Department of Computer Science
My research interests are in the area of Information Assurance and Computer Security, particularly in intrusion prevention/detection. I am also interested in the operational aspects of security and have led a number of cyber exercise efforts for sectors, communities, and states throughout the nation.
Books and Book Chapters
Nestler, Conklin, White, Hirsch, Computer Security Lab Manual, McGraw Hill, New York, NY, 2006
Conklin, White, et al., Principles of Computer Security, McGraw Hill, New York, NY, 2004.
White, Conklin, et al., Security+ Certification Exam Guide, McGraw Hill/Osborne Publishing, New York, NY, 2003.
Archer, White, et al. Voice and Data Security, Sams Publishing, Indianapolis, Indiana, 2001. (Authors listed alphabetically)
White, chapter author for chapters on Spoofing and Sniffing, Maximum Security, 3ed, by Anonymous, Sams Publishing, Indianapolis, Indiana, 2001.
Fisch, and White, Secure Computers and Networks: Analysis, Design and Implementation, CRC Press, Boca Raton, FL, 2000.
White and Nordstrom, “Security Across the Curriculum: Using Computer Security to Teach Computer Science Principles”, chapter in Internet Besieged: Countering Cyberspace Scofflaws, Dorothy E. Denning and Peter J. Denning, editors, Addison-Wesley and ACM Press, 1998.
White, Fisch, and Pooch, Computer System and Network Security, CRC Press, Boca Raton, FL, 1996
Goles, White, Beebe, Dorantes, Hewitt, “Moral Intensity and Ethical Decision-Making: A Contextual Extension”, DataBase Vol 37, no. 2&3 (Summer/Fall combined), 2006.
White and Williams, “The National Collegiate Cyber Defense Competition”, Proceedings of the Tenth Colloquium for Information Systems Security Education, Baltimore, MD, 5-8 June 2006.
Conklin, White, “e-Government and Cyber Security: The Role of Cyber Security Exercises”, Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 4-7 January 2006, Kauai, Hawaii.
White, Williams, “The Collegiate Cyber Defense Competitiontm”, Proceedings of the Ninth Colloquium for Information Systems Security Education, 6-9 June 2005, Georgia Institute of Technology, Atlanta, Georgia
Conklin, White, “A Graduate Level Assessment Course: A Model for Safe Vulnerability Assessment”, Proceedings of the Ninth Colloquium for Information Systems Security Education, 6-9 June 2005, Georgia Institute of Technology, Atlanta, Georgia
Ramachandran and White, “Methodology to Assess the Impact of Investments in Security Tools and Products”, Journal of Information System Security, Vol 1, No. 2, 2005.
White, DiCenso, “Information Sharing Needs for National Security”, Proceedings of the 38th Hawaii International Conference on System Science, January 3-6, 2005, Waikoloa, Hawaii.
White, Goles, “The Role of Exercises in Training the Nation’s Cyber First-Responders,” Proceedings of the 10th Americas Conference on Information Systems (AMCIS 2004), August 5-8, 2004, New York City, New York.
Ramachandran, White, “Methodology to Determine Security ROI,” Proceedings of the 10th Americas Conference on Information Systems (AMCIS 2004), August 5-8, 2004, New York City, New York.
Goles, White, Dietrich, “Dark Screen: An Exercise in Cyber Security”, MIS Quarterly Executive, Vol 4. No. 2, June 2005.
White, Conklin, “The Appropriate Use of Force-on-Force Cyberexercises”, IEEE Security and Privacy, Volume 2, Number 4, July/August 2004.
White, Goles, “.edu, Partner or Pariah: A New Paradigm for University/Community Partnerships in Cyber Security,” Proceedings from the 8th Colloquium for Information Systems Security Education (CISSE), 8-10 June, 2004, West Point, New York.
White, Dietrich, Goles, “Cyber Security Exercises: Testing an Organization’s Ability to Prevent, Detect, and Respond to Cyber Security Events”, Proceedings of the 37th Hawaii International Conference on System Sciences, January 7, 2004, Waikoloa, Hawaii
White and Pooch, “Cooperating Security Managers: Distributed Intrusion Detection Systems”, Computers and Security, Vol. 15, No. 5, pp. 441-450, 1996.
White, Fisch, and Pooch,
“Cooperating Security Managers: A Peer-Based Intrusion Detection System”,
Jan/Feb 1996, Vol. 10, No. 1, IEEE Network
Current Course (Fall 2006)