Follow
John Homer
John Homer
Professor of Computer Science, Abilene Christian University
Verified email at acu.edu
Title
Cited by
Cited by
Year
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
1742013
Improving attack graph visualization through data reduction and attack grouping
J Homer, A Varikuti, X Ou, MA McQueen
Visualization for Computer Security: 5th International Workshop, VizSec 2008 …, 2008
1322008
Metacognitive difficulties faced by novice programmers in automated assessment tools
J Prather, R Pettit, K McMurry, A Peters, J Homer, M Cohen
Proceedings of the 2018 ACM Conference on International Computing Education …, 2018
1182018
A sound and practical approach to quantifying security risk in enterprise networks
J Homer, X Ou, D Schmidt
Kansas State University Technical Report, 1-15, 2009
1012009
On novices' interaction with compiler error messages: A human factors approach
J Prather, R Pettit, KH McMurry, A Peters, J Homer, N Simone, M Cohen
Proceedings of the 2017 ACM Conference on International Computing Education …, 2017
932017
Do Enhanced Compiler Error Messages Help Students? Results Inconclusive.
RS Pettit, J Homer, R Gee
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
882017
On designing programming error messages for novices: Readability and its constituent factors
P Denny, J Prather, BA Becker, C Mooney, J Homer, ZC Albrecht, ...
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
732021
Sat-solving approaches to context-aware enterprise network security management
J Homer, X Ou
IEEE Journal on selected areas in communications 27 (3), 315-322, 2009
672009
An empirical study of iterative improvement in programming assignments
R Pettit, J Homer, R Gee, S Mengel, A Starbuck
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
622015
Are automated assessment tools helpful in programming courses?
RS Pettit, JD Homer, KM McMurry, N Simone, SA Mengel
2015 ASEE Annual Conference & Exposition, 26.230. 1-26.230. 20, 2015
532015
Effective network vulnerability assessment through model abstraction
S Zhang, X Ou, J Homer
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
322011
An empirical study of a vulnerability metric aggregation method
S Zhang, X Ou, A Singhal, J Homer
The 2011 International Conference on Security and Management (SAM’11 …, 2011
202011
From attack graphs to automated configuration management-an iterative approach
J Homer, X Ou, MA McQueen
Kansas State University Technical Report, 2008
192008
Augmenting attack graphs to represent data link and network layer vulnerabilities
JC Acosta, E Padilla, J Homer
MILCOM 2016-2016 IEEE Military Communications Conference, 1010-1015, 2016
162016
A comprehensive approach to enterprise network security management
J Homer
Kansas State University, 2009
102009
Hurry up and decide: Empirical tests of the choice overload effect using cognitive process models.
RK Jessup, LE Ritchie, J Homer
Decision 7 (2), 137, 2020
92020
Choice is a tricky thing: Integrating sophisticated choice models with learning processes to better account for complex choice behavior.
RK Jessup, JR Busemeyer, E Dimperio, J Homer, A Phillips
Decision 9 (3), 221, 2022
82022
Scaffolding Task Planning Using Abstract Parsons Problems
J Prather, J Homer, P Denny, BA Becker, J Marsden, G Powell
IFIP World Conference on Computers in Education, 591-602, 2022
42022
Characterization of cs1 student programming
N Bosch, D Towell, J Homer
Proceedings of the 2012 International Conference on Frontiers in Education …, 2012
22012
Process Swapping in MINIX
J Homer
Kansas State University, 2006
2006
The system can't perform the operation now. Try again later.
Articles 1–20