Works Published in 2010

search works

Displaying works 1 - 20 of 23 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2010 conference paper

TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones

Proceedings of the 9th USENIX conference on Operating systems design and implementation, 1–6.

By: W. Enck n, P. Gilbert*, B. Chun*, L. Cox*, J. Jung*, P. McDaniel*, A. Sheth*

Event: USENIX Association

TL;DR: TaintDroid is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data and enabling realtime analysis by leveraging Android’s virtualized execution environment. (via Semantic Scholar)
Source: ORCID
Added: January 2, 2024

2010 journal article

Not so great expectations: Why application markets haven't failed security

IEEE Security & Privacy, 8(5), 76–78.

By: P. McDaniel & W. Enck

Source: ORCID
Added: January 2, 2024

2010 conference paper

Teaching multimedia production curricula effectively: Identifying essential competencies and skills of instructional design and technology professionals

Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Anaheim, CA.

By: M. Bishop, A. Brown, L. Daniels, T. Green, F. Martin, A. Ritzhaupt, B. Sugar

Event: Association of Educational Communications and Technology Conference at Anaheim, CA

Source: NC State University Libraries
Added: September 8, 2022

2010 conference paper

Adoption of virtual classrooms for online courses in higher education

Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Anaheim, CA.

By: F. Martin, M. Parker & B. Allred

Event: Association of Educational Communications and Technology Conference at Anaheim, CA

Source: NC State University Libraries
Added: September 8, 2022

2010 conference paper

Interactive technologies for synchronous online teaching

Association of Educational Communications and Technology Conference. Presented at the Association of Educational Communications and Technology Conference, Anaheim, CA.

By: F. Martin & D. Noonan

Event: Association of Educational Communications and Technology Conference at Anaheim, CA

Source: NC State University Libraries
Added: September 8, 2022

2010 journal article

Game play is important for learning

Learning and Leading with Technology, 38(1), 28–30.

By: L. Gillispie, M. Parker & F. Martin

Source: NC State University Libraries
Added: September 8, 2022

2010 journal article

Multimedia competencies for educational technologist. A survey of professionals and job announcement analysis

Journal of Educational Multimedia and Hypermedia, 19(4), 421–449.

By: A. Ritzhaupt, F. Martin & K. Daniels

Source: NC State University Libraries
Added: August 30, 2022

2010 journal article

Using virtual classrooms: Student perceptions of features and characteristics in an online and a blended Course

Journal of Online Learning and Teaching, 6(1), 135–147.

By: M. Parker & F. Martin

Source: NC State University Libraries
Added: August 30, 2022

2010 journal article

Do you teach in a virtual classroom? Measuring student's perceptions of the features and characteristics

International Journal of Instructional Technology and Distance Learning, 7(12), 17–28.

By: M. Parker, E. Grace & F. Martin

Source: NC State University Libraries
Added: August 30, 2022

2010 journal article

Effects of a 3-D video game on middle school student achievement and attitude in mathematics

Electronic Journal of Mathematics and Technology, 4(1), 68–80.

By: L. Gillispie, F. Martin & M. Parker

Source: NC State University Libraries
Added: August 30, 2022

2010 journal article

Influence of Learning Management Systems Self-efficacy on E-learning Performance

i-Manager's Journal on School Educational Technology, 5(3), 26–35.

By: F. Martin*, J. I. Tutty & Y. Su

TL;DR: The goal of this study was to develop and validate an instrum ent that assures students' confidence with LMS, and explore the relationship between LMS self-efficacy and course perform for e-learners. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: August 20, 2022

2010 conference paper

Synchronous virtual classrooms: Student perceptions from an online and blended education course

2010 International Conference on Technology for Education, T4E 2010, 93–100.

Contributors: M. Parker* & F. Martin*

TL;DR: Students in the fully online course rated the virtual classroom features and characteristics higher than students in the blended course, and statistically significant differences for 9 out of the 16 features that were investigated. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: ORCID
Added: August 15, 2022

2010 conference paper

Synchronous technologies for online teaching

2010 International Conference on Technology for Education, T4E 2010, 1–4.

By: F. Martin* & D. Noonan*

Contributors: F. Martin* & D. Noonan*

TL;DR: This presentation will promote global education and will introduce opportunities for educators to maintain the interaction in the classroom while providing an option for the students to take classes online. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: ORCID
Added: August 15, 2022

2010 conference paper

Best practices for teaching in a synchronous virtual classroom

Association of Educational Communications and Technology Conference, 44–46.

By: F. Martin*

Contributors: F. Martin*

Event: Association of Educational Communications and Technology Conference at Anaheim, CA

TL;DR: This session will discuss some of the best practices for teaching in a synchronous virtual classroom, categorized in different topics on how instructors who teach using synchronousvirtual classrooms can make it more effective. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Sources: ORCID, NC State University Libraries, NC State University Libraries
Added: August 15, 2022

2010 chapter

Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks

In F. Massacci, D. Wallach, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2010 (pp. 192–200).

Ed(s): F. Massacci, D. Wallach & N. Zannone

TL;DR: Although no SQL injection vulnerabilities were discovered, the results suggest that security testers who use an iterative, test-driven development process should compose system level rather than unit level tests. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: August 14, 2021

2010 thesis

Adaptive integer kernels and dyadic approximation error analysis for state-of-the-art video codecs

The Hong Kong Polytechnic University.

By: C. Wong

Source: ORCID
Added: October 16, 2020

2010 chapter

Impossibility Results for RFID Privacy Notions

In Transactions on Computational Science XI (pp. 39–63).

By: F. Armknecht*, A. Sadeghi*, A. Scafuro*, I. Visconti* & C. Wachsmann*

TL;DR: The model proposed by Paise and Vaudenay is revisited and it is shown that the strongest privacy notion (narrow-strong privacy) cannot be achieved simultaneously with reader authentication even under the strong assumption that tag corruption does not disclose temporary tag states. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: August 28, 2020

2010 chapter

D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks

In Computer Security – ESORICS 2010 (pp. 663–678).

By: A. Kapravelos*, I. Polakis*, E. Athanasopoulos, S. Ioannidis* & E. Markatos*

TL;DR: The nature of the attack is such that anyone can launch a Dial attack towards any telephone device, and the attack has zero financial cost, requires negligible computational resources and cannot be traced back to the attacker. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2010 journal article

malnets: large-scale malicious networks via compromised wireless access points

Security and Communication Networks, 3(2-3), 102–113.

author keywords: malware; routing; security
TL;DR: This work shows that malnets are not only feasible but can be efficiently deployed, and uses a sampling of available exploits to demonstrate the construction of multi-vector, multi-platform worms capable of targeting wireless routers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Crossref, NC State University Libraries, ORCID
Added: June 6, 2020

2010 article

Guest editorial: Special issue on software reliability engineering

Williams, L. (2010, August). EMPIRICAL SOFTWARE ENGINEERING, Vol. 15, pp. 321–322.

By: L. Williams n

TL;DR: This special issue of the Empirical Software Engineering journal is devoted to four papers selected from the 19th International Symposium on Software Reliability Engineering (ISSRE) that was held in Redmond, Washington on the Microsoft campus in 2008 due to the quality, novelty, and sound empirical analysis of the papers. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.