greer, R Rufus, G Stoker International Conference on Human-Computer Interaction, 610-621, 2023 | | 2023 |
An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Z Wood, G Stoker Proceedings of the ISCAP Conference ISSN 2473, 4901, 2023 | | 2023 |
The Dark Side of Trust: Impacts of User Behaviors and Trust on Perceptions of Security and Privacy J Cummings, G Stoker, C Ozdinc | | 2023 |
Deepening Intrusion Detection Understanding via a Simple IDS Assignment S McCarthy, G Stoker Proceedings of the EDSIG Conference ISSN 2473, 4901, 2022 | | 2022 |
Maximizing the Educational Benefits of the Palmetto Cyber Defense Competition (PCDC) Experience B Treadwell, G Stoker Proceedings of the EDSIG Conference ISSN 2473, 4901, 2022 | | 2022 |