Phishing URL detection using URL ranking MN Feroz, S Mengel 2015 ieee international congress on big data, 635-638, 2015 | 96 | 2015 |
Distribution Unlimited C Melion | 92 | 1999 |
An empirical study of iterative improvement in programming assignments R Pettit, J Homer, R Gee, S Mengel, A Starbuck Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015 | 60 | 2015 |
A case study of the static analysis of the quality of novice student programs SA Mengel, V Yerramilli The proceedings of the thirtieth SIGCSE technical symposium on Computer …, 1999 | 60 | 1999 |
Guidelines for software engineering education D Bagert, TB Hilburn, G Hislop, M Lutz, M McCracken, S Mengel Version 1.0. Technical Report CMU/SEI-99-TR-032, 1999 | 55 | 1999 |
Examination of data, rule generation and detection of phishing URLs using online logistic regression MN Feroz, S Mengel 2014 IEEE International Conference on Big Data (Big Data), 241-250, 2014 | 48 | 2014 |
Are automated assessment tools helpful in programming courses? RS Pettit, JD Homer, KM McMurry, N Simone, SA Mengel 2015 ASEE Annual Conference & Exposition, 26.230. 1-26.230. 20, 2015 | 43 | 2015 |
SLEEP (sleep loss effects on everyday performance) model JM Gregory, X Xie, SA Mengel Aviation, space, and environmental medicine 75 (3), A125-A133, 2004 | 41 | 2004 |
The need for a hypertext instructional design methodology SA Mengel, WJ Adams IEEE Transactions on Education 39 (3), 375-380, 1996 | 38 | 1996 |
Software engineering across computing curricula TB Hilburn, S Mengel, DJ Bagert, D Oexmann ACM SIGCSE Bulletin 30 (3), 117-121, 1998 | 35 | 1998 |
A review of MongoDB and singularity container security in regards to hipaa regulations A Mailewa Dissanayaka, RR Shetty, S Kothari, S Mengel, L Gittner, ... Companion Proceedings of the10th International Conference on Utility and …, 2017 | 30 | 2017 |
Secure NoSQL based medical data processing and retrieval: the exposome project RR Shetty, AM Dissanayaka, S Mengel, L Gittner, R Vadapalli, H Khan Companion Proceedings of the10th International Conference on Utility and …, 2017 | 28 | 2017 |
Vulnerability prioritization, root cause analysis, and mitigation of secure data analytic framework implemented with mongodb on singularity linux containers AM Dissanayaka, S Mengel, L Gittner, H Khan Proceedings of the 2020 4th International Conference on Compute and Data …, 2020 | 27 | 2020 |
Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs AM Dissanayaka, S Mengel, L Gittner, H Khan Companion Conference of the Supercomputing-2018 (SC18), 2018 | 25 | 2018 |
Using a neural network to predict student responses S Mengel, W Lively Proceedings of the 1992 ACM/SIGAPP symposium on Applied computing …, 1992 | 24 | 1992 |
Guidance for the development of software engineering education programs TB Hilburn, G Hislop, DJ Bagert, M Lutz, S Mengel, M McCracken Journal of Systems and Software 49 (2-3), 163-169, 1999 | 23 | 1999 |
Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities AM Dissanayaka, S Mengel, L Gittner, H Khan Cluster Computing 23 (3), 1955-1971, 2020 | 22 | 2020 |
Using Verilog LOGISCOPE to analyze student programs SA Mengel, J Ulans FIE'98. 28th Annual Frontiers in Education Conference. Moving from'Teacher …, 1998 | 18 | 1998 |
On the use of neural networks in intelligent tutoring systems S Mengel, W Lively Journal of Artificial Intelligence in Education 2 (2), 43-56, 1991 | 17 | 1991 |
A case study of the analysis of novice student programs SA Mengel, JV Ulans Proceedings 12th Conference on Software Engineering Education and Training …, 1999 | 12 | 1999 |