Works Published in 2009

search works

Displaying works 1 - 20 of 26 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2009 journal article

Configuration management at massive scale: system design and experience

IEEE Journal on Selected Areas in Communications, 27(3), 323–335.

By: W. Enck, T. Moyer, P. McDaniel, S. Sen, P. Sebos, S. Spoerel, A. Greenberg, Y. Sung, S. Rao, W. Aiello

Source: ORCID
Added: January 2, 2024

2009 journal article

Understanding Android Security.

IEEE Security & Privacy, 7(1), 50–57.

By: W. Enck, M. Ongtang, P. McDaniel & others

Source: ORCID
Added: January 2, 2024

2009 conference paper

Semantically rich application-centric security in Android

Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340–349.

By: M. Ongtang*, S. McLaughlin*, W. Enck n & P. McDaniel*

Event: Ieee

UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: ORCID
Added: January 2, 2024

2009 conference paper

On lightweight mobile phone application certification

Proceedings of the 16th ACM conference on Computer and communications security, 235–245.

By: W. Enck, M. Ongtang & P. McDaniel

Event: ACM

Source: ORCID
Added: January 2, 2024

2009 journal article

Mitigating attacks on open functionality in SMS-capable cellular networks

IEEE/ACM Transactions on Networking (TON), 17(1), 40–53.

By: P. Traynor, W. Enck, P. McDaniel & T. Porta

Source: ORCID
Added: January 2, 2024

2009 conference paper

Aligning NETS-T standards (NETS-T 2008) with technology products

Society for Information Technology & Teacher Education International Conference, 2066–2068. Association for the Advancement of Computing in Education (AACE).

By: M. Parker, B. Allred, F. Martin, A. Ndoye & A. Reid-Griffin

Event: Society for Information Technology & Teacher Education International Conference at Charleston, SC

Source: NC State University Libraries
Added: September 15, 2022

2009 conference paper

Multimedia Tools (Proprietary, Open Source and Freeware) for Developers

Society for Information Technology & Teacher Education International Conference, 601–606. Association for the Advancement of Computing in Education (AACE).

By: F. Martin & L. Gillispie

Event: Society for Information Technology & Teacher Education International Conference at Charleston, SC

Source: NC State University Libraries
Added: September 15, 2022

2009 conference paper

Examining the foundations of educational technology course in 2009

Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.

By: J. Tutty & F. Martin

Event: Association of Educational Communications and Technology Conference at Louisville, KY

Source: NC State University Libraries
Added: September 15, 2022

2009 conference paper

Efolio technologies for digital students

Society for Information Technology and Teacher Education Conference, 126–129. Association for the Advancement of Computing in Education (AACE).

By: F. Martin, M. Parker, A. Reid-Griffin, B. Allred & A. Ndoye

Event: Society for Information Technology and Teacher Education Conference at Charleston, SC

Source: NC State University Libraries
Added: September 15, 2022

2009 conference paper

Multimedia competencies for instructional technologist: A 2009 needs assessment

Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.

By: F. Martin & A. Ritzhaupt

Event: Association of Educational Communications and Technology Conference at Louisville, KY

Source: NC State University Libraries
Added: September 8, 2022

2009 conference paper

Measuring learning management system self-efficacy

Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.

By: F. Martin, J. Tutty & Y. Su

Event: Association of Educational Communications and Technology Conference at Louisville, KY

Source: NC State University Libraries
Added: September 8, 2022

2009 conference paper

The effect of faculty and student personality type on perceptions of learning through virtual classrooms

Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.

By: M. Parker, F. Martin & S. Allred

Event: Association of Educational Communications and Technology Conference at Louisville, KY

Source: NC State University Libraries
Added: September 8, 2022

2009 conference paper

Effects of the dimension-M 3D video gaming experience on middle school student achievement and attitude in mathematics

Society for Information Technology & Teacher Education International Conference, 1462–1469. Association for the Advancement of Computing in Education (AACE).

By: L. Gillispie, F. Martin & M. Parker

Event: Society for Information Technology and Teacher Education Conference at Charleston, SC

Source: NC State University Libraries
Added: August 30, 2022

2009 chapter

User generated design: Teaching and learning with web2.0

In T. Kidd & I. Chen (Eds.), Wired for Learning: An Educators Guide to Web 2.0 (pp. 43–57). Charlotte, NC: Information Age Publishing.

By: J. Tutty & F. Martin

Ed(s): T. Kidd & I. Chen

Source: NC State University Libraries
Added: August 30, 2022

2009 journal article

The HPT model applied to a kayak company's registration process

Performance Improvement, 48(3), 26–35.

By: F. Martin*, H. Hall, A. Blakely*, M. Gayford* & E. Gunter

UN Sustainable Development Goal Categories
14. Life Below Water (OpenAlex)
Sources: Crossref, NC State University Libraries
Added: August 20, 2022

2009 chapter

Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer

In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009 (pp. 122–134).

By: L. Williams n, M. Gegick n & A. Meneely n

Ed(s): F. Massacci, S. Redwine & N. Zannone

TL;DR: The Protection Poker activity is proposed as a collaborative and informal form of misuse case development and threat modeling that plays off the diversity of knowledge and perspective of the participants and lead to a more effective software security learning experience. (via Semantic Scholar)
Source: Crossref
Added: August 14, 2021

2009 chapter

Toward Non-security Failures as a Predictor of Security Faults and Failures

In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009. (pp. 135–149).

By: M. Gegick n, P. Rotella* & L. Williams n

Ed(s): F. Massacci, S. Redwine & N. Zannone

TL;DR: It is found that 57% of the vulnerable components were in the top nine percent of the total component ranking, but with a 48% false positive rate, indicating that non-security failures can be used as one of the input variables for security-related prediction models. (via Semantic Scholar)
Source: Crossref
Added: August 14, 2021

2009 journal article

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks

Wireless Networks, 15(4), 525–539.

author keywords: MANET; Security; Anonymity; Packet forwarding; Monitoring; Secure link layer acknowledgment; Secure reporting protocol
TL;DR: A protocol that uses nodes on the data path to securely produce packet-forwarding reports and the integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries, ORCID
Added: November 7, 2020

2009 conference paper

Transform kernel selection strategy for the H.264

Annual Summit and Conference, APSIPA, 64–70.

By: C. Wong & W. Siu

Event: APSIPA

Source: ORCID
Added: October 16, 2020

2009 chapter

Revisiting DoS Attacks and Privacy in RFID-Enabled Networks

In Algorithmic Aspects of Wireless Sensor Networks (pp. 76–87).

TL;DR: This paper refine Vaudenay's privacy model to deal with DoS and DoS-like attacks, and introduces an additional privacy notion, referred to as semi-destructive privacy, which takes into account hardware features of some real-world tags. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.