Follow
Geoff Stoker
Geoff Stoker
Verified email at uncw.edu
Title
Cited by
Cited by
Year
Toward Realizable Restricted Delegation in Computational Grids1
G Stoker, BS White, E Stackpole, TJ Highley, M Humphrey
International Conference on High-Performance Computing and Networking, 32-41, 2001
252001
Building a Cybersecurity Apprenticeship Program: Early-Stage Success and Some Lessons Learned.
G Stoker, U Clark, M Vanajakumari, W Wetherill
Information Systems Education Journal 19 (2), 35-44, 2021
112021
Using virtual machines to improve learning and save resources in an introductory IT course
G Stoker, T Arnold, P Maxwell
Proceedings of the 14th annual ACM SIGITE conference on Information …, 2013
82013
Fpinst: Floating point error analysis using dyninst
D An, R Blue, M Lam, S Piper, G Stoker
62008
Cybersecurity maturity model certification initial impact on the defense industrial base
H Strohmier, G Stoker, M Vanajakumari, U Clark, J Cummings, ...
Journal of Information Systems Applied Research, 17-29, 2022
52022
Looking Ahead to CAE-CD Program Changes.
U Clark, G Stoker, R Vetter
Information Systems Education Journal 18 (1), 29-39, 2020
42020
Reflections on applying for cae-cde designation
U Clark, G Stoker
Proceedings of the EDSIG Conference 2473, 3857, 2018
42018
Pandemic Shift: Impact of COVID-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes--Remote Testing and Lessons Learned.
CM Rebman Jr, G White, H Wimmer, LM Powell, QE Booker
Information Systems Education Journal 19 (6), 4-12, 2021
32021
Towards a methodology for deliberate sample-based statistical performance analysis
G Stoker, JK Hollingsworth
2011 IEEE International Symposium on Parallel and Distributed Processing …, 2011
32011
Considering maritime cybersecurity at a non-maritime education and training institution
G Stoker, J Greer, U Clark, C Chiego
CYBERSECURITY PEDAGOGY & PRACTICE JOURNAL, 2023
22023
Towards a Leader-Driven Supply Chain Cybersecurity Framework
M Vanajakumari, S Mittal, G Stoker, U Clark, K Miller
JISAR 14 (2), 42, 2021
22021
Heuristic Evaluation of Vulnerability Risk Management Leaders’ Presentations of Cyber Threat and Cyber Risk
C Nichols, G Stoker, U Clark
International Conference on Human-Computer Interaction, 212-225, 2021
12021
Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD)
J Glyder, AK Threatt, R Franks, L Adams, G Stoker
Proceedings of the Conference on Information Systems Applied Research ISSN …, 2021
12021
Novice Cybersecurity Students Encounter TracerFIRE: An Experience Report
NE Frost, G Stoker
Proceedings of the EDSIG Conference ISSN 2473, 4901, 2020
12020
JOURNAL OF INFORMATION SYSTEMS APPLIED RESEARCH
I D’Souza, S Mishra, R Haines, D Hodges, AS Mohammed, KS Hartzel, ...
2024
A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use
U Clark, J Greer, R Rufus, G Stoker
International Conference on Human-Computer Interaction, 610-621, 2023
2023
An Action Research Approach to Building an Enterprise-Specific Chatbot (ESCB)
Z Wood, G Stoker
Proceedings of the ISCAP Conference ISSN 2473, 4901, 2023
2023
The Dark Side of Trust: Impacts of User Behaviors and Trust on Perceptions of Security and Privacy
J Cummings, G Stoker, C Ozdinc
2023
Deepening Intrusion Detection Understanding via a Simple IDS Assignment
S McCarthy, G Stoker
Proceedings of the EDSIG Conference ISSN 2473, 4901, 2022
2022
Maximizing the Educational Benefits of the Palmetto Cyber Defense Competition (PCDC) Experience
B Treadwell, G Stoker
Proceedings of the EDSIG Conference ISSN 2473, 4901, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20