John Homer
John Homer
Professor of Computer Science, Abilene Christian University
Verified email at
Cited by
Cited by
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
Improving attack graph visualization through data reduction and attack grouping
J Homer, A Varikuti, X Ou, MA McQueen
Visualization for Computer Security: 5th International Workshop, VizSec 2008 …, 2008
Metacognitive difficulties faced by novice programmers in automated assessment tools
J Prather, R Pettit, K McMurry, A Peters, J Homer, M Cohen
Proceedings of the 2018 ACM Conference on International Computing Education …, 2018
A sound and practical approach to quantifying security risk in enterprise networks
J Homer, X Ou, D Schmidt
Kansas State University Technical Report, 1-15, 2009
Do Enhanced Compiler Error Messages Help Students? Results Inconclusive.
RS Pettit, J Homer, R Gee
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017
On novices' interaction with compiler error messages: A human factors approach
J Prather, R Pettit, KH McMurry, A Peters, J Homer, N Simone, M Cohen
Proceedings of the 2017 ACM Conference on International Computing Education …, 2017
Sat-solving approaches to context-aware enterprise network security management
J Homer, X Ou
IEEE Journal on selected areas in communications 27 (3), 315-322, 2009
An empirical study of iterative improvement in programming assignments
R Pettit, J Homer, R Gee, S Mengel, A Starbuck
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
On designing programming error messages for novices: Readability and its constituent factors
P Denny, J Prather, BA Becker, C Mooney, J Homer, ZC Albrecht, ...
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021
Are automated assessment tools helpful in programming courses?
RS Pettit, JD Homer, KM McMurry, N Simone, SA Mengel
2015 ASEE Annual Conference & Exposition, 26.230. 1-26.230. 20, 2015
Effective network vulnerability assessment through model abstraction
S Zhang, X Ou, J Homer
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
An empirical study of a vulnerability metric aggregation method
S Zhang, X Ou, A Singhal, J Homer
The 2011 International Conference on Security and Management (SAM’11 …, 2011
From attack graphs to automated configuration management-an iterative approach
J Homer, X Ou, MA McQueen
Kansas State University Technical Report, 2008
Augmenting attack graphs to represent data link and network layer vulnerabilities
JC Acosta, E Padilla, J Homer
MILCOM 2016-2016 IEEE Military Communications Conference, 1010-1015, 2016
A comprehensive approach to enterprise network security management
J Homer
Kansas State University, 2009
Hurry up and decide: Empirical tests of the choice overload effect using cognitive process models.
RK Jessup, LE Ritchie, J Homer
Decision 7 (2), 137, 2020
Choice is a tricky thing: Integrating sophisticated choice models with learning processes to better account for complex choice behavior.
RK Jessup, JR Busemeyer, E Dimperio, J Homer, A Phillips
Decision 9 (3), 221, 2022
Scaffolding Task Planning Using Abstract Parsons Problems
J Prather, J Homer, P Denny, BA Becker, J Marsden, G Powell
IFIP World Conference on Computers in Education, 591-602, 2022
Characterization of cs1 student programming
N Bosch, D Towell, J Homer
Proceedings of the 2012 International Conference on Frontiers in Education …, 2012
Process Swapping in MINIX
J Homer
Kansas State University, 2006
The system can't perform the operation now. Try again later.
Articles 1–20