Displaying works 1 - 20 of 26 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2009 journal article
Configuration management at massive scale: system design and experience
IEEE Journal on Selected Areas in Communications, 27(3), 323–335.
2009 journal article
Understanding Android Security.
IEEE Security & Privacy, 7(1), 50–57.
2009 conference paper
Semantically rich application-centric security in Android
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340–349.
Event: Ieee
2009 conference paper
On lightweight mobile phone application certification
Proceedings of the 16th ACM conference on Computer and communications security, 235–245.
Event: ACM
2009 journal article
Mitigating attacks on open functionality in SMS-capable cellular networks
IEEE/ACM Transactions on Networking (TON), 17(1), 40–53.
2009 conference paper
Aligning NETS-T standards (NETS-T 2008) with technology products
Society for Information Technology & Teacher Education International Conference, 2066–2068. Association for the Advancement of Computing in Education (AACE).
Event: Society for Information Technology & Teacher Education International Conference at Charleston, SC
2009 conference paper
Multimedia Tools (Proprietary, Open Source and Freeware) for Developers
Society for Information Technology & Teacher Education International Conference, 601–606. Association for the Advancement of Computing in Education (AACE).
Event: Society for Information Technology & Teacher Education International Conference at Charleston, SC
2009 conference paper
Examining the foundations of educational technology course in 2009
Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.
Event: Association of Educational Communications and Technology Conference at Louisville, KY
2009 conference paper
Efolio technologies for digital students
Society for Information Technology and Teacher Education Conference, 126–129. Association for the Advancement of Computing in Education (AACE).
Event: Society for Information Technology and Teacher Education Conference at Charleston, SC
2009 conference paper
Multimedia competencies for instructional technologist: A 2009 needs assessment
Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.
Event: Association of Educational Communications and Technology Conference at Louisville, KY
2009 conference paper
Measuring learning management system self-efficacy
Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.
Event: Association of Educational Communications and Technology Conference at Louisville, KY
2009 conference paper
The effect of faculty and student personality type on perceptions of learning through virtual classrooms
Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Louisville, KY.
Event: Association of Educational Communications and Technology Conference at Louisville, KY
2009 conference paper
Effects of the dimension-M 3D video gaming experience on middle school student achievement and attitude in mathematics
Society for Information Technology & Teacher Education International Conference, 1462–1469. Association for the Advancement of Computing in Education (AACE).
Event: Society for Information Technology and Teacher Education Conference at Charleston, SC
2009 chapter
User generated design: Teaching and learning with web2.0
In T. Kidd & I. Chen (Eds.), Wired for Learning: An Educators Guide to Web 2.0 (pp. 43–57). Charlotte, NC: Information Age Publishing.
Ed(s): T. Kidd & I. Chen
2009 journal article
The HPT model applied to a kayak company's registration process
Performance Improvement, 48(3), 26–35.
2009 chapter
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009 (pp. 122–134).
Ed(s): F. Massacci, S. Redwine & N. Zannone
2009 chapter
Toward Non-security Failures as a Predictor of Security Faults and Failures
In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009. (pp. 135–149).
Ed(s): F. Massacci, S. Redwine & N. Zannone
2009 journal article
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks
Wireless Networks, 15(4), 525–539.
2009 conference paper
Transform kernel selection strategy for the H.264
Annual Summit and Conference, APSIPA, 64–70.
Event: APSIPA
2009 chapter
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
In Algorithmic Aspects of Wireless Sensor Networks (pp. 76–87).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.