Follow
John Homer
John Homer
Professor of Computer Science, Abilene Christian University
Verified email at acu.edu
Title
Cited by
Cited by
Year
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
1312013
Improving attack graph visualization through data reduction and attack grouping
J Homer, A Varikuti, X Ou, MA McQueen
International Workshop on Visualization for Computer Security, 68-79, 2008
1162008
A sound and practical approach to quantifying security risk in enterprise networks
J Homer, X Ou, D Schmidt
Kansas State University Technical Report, 1-15, 2009
842009
Sat-solving approaches to context-aware enterprise network security management
J Homer, X Ou
IEEE Journal on selected areas in communications 27 (3), 315-322, 2009
622009
Do Enhanced Compiler Error Messages Help Students? Results Inconclusive.
RS Pettit, J Homer, R Gee
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
532017
Metacognitive difficulties faced by novice programmers in automated assessment tools
J Prather, R Pettit, K McMurry, A Peters, J Homer, M Cohen
Proceedings of the 2018 ACM Conference on International Computing Education …, 2018
462018
On novices' interaction with compiler error messages: A human factors approach
J Prather, R Pettit, KH McMurry, A Peters, J Homer, N Simone, M Cohen
Proceedings of the 2017 ACM Conference on International Computing Education …, 2017
422017
An empirical study of iterative improvement in programming assignments
R Pettit, J Homer, R Gee, S Mengel, A Starbuck
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
382015
Are automated assessment tools helpful in programming courses?
RS Pettit, JD Homer, KM McMurry, N Simone, SA Mengel
2015 ASEE Annual Conference & Exposition, 26.230. 1-26.230. 20, 2015
302015
Effective network vulnerability assessment through model abstraction
S Zhang, X Ou, J Homer
International Conference on Detection of Intrusions and Malware, and …, 2011
282011
An empirical study of a vulnerability metric aggregation method
S Zhang, X Ou, A Singhal, J Homer
KANSAS STATE UNIV MANHATTAN, 2011
162011
From attack graphs to automated configuration management—An iterative approach
J Homer, X Ou, MA McQueen
Kansas State University Technical Report, 2008
132008
Augmenting attack graphs to represent data link and network layer vulnerabilities
JC Acosta, E Padilla, J Homer
MILCOM 2016-2016 IEEE Military Communications Conference, 1010-1015, 2016
112016
On Designing Programming Error Messages for Novices: Readability and Its Constituent Factors
P Denny, J Prather, BA Becker, C Mooney, J Homer, ZC Albrecht, ...
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
92021
A comprehensive approach to enterprise network security management
J Homer
Kansas State University, 2009
82009
Hurry up and decide: Empirical tests of the choice overload effect using cognitive process models.
RK Jessup, LE Ritchie, J Homer
Decision 7 (2), 137, 2020
52020
Characterization of cs1 student programming
N Bosch, D Towell, J Homer
Proceedings of the 2012 International Conference on Frontiers in Education …, 2012
22012
Choice is a tricky thing: Integrating sophisticated choice models with learning processes to better account for complex choice behavior.
RK Jessup, JR Busemeyer, E Dimperio, J Homer, A Phillips
Decision, 2022
2022
Process Swapping in MINIX
J Homer
Kansas State University, 2006
2006
Cyber Security and Information Systems Information Analysis Center
J Acosta, E Padilla, X Ou, J Homer
The system can't perform the operation now. Try again later.
Articles 1–20