Aggregating vulnerability metrics in enterprise networks using attack graphs J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal Journal of Computer Security 21 (4), 561-597, 2013 | 174 | 2013 |
Improving attack graph visualization through data reduction and attack grouping J Homer, A Varikuti, X Ou, MA McQueen Visualization for Computer Security: 5th International Workshop, VizSec 2008 …, 2008 | 132 | 2008 |
Metacognitive difficulties faced by novice programmers in automated assessment tools J Prather, R Pettit, K McMurry, A Peters, J Homer, M Cohen Proceedings of the 2018 ACM Conference on International Computing Education …, 2018 | 118 | 2018 |
A sound and practical approach to quantifying security risk in enterprise networks J Homer, X Ou, D Schmidt Kansas State University Technical Report, 1-15, 2009 | 101 | 2009 |
On novices' interaction with compiler error messages: A human factors approach J Prather, R Pettit, KH McMurry, A Peters, J Homer, N Simone, M Cohen Proceedings of the 2017 ACM Conference on International Computing Education …, 2017 | 93 | 2017 |
Do Enhanced Compiler Error Messages Help Students? Results Inconclusive. RS Pettit, J Homer, R Gee Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017 | 88 | 2017 |
On designing programming error messages for novices: Readability and its constituent factors P Denny, J Prather, BA Becker, C Mooney, J Homer, ZC Albrecht, ... Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021 | 73 | 2021 |
Sat-solving approaches to context-aware enterprise network security management J Homer, X Ou IEEE Journal on selected areas in communications 27 (3), 315-322, 2009 | 67 | 2009 |
An empirical study of iterative improvement in programming assignments R Pettit, J Homer, R Gee, S Mengel, A Starbuck Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015 | 62 | 2015 |
Are automated assessment tools helpful in programming courses? RS Pettit, JD Homer, KM McMurry, N Simone, SA Mengel 2015 ASEE Annual Conference & Exposition, 26.230. 1-26.230. 20, 2015 | 53 | 2015 |
Effective network vulnerability assessment through model abstraction S Zhang, X Ou, J Homer Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011 | 32 | 2011 |
An empirical study of a vulnerability metric aggregation method S Zhang, X Ou, A Singhal, J Homer The 2011 International Conference on Security and Management (SAM’11 …, 2011 | 20 | 2011 |
From attack graphs to automated configuration management-an iterative approach J Homer, X Ou, MA McQueen Kansas State University Technical Report, 2008 | 19 | 2008 |
Augmenting attack graphs to represent data link and network layer vulnerabilities JC Acosta, E Padilla, J Homer MILCOM 2016-2016 IEEE Military Communications Conference, 1010-1015, 2016 | 16 | 2016 |
A comprehensive approach to enterprise network security management J Homer Kansas State University, 2009 | 10 | 2009 |
Hurry up and decide: Empirical tests of the choice overload effect using cognitive process models. RK Jessup, LE Ritchie, J Homer Decision 7 (2), 137, 2020 | 9 | 2020 |
Choice is a tricky thing: Integrating sophisticated choice models with learning processes to better account for complex choice behavior. RK Jessup, JR Busemeyer, E Dimperio, J Homer, A Phillips Decision 9 (3), 221, 2022 | 8 | 2022 |
Scaffolding Task Planning Using Abstract Parsons Problems J Prather, J Homer, P Denny, BA Becker, J Marsden, G Powell IFIP World Conference on Computers in Education, 591-602, 2022 | 4 | 2022 |
Characterization of cs1 student programming N Bosch, D Towell, J Homer Proceedings of the 2012 International Conference on Frontiers in Education …, 2012 | 2 | 2012 |
Process Swapping in MINIX J Homer Kansas State University, 2006 | | 2006 |