Author: Glenn B. Dietrich
Publication Overview
Publication period start: 2008
Number of co-authors: 6
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Conklin,
Art,
Dietrich,
Glenn B.,
Walz,
Diane B.
(2004):
Password-Based Authentication: A System Perspective.
In:
HICSS 2004
,
2004,
.
https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170babs.htm
Dietrich,
Glenn B.,
Shipley,
Marcus B.
(1999):
Technology Strategies in a Complex Environment.
In:
HICSS 1999
,
1999,
.
https://csdl.computer.org/comp/proceedings/hicss/1999/0001/07/00017058abs.htm
White,
Gregory B.,
Dietrich,
Glenn B.,
Goles,
Tim
(2004):
Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respon.
In:
HICSS 2004
,
2004,
.
https://csdl.computer.org/comp/proceedings/hicss/2004/2056/07/205670170aabs.htm
Conklin,
Wm. Arthur,
Dietrich,
Glenn B.
(2007):
Secure Software Engineering: A New Paradigm.
In:
HICSS 2007 - 40th Hawaii International International Conference on Systems Science
3-6 January,
2007,
Waikoloa, Big Island, HI, USA.
pp. 272.
https://doi.ieeecomputersociety.org/10.1109/HICSS.2007.477
Conklin,
Wm. Arthur,
Dietrich,
Glenn B.
(2008):
Systems Theory Model for Information Security.
In:
HICSS 2008 - 41st Hawaii International International Conference on Systems Science
7-10 January,
2008,
Waikoloa, Big Island, HI, USA.
pp. 265.
https://doi.ieeecomputersociety.org/10.1109/HICSS.2008.421