default search action
Nicole Beebe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Brita Munsinger, Nicole Beebe, Turquoise Richardson:
Virtual reality for improving cyber situational awareness in security operations centers. Comput. Secur. 132: 103368 (2023) - [j20]Albert M. Villarreal, Robin Kumar Verma, Oren Upton, Nicole Lang Beebe:
Nondestructive Data Acquisition Methodology for IoT Devices: A Case Study on Amazon Echo Dot Version 2. IEEE Internet Things J. 10(5): 4375-4387 (2023) - [j19]Patricia Akello, Naga Vemprala, Nicole Lang Beebe, Kim-Kwang Raymond Choo:
Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence. ACM Trans. Manag. Inf. Syst. 14(1): 7:1-7:26 (2023) - [c20]Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad:
Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability. USENIX Security Symposium 2023: 643-660 - 2020
- [j18]Michele Maasberg, Craig Van Slyke, Selwyn Ellis, Nicole Beebe:
The dark triad and insider threats in cyber security. Commun. ACM 63(12): 64-80 (2020) - [j17]Xiaolu Zhang, Oren Upton, Nicole Lang Beebe, Kim-Kwang Raymond Choo:
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. Digit. Investig. 32 Supplement: 300926 (2020) - [j16]Gonzalo De La Torre Parra, Paul Rad, Kim-Kwang Raymond Choo, Nicole Beebe:
Detecting Internet of Things attacks using distributed deep learning. J. Netw. Comput. Appl. 163: 102662 (2020) - [c19]Zahra Aivazpour, Nicole Lang Beebe:
The Impact of Power Imbalance on Cyberbullying: the Role of Bystanders Intervention. ICIS 2020
2010 – 2019
- 2019
- [j15]Xiaolu Zhang, Justin Grannis, Ibrahim M. Baggili, Nicole Lang Beebe:
Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system. Digit. Investig. 29: 28-42 (2019) - [j14]Xiaolu Zhang, Kim-Kwang Raymond Choo, Nicole Lang Beebe:
How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform. IEEE Internet Things J. 6(4): 6850-6861 (2019) - [j13]Samuel Henrique Silva, Paul Rad, Nicole Beebe, Kim-Kwang Raymond Choo, Mahesh Umapathy:
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking. J. Parallel Distributed Comput. 131: 147-160 (2019) - 2018
- [c18]Zahra Aivazpour, Nicole Beebe:
Cyberbullying: Investigating the Roles of Power and Communication Medium. AMCIS 2018 - [c17]Paul Rad, Mehdi Roopaei, Nicole Beebe, Mehdi Shadaram, Yoris Au:
AI Thinking for Cloud Education Platform with Personalized Learning. HICSS 2018: 1-10 - [c16]Nicholas Mata, Nicole Beebe, Kim-Kwang Raymond Choo:
Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis. TrustCom/BigDataSE 2018: 1433-1439 - 2017
- [c15]Nicole Beebe, Lishu Liu, Zi Ye:
Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis. IFIP Int. Conf. Digital Forensics 2017: 149-167 - 2016
- [j12]Diana K. Young, Nicole Beebe, Glenn Dietrich, Charles Zhechao Liu:
An Empirical Examination of an Agile Contingent Project/Method Fit Model. Commun. Assoc. Inf. Syst. 39: 14 (2016) - [c14]Chelsea Hicks, Nicole Beebe, Brandi Haliscak:
Extending Web Mining to Digital Forensics Text Mining. AMCIS 2016 - [c13]Michele Maasberg, Myung Ko, Nicole Lang Beebe:
Exploring a Systematic Approach to Malware Threat Assessment. HICSS 2016: 5517-5526 - [c12]Nicole Beebe, Lishu Liu, Minghe Sun:
Data Type Classification: Hierarchical Class-to-Type Modeling. IFIP Int. Conf. Digital Forensics 2016: 325-343 - 2015
- [c11]Michele Maasberg, John Warren, Nicole Lang Beebe:
The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits. HICSS 2015: 3518-3526 - 2014
- [j11]Nicole Lang Beebe, Diana K. Young, Frederick Chang:
Framing Information Security Budget Requests to Influence Investment Decisions. Commun. Assoc. Inf. Syst. 35: 7 (2014) - [j10]Nicole Lang Beebe, Lishu Liu:
Clustering digital forensic string search output. Digit. Investig. 11(4): 314-322 (2014) - [j9]Nicole Lang Beebe, Lishu Liu:
Ranking algorithms for digital forensic string search hits. Digit. Investig. 11(Supplement 2): S124-S132 (2014) - 2013
- [j8]Nicole Lang Beebe, Laurence A. Maddox, Lishu Liu, Minghe Sun:
Sceadan: Using Concatenated N-Gram Vectors for Improved File and Data Type Classification. IEEE Trans. Inf. Forensics Secur. 8(9): 1519-1530 (2013) - 2012
- [c10]Diana K. Young, Nicole Beebe, Frederick Chang:
Prospect Theory and Information Security Investment Decisions. AMCIS 2012 - 2011
- [j7]Nicole Lang Beebe, Jan Guynes Clark, Glenn B. Dietrich, Myung S. Ko, Daijin Ko:
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies. Decis. Support Syst. 51(4): 732-744 (2011) - 2010
- [j6]Nicole Lang Beebe, V. Srinivasan Rao:
Improving Organizational Information Security Strategy via Meso-Level Application of Situational Crime Prevention to the Risk Management Process. Commun. Assoc. Inf. Syst. 26: 17 (2010)
2000 – 2009
- 2009
- [j5]Nicole Lang Beebe, Sonia D. Stacy, Dane Stuckey:
Digital forensic implications of ZFS. Digit. Investig. 6(Supplement): S99-S107 (2009) - [c9]Nicole Lang Beebe, V. Srinivasan Rao:
Examination of Organizational Information Security Strategy: A Pilot Study. AMCIS 2009: 417 - [c8]Nicole Beebe:
Digital Forensic Research: The Good, the Bad and the Unaddressed. IFIP Int. Conf. Digital Forensics 2009: 17-36 - 2007
- [j4]Nicole Lang Beebe, Jan Guynes Clark:
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results. Digit. Investig. 4(Supplement): 49-54 (2007) - [c7]Nicole Beebe, Glenn B. Dietrich:
A New Process Model for Text String Searching. IFIP Int. Conf. Digital Forensics 2007: 179-191 - 2006
- [j3]Tim Goles, Gregory B. White, Nicole Beebe, Carlos Alberto Dorantes, Barbara Hewitt:
Moral intensity and ethical decision-making: a contextual extension. Data Base 37(2-3): 86-95 (2006) - [j2]Nicole Beebe, Gary C. Kessler:
A Review of: "Real Digital Forensics: Computer Security and Incident Response. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose". J. Digit. Forensic Pract. 1(4): 325-326 (2006) - [c6]Nicole Lang Beebe, Jan Guynes Clark:
A Model for Predicting Hacker Behavior. AMCIS 2006: 409 - [c5]Nicole Lang Beebe, Jan Guynes Clark:
Digital Forensics Curriculum Development: Identification of Knowledge Domains Learning Objectives and Core Concepts. AMCIS 2006: 421 - 2005
- [j1]Nicole Beebe, Jan Guynes Clark:
A hierarchical, objectives-based framework for the digital investigations process. Digit. Investig. 2(2): 147-167 (2005) - [c4]Nicole Lang Beebe, Diane B. Walz:
An Empirical Investigation of the Impact of Data Quality and its Antecedents on Data Warehousing. AMCIS 2005: 28 - [c3]Nicole Beebe, Jan Guynes Clark:
Dealing with Terabyte Datasets in Digital Investigations. IFIP Int. Conf. Digital Forensics 2005: 3-16 - 2004
- [c2]Nicole Lang Beebe, Roy Calvo, V. Srinivasan Rao:
Web Services Security: Proposed Model for Content Delivery Assurance in a Low Trust Scenario. AMCIS 2004: 513 - [c1]Jan Guynes Clark, Nicole Beebe, Andrew G. Kotulic:
Integrating Security and Privacy Issues in System Design. WOSIS 2004: 33-46
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint