Seguir
Jason M. Pittman
Jason M. Pittman
University of Maryland Global Campus
Dirección de correo verificada de umgc.edu - Página principal
Título
Citado por
Citado por
Año
A survey of botnet detection techniques by command and control infrastructure
TS Hyslip, JM Pittman
Journal of Digital Forensics, Security and Law 10 (1), 2, 2015
432015
An observational study of peer learning for high school students at a cybersecurity camp
JM Pittman, R Pike
Information Systems Education Journal 14 (3), 4, 2016
182016
Machine Learning and Port Scans: A Systematic Review
JM Pittman
arxiv preprint arXiv:2301.13581, 2023
112023
A cyber science based ontology for artificial general intelligence containment
JM Pittman, C Crosby
arXiv preprint arXiv:1801.09317, 2018
92018
Cloud-based Versus Local-based Web Development
R Pike, JM Pittman, D Hwang
Information Systems Education Journal 15 (4), 52, 2017
92017
How Early is Early Enough: Correlating Student Performance with Final Grades.
L Williams, KJ Titus, JM Pittman
Proceedings of the 5th Conference on Computing Education Practice, 13-16, 2021
82021
Shades of perception-user factors in identifying password strength
JM Pittman, N Robinson
arXiv preprint arXiv:2001.04930, 2020
82020
Understanding system utilization as a limitation associated with cybersecurity laboratories–A literature analysis
J Pittman
Journal of Information Technology Education. Research 12, 363, 2013
82013
Towards a model for zero trust data
JM Pittman, S Alaee, C Crosby, T Honey, GM Schaefer
American Journal of Science & Engineering 3 (1), 18-24, 2022
72022
A taxonomy for dynamic honeypot measures of effectiveness
JM Pittman, K Hoffpauir, N Markle, C Meadows
arXiv preprint arXiv:2005.12969, 2020
72020
The cybersecurity competition federation
D Manson, P Pusey, MJ Hufe, J Jones, D Likarish, J Pittman, D Tobey
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
72015
B2ci 2019: The ieee brain to computer interface competition’s gaming event
JM McQuighan, G Bajwa, JM Pittman
2019 IEEE Conference on Games (CoG), 1-7, 2019
62019
Stovepiping and Malicious Software: A Critical Review of AGI Containment
JM Pittman, JP Espinoza, C Crosby
arXiv preprint arXiv:1811.03653, 2018
52018
Does competitor grade level influence perception of cybersecurity competition design gender inclusiveness?
JM Pittman
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
52015
Primer--A Tool for Testing Honeypot Measures of Effectiveness
JM Pittman, K Hoffpauir, N Markle
arXiv preprint arXiv:2011.00582, 2020
42020
A Green Scheduling Algorithm for Cloud-based Honeynets
J Pittman, S Alaee
Frontiers in Sustainability 3 (1048606), 2023
32023
Do Users Correctly Identify Password Strength?
J Pittman, N Robinson
Journal of The Colloquium for Information Systems Security Education 8 (1), 6-6, 2020
32020
Curating Research Data-Cyber security perspective from a nascent Brain Machine Interface Laboratory
JM Pittman, G Bajwa, J Joseph, N Keller
2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2018
32018
A Comparative Analysis of Port Scanning Tool Efficacy
JM Pittman
arXiv preprint arXiv:2303.11282, 2023
22023
Machine Learning Classifiers in Honeynets - A Critical Review
B Baker, K Quinn, JM Pittman
International Research Journal of Engineering and Technology (IRJET) 7 (5 …, 2020
22020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20