Toward Realizable Restricted Delegation in Computational Grids1 G Stoker, BS White, E Stackpole, TJ Highley, M Humphrey International Conference on High-Performance Computing and Networking, 32-41, 2001 | 25 | 2001 |
Building a Cybersecurity Apprenticeship Program: Early-Stage Success and Some Lessons Learned. G Stoker, U Clark, M Vanajakumari, W Wetherill Information Systems Education Journal 19 (2), 35-44, 2021 | 13 | 2021 |
Cybersecurity maturity model certification initial impact on the defense industrial base H Strohmier, G Stoker, M Vanajakumari, U Clark, J Cummings, ... Journal of Information Systems Applied Research 15 (2), 22-25, 2022 | 11 | 2022 |
Using virtual machines to improve learning and save resources in an introductory IT course G Stoker, T Arnold, P Maxwell Proceedings of the 14th annual ACM SIGITE conference on Information …, 2013 | 9 | 2013 |
Fpinst: Floating point error analysis using dyninst D An, R Blue, M Lam, S Piper, G Stoker | 7 | 2008 |
Looking Ahead to CAE-CD Program Changes. U Clark, G Stoker, R Vetter Information Systems Education Journal 18 (1), 29-39, 2020 | 5 | 2020 |
Reflections on applying for cae-cde designation U Clark, G Stoker Proceedings of the EDSIG Conference 2473, 3857, 2018 | 4 | 2018 |
Towards a methodology for deliberate sample-based statistical performance analysis G Stoker, JK Hollingsworth 2011 IEEE International Symposium on Parallel and Distributed Processing …, 2011 | 3 | 2011 |
Considering maritime cybersecurity at a non-maritime education and training institution G Stoker, J Greer, U Clark, C Chiego CYBERSECURITY PEDAGOGY & PRACTICE JOURNAL, 2023 | 2 | 2023 |
Towards a Leader-Driven Supply Chain Cybersecurity Framework M Vanajakumari, S Mittal, G Stoker, U Clark, K Miller JISAR 14 (2), 42, 2021 | 2 | 2021 |
Some analysis of common vulnerabilities and exposures (cve) data from the national vulnerability database (nvd) J Glyder, AK Threatt, R Franks, L Adams, G Stoker Proceedings of the Conference on Information Systems Applied Research ISSN …, 2021 | 2 | 2021 |
An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB) Z Wood, G Stoker JOURNAL OF INFORMATION SYSTEMS APPLIED RESEARCH, 2024 | 1 | 2024 |
Heuristic Evaluation of Vulnerability Risk Management Leaders’ Presentations of Cyber Threat and Cyber Risk C Nichols, G Stoker, U Clark International Conference on Human-Computer Interaction, 212-225, 2021 | 1 | 2021 |
Preparation for a Cybersecurity Apprenticeship Program (PCAP) J Lancelot, G Stoker, G Smith, C Nichols, U Clark, R Vetter, W Wetherill Proceedings of the EDSIG Conference ISSN 2473, 4901, 2021 | 1 | 2021 |
Novice Cybersecurity Students Encounter TracerFIRE: An Experience Report NE Frost, G Stoker Proceedings of the EDSIG Conference ISSN 2473, 4901, 2020 | 1 | 2020 |
JOURNAL OF INFORMATION SYSTEMS APPLIED RESEARCH I D’Souza, S Mishra, R Haines, D Hodges, AS Mohammed, KS Hartzel, ... | | 2024 |
Games and Cybersecurity: A Gamified Approach to Teaching CMMC Compliance M Pierce, G Stoker, M Mondaresnezhad, E Ebrahimi, UY Clark | | 2024 |
A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use U Clark, J Greer, R Rufus, G Stoker International Conference on Human-Computer Interaction, 610-621, 2023 | | 2023 |
The Dark Side of Trust: Impacts of User Behaviors and Trust on Perceptions of Security and Privacy J Cummings, G Stoker, C Ozdinc | | 2023 |
Deepening Intrusion Detection Understanding via a Simple IDS Assignment S McCarthy, G Stoker Proceedings of the EDSIG Conference ISSN 2473, 4901, 2022 | | 2022 |