Works Published in 2007

search works

Displaying all 13 works

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2007 conference paper

Configuration Management at Massive Scale: System Design and Experience

Proceedings of the USENIX Annual Technical Conference, 73–86. https://www.usenix.org/legacy/events/usenix07/tech/enck.html

By: W. Enck, P. McDaniel, S. Sen, P. Sebos, S. Spoerel, A. Greenberg, S. Rao, W. Aiello

Event: USENIX Annual Technical Conference at Santa Clara, CA

Source: NC State University Libraries
Added: January 13, 2024

2007 conference paper

Protecting users from themselves

Proceedings of the 2007 ACM workshop on Computer security architecture, 29–36.

By: W. Enck, S. Rueda, J. Schiffman, Y. Sreenivasan, L. St Clair, T. Jaeger, P. McDaniel

Event: ACM

Source: ORCID
Added: January 2, 2024

2007 conference paper

Limiting sybil attacks in structured p2p networks

INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2596–2600.

By: H. Rowaihy, W. Enck, P. McDaniel & T. La Porta

Event: IEEE

Source: ORCID
Added: January 2, 2024

2007 report

Grains of SANs: Building Storage Area Networks from Memory Spots

Technical Report NASTR-0060-2007, Network and Security Research Center ….

By: L. Johansen, K. Butler, W. Enck, P. Traynor & P. McDaniel

Source: ORCID
Added: January 2, 2024

2007 conference paper

Effectiveness of digital visual literacy in computer literacy Curriculum

National Science Foundation, ATE conference. Presented at the National Science Foundation, ATE conference, Washington D.C.

By: F. Martin & O. Friesen

Event: National Science Foundation, ATE conference at Washington D.C

Source: NC State University Libraries
Added: August 30, 2022

2007 conference paper

Effect of practice in a linear and non-linear web-based learning environment

Proceeding of Association for Educational Communications and Technology conference. Presented at the Association for Educational Communications and Technology conference, Anaheim, CA.

By: F. Martin & J. Tutty

Event: Association for Educational Communications and Technology conference at Anaheim, CA

Source: NC State University Libraries
Added: August 30, 2022

2007 journal article

A Methodical Formative Evaluation of Computer Literacy Course: What and How to Teach

Journal of Information Technology Education: Research, 6, 123–134.

By: F. Martin* & Q. Dunsworth*

TL;DR: In this study, the focus of research is a formative approach where an evaluation is done to improve the curriculum design of computer literacy rather than a summative evaluation to prove the overall effectiveness of the curriculum. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Sources: Crossref, NC State University Libraries
Added: August 20, 2022

2007 journal article

The impact of instructional elements in computer-based instruction

British Journal of Educational Technology, 38(4), 623–636.

By: F. Martin*, J. Klein* & H. Sullivan*

Contributors: F. Martin*, J. Klein* & H. Sullivan*

TL;DR: Participants who used one of the four versions of the computer program that included practice performed significantly better on the posttest and had consistently more positive attitudes than those who did not receive practice. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: ORCID
Added: August 15, 2022

2007 chapter

Roadmapping Working Group 4 Results

In V. R. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl, & R. W. Selby (Eds.), Empirical Software Engineering Issues. Critical Assessment and Future Directions (pp. 181–183).

By: L. Williams*, H. Erdogmus & R. Selby

Ed(s): V. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl & R. Selby

TL;DR: The group carefully considered the factors involved with the maturity of the field of Empirical Software Engineering and found that the progress to move linearly along an axis is not proportional to the amount of work that must take place. (via Semantic Scholar)
Source: Crossref
Added: September 18, 2021

2007 chapter

Industry-Research Collaboration Working Group Results

In V. R. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl, & R. W. Selby (Eds.), Empirical Software Engineering Issues. Critical Assessment and Future Directions (pp. 153–157).

By: L. Prechelt & L. Williams*

Ed(s): V. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl & R. Selby

TL;DR: The agreed-upon deliverable from this session was for a subset of the group to submit a longer version of this report to IEEE Software or the Empirical Software Engineering journal as a set of guidelines. (via Semantic Scholar)
Source: Crossref
Added: September 18, 2021

2007 chapter

Structuring Families of Industrial Case Studies

In V. R. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl, & R. W. Selby (Eds.), Empirical Software Engineering Issues. Critical Assessment and Future Directions (pp. 134–134).

Ed(s): V. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl & R. Selby

TL;DR: Groups of researchers interested in the same research question(s) can customize and evolve an evaluation framework for the technology under study, which consists of templates for specific quantitative measures to collect with associated instructions on what to include/exclude for consistent measurement collection. (via Semantic Scholar)
Source: Crossref
Added: August 14, 2021

2007 journal article

TARP: Ticket-based address resolution protocol

Computer Networks, 51(15), 4322–4337.

By: W. Lootah*, W. Enck* & P. McDaniel*

author keywords: network security; ARP security
TL;DR: TARP implements security by distributing centrally issued secure MAC/IP address mapping attestations through existing ARP messages and improves the costs of implementing ARP security by as much as two orders of magnitude over existing protocols. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries, ORCID
Added: August 28, 2020

2007 journal article

On the design of more secure software-intensive systems by use of attack patterns

INFORMATION AND SOFTWARE TECHNOLOGY, 49(4), 381–397.

author keywords: software and system safety; patterns
TL;DR: Regular expression-based attack patterns that show the sequential events that occur during an attack are created by creating a Security Analysis for Existing Threats (SAFE-T), a architectural analysis that identifies security vulnerabilities early in the software process. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.