default search action
Siddharth Kaza
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c56]Paige Flores, Siddharth Kaza, Blair Taylor:
Fine-Tuning AI to Assist in Building Curriculum for the CIA Triad and Cyber Kill Chain. ITiCSE (2) 2024 - 2022
- [c55]Cara Tang, Seth T. Hamman, Sidd Kaza, Blair Taylor:
National Cybersecurity Curriculum Task Force: How you can contribute to and benefit from high-quality, high-impact cybersecurity curriculum. SIGITE 2022: 90-91 - 2021
- [j12]Blair Taylor, Sidd Kaza, Paige A. Zaleppa:
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula. IEEE Secur. Priv. 19(5): 72-76 (2021) - [c54]Ambareen Siraj, Nigamanth Sridhar, John A. Drew Hamilton, Latifur Khan, Siddharth Kaza, Maanak Gupta, Sudip Mittal:
Is there a Security Mindset and Can it be Taught? CODASPY 2021: 335-336 - [c53]Leon Bernard, Sagar Raina, Blair Taylor, Siddharth Kaza:
Minimizing Cognitive Load in Cyber Learning Materials - An Eye Tracking Study. ETRA Short Papers 2021: 21:1-21:6 - [c52]Leon Bernard, Sagar Raina, Blair Taylor, Siddharth Kaza:
Minimizing Cognitive Overload in Cybersecurity Learning Materials: An Experimental Study Using Eye-Tracking. World Conference on Information Security Education 2021: 47-63 - [c51]Blair Taylor, Siddharth Kaza, Melissa Dark:
Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research. NCS 2021: 47-59 - [c50]Richard Weiss, Jens Mache, Elizabeth K. Hawthorne, Ambareen Siraj, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2021. SIGCSE 2021: 1358 - 2020
- [c49]Nnatubemugo Innocent Ngwum, Sagar Raina, Gerald Onwujekwe, Blair Taylor, Siddharth Kaza:
Security Evaluation of Digital Libraries. AMCIS 2020
2010 – 2019
- 2019
- [c48]Rajendra K. Raj, Vijay Anand, David S. Gibson, Siddharth Kaza, Andrew Phillips:
Cybersecurity Program Accreditation: Benefits and Challenges. SIGCSE 2019: 173-174 - [c47]Richard Weiss, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay:
Discussion of Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2019. SIGCSE 2019: 1245 - 2018
- [j11]Siddharth Kaza, Blair Taylor, Kyle Sherbert:
Hello, World! - Code Responsibly. IEEE Secur. Priv. 16(1): 98-100 (2018) - [c46]Diana L. Burley, Matt Bishop, Siddharth Kaza, David S. Gibson, Scott Buck, Allen Parrish, Herb Mattord:
Special Session: Joint Task Force on Cybersecurity Education. SIGCSE 2018: 918-919 - [c45]Siddharth Kaza, Blair Taylor:
Introducing Secure Coding in Undergraduate (CS0, CS1, and CS2) and High School (AP Computer Science A) Programming Courses: (Abstract Only). SIGCSE 2018: 1050 - [c44]Richard Weiss, Ambareen Siraj, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay, Michael E. Locasto:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only). SIGCSE 2018: 1070 - [c43]Melissa Dark, Siddharth Kaza, Blair Taylor:
CLARK - The Cybersecurity Labs and Resource Knowledge-base - A Living Digital Library. ASE @ USENIX Security Symposium 2018 - 2017
- [c42]Matt Bishop, Diana L. Burley, Scott Buck, Joseph J. Ekstrom, Lynn Futcher, David S. Gibson, Elizabeth K. Hawthorne, Siddharth Kaza, Yair Levy, Herbert J. Mattord, Allen Parrish:
Cybersecurity Curricular Guidelines. World Conference on Information Security Education 2017: 3-13 - [c41]Diana L. Burley, Matt Bishop, Siddharth Kaza, David S. Gibson, Elizabeth K. Hawthorne, Scott Buck:
ACM Joint Task Force on Cybersecurity Education. SIGCSE 2017: 683-684 - [c40]Richard S. Weiss, Ambareen Siraj, Jens Mache, Elizabeth K. Hawthorne, Blair Taylor, Siddharth Kaza, Michael E. Locasto:
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only). SIGCSE 2017: 732 - 2016
- [j10]Blair Taylor, Siddharth Kaza:
Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses. ACM Trans. Comput. Educ. 16(4): 16:1-16:20 (2016) - [c39]Sagar Raina, Leon Bernard, Blair Taylor, Siddharth Kaza:
Using eye-tracking to investigate content skipping: A study on learning modules in cybersecurity. ISI 2016: 261-266 - [c38]Shiva Azadegan, Josh Dehlinger, Siddharth Kaza, Blair Taylor, Wei Yu:
Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students. ISI 2016: 285 - [c37]Sagar Raina, Siddharth Kaza, Blair Taylor:
Security Injections 2.0: Increasing Ability to Apply Secure Coding Knowledge using Segmented and Interactive Modules in CS0. SIGCSE 2016: 144-149 - [c36]Diana L. Burley, Matt Bishop, Elizabeth K. Hawthorne, Siddharth Kaza, Scott Buck, Lynn Futcher:
Special Session: ACM Joint Task Force on Cyber Education. SIGCSE 2016: 234-235 - [c35]Richard Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Siddharth Kaza, Ambareen Siraj:
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only). SIGCSE 2016: 709 - [c34]Blair Taylor, Siddharth Kaza:
Introducing Secure Coding in CS0, CS1, and CS2 (Abstract Only). SIGCSE 2016: 715 - 2015
- [j9]Ambareen Siraj, Blair Taylor, Siddharth Kaza, Sheikh K. Ghafoor:
Integrating security in the computer science curriculum. Inroads 6(2): 77-81 (2015) - [c33]Atiya Afsana, Suranjan Chakraborty, Sutirtha Chatterjee, Siddharth Kaza:
Preparing Industry-ready Analysts In the Classroom: A Module Injection Approach. AMCIS 2015 - [c32]Sagar Raina, Blair Taylor, Siddharth Kaza:
Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses. World Conference on Information Security Education 2015: 64-74 - [c31]Sagar Raina, Blair Taylor, Siddharth Kaza:
Security Injections 2.0: Using Segmentation, Instant-feedback, and Auto-grading to Enhance Secure Coding Modules for Lower-level Programming Courses (Abstract Only). SIGCSE 2015: 687 - [c30]Siddharth Kaza, Blair Taylor, Elizabeth K. Hawthorne:
Introducing Secure Coding in CS0, CS1, and CS2. (Abstract Only). SIGCSE 2015: 712 - 2014
- [c29]Sagar Raina, Siddharth Kaza, Blair Taylor:
Segmented and Interactive Modules for Teaching Secure Coding: A Pilot Study. eLEOT 2014: 147-154 - [c28]Shiva Azadegan, Josh Dehlinger, Siddharth Kaza:
Revitalizing the computer science undergraduate curriculum inside and outside of the classroom using mobile computing platforms (abstract only). SIGCSE 2014: 713 - [c27]Sagar Raina, Blair Taylor, Siddharth Kaza:
Interactive e-learning modules for teaching secure: a pilot study (abstract only). SIGCSE 2014: 719-720 - [c26]Shiva Azadegan, Josh Dehlinger, Siddharth Kaza:
Incorporating mobile computing into the CS curriculum (abstract only). SIGCSE 2014: 735 - [c25]Blair Taylor, Siddharth Kaza, Elizabeth K. Hawthorne:
Introducing secure coding in CS0, CS1, and CS2 (abstract only). SIGCSE 2014: 748 - 2013
- [c24]Matt Bishop, Blair Taylor, Elizabeth K. Hawthorne, Diana L. Burley, Siddharth Kaza:
Introducing secure coding in CS0 and CS1 (abstract only). SIGCSE 2013: 761 - [i1]Ahmed Abbasi, Siddharth Kaza, F. Mariam Zahedi:
Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites. CoRR abs/1309.7266 (2013) - 2012
- [j8]Ahmed Abbasi, Fatemeh "Mariam" Zahedi, Siddharth Kaza:
Detecting Fake Medical Web Sites Using Recursive Trust Labeling. ACM Trans. Inf. Syst. 30(4): 22:1-22:36 (2012) - [c23]Jameson McFarlane, Siddharth Kaza:
Social networking in government: an exploration of the use of the Twitter micro-blogging service by U. S. state governors. DG.O 2012: 276-277 - [c22]Jason Koepke, Siddharth Kaza, Ahmed Abbasi:
Exploratory experiments to identify fake websites by using features from the network stack. ISI 2012: 126-128 - [c21]Siddharth Kaza, Hsin-Min Lu, Daniel Zeng, Hsinchun Chen:
Using burst detection techniques to identify suspicious vehicular traffic at border crossings. ISI 2012: 212-214 - 2011
- [j7]Siddharth Kaza, Paul Jen-Hwa Hu, Han-fen Hu, Hsinchun Chen:
Designing, Implementing, and Evaluating Information Systems for Law Enforcement - A Long-Term Design-Science Research Project. Commun. Assoc. Inf. Syst. 29: 28 (2011) - [j6]Xuan Liu, Siddharth Kaza, Pengzhu Zhang, Hsinchun Chen:
Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India. J. Assoc. Inf. Sci. Technol. 62(6): 1166-1176 (2011) - [c20]Blair Taylor, Siddharth Kaza:
Security injections: modules to help students remember, understand, and apply secure coding techniques. ITiCSE 2011: 3-7 - [c19]Claude F. Turner, Blair Taylor, Siddharth Kaza:
Security in computer literacy: a model for design, dissemination, and assessment. SIGCSE 2011: 15-20 - [c18]Charles Dierbach, Harry Hochheiser, Samuel Collins, Gerald J. Jerome, Christopher Ariza, Tina Kelleher, William Kleinsasser, Josh Dehlinger, Siddharth Kaza:
A model for piloting pathways for computational thinking in a general education curriculum. SIGCSE 2011: 257-262 - 2010
- [p3]Siddharth Kaza, Hsinchun Chen:
Identifying High-Status Nodes in Knowledge Networks. Data Mining for Social Network Data 2010: 91-107
2000 – 2009
- 2009
- [j5]Daning Hu, Siddharth Kaza, Hsinchun Chen:
Identifying significant facilitators of dark network evolution. J. Assoc. Inf. Sci. Technol. 60(4): 655-665 (2009) - [j4]Siddharth Kaza, Jennifer Jie Xu, Byron Marshall, Hsinchun Chen:
Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security. IEEE Trans. Intell. Transp. Syst. 10(1): 83-91 (2009) - [c17]Siddharth Kaza, Hsinchun Chen:
Effect of Inventor Status on Intra-Organizational Innovation Evolution. HICSS 2009: 1-10 - 2008
- [b1]Siddharth Kaza:
Instance, Evolution, and Predictive Modeling of Social Networks. University of Arizona, Tucson, USA, 2008 - [j3]Siddharth Kaza, Hsinchun Chen:
Evaluating ontology mapping techniques: An experiment in public safety information sharing. Decis. Support Syst. 45(4): 714-728 (2008) - [j2]Byron Marshall, Hsinchun Chen, Siddharth Kaza:
Using importance flooding to identify interesting networks of criminal activity. J. Assoc. Inf. Sci. Technol. 59(13): 2099-2114 (2008) - [p2]Siddharth Kaza, Hsinchun Chen:
Public Safety Information Sharing: An Ontological Perspective. Digital Government 2008: 263-282 - [p1]Siddharth Kaza, Hsinchun Chen:
Suspect Vehicle Identification for Border Safety. Intelligence and Security Informatics 2008: 305-318 - 2007
- [j1]Siddharth Kaza, Yuan Wang, Hsinchun Chen:
Enhancing border security: Mutual information analysis to identify suspect vehicles. Decis. Support Syst. 43(1): 199-210 (2007) - [c16]Siddharth Kaza, Daning Hu, Homa Atabakhsh, Hsinchun Chen:
Predicting criminal relationships using multivariate survival analysis. DG.O 2007: 290-291 - [c15]G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Chunju Tseng, Homa Atabakhsh, Hsinchun Chen:
The Arizona IDMatcher: developing an identity matching tool for law enforcement. DG.O 2007: 304-305 - [c14]Siddharth Kaza, Daning Hu, Hsinchun Chen:
Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators. ISI 2007: 40-46 - [c13]G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen:
The Arizona IDMatcher: A Probabilistic Identity Matching System. ISI 2007: 229-235 - 2006
- [c12]Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette:
COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. DG.O 2006: 49-50 - [c11]Siddharth Kaza, Yuan Wang, Hsinchun Chen:
Target vehicle identification for border safety with modified mutual information. DG.O 2006: 410-411 - [c10]Siddharth Kaza, Yuan Wang, Hsinchun Chen:
Suspect Vehicle Identification for Border Safety with Modified Mutual Information. ISI 2006: 308-318 - 2005
- [c9]Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette:
Visualization in law enforcement. CHI Extended Abstracts 2005: 1268-1271 - [c8]Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette:
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. DG.O 2005: 112-113 - [c7]Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron Marshall, Siddharth Kaza, Shauna Eggers, Hemanth Gowda, Ankit Shah, Tim Petersen, Chuck Violette:
Visualization in law enforcement. DG.O 2005: 229-230 - [c6]Hsinchun Chen, Homa Atabakhsh, Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, G. Alan Wang, Tim Petersen, Chuck Violette:
BorderSafe: cross-jurisdictional information sharing, analysis, and visualization. DG.O 2005: 241-242 - [c5]Siddharth Kaza, Jennifer Jie Xu, Byron Marshall, Hsinchun Chen:
Topological analysis of criminal activity networks in multiple jurisdictions. DG.O 2005: 251-252 - [c4]Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen:
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. ISI 2005: 669-670 - 2004
- [c3]Byron Marshall, Siddharth Kaza, Jennifer Jie Xu, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen:
Cross-Jurisdictional Activity Networks to Support Criminal Investigations. DG.O 2004 - [c2]Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen:
Analyzing and Visualizing Criminal Network Dynamics: A Case Study. ISI 2004: 359-377 - 2003
- [c1]Siddharth Kaza, S. N. Jayaram Murthy, Gongzhu Hu:
Identification of Deliberately Doctored Text Documents Using The Frequency Keyword Chain (FKC) Model. IRI 2003: 398-405
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint