Refereed conferences require every submission to be reviewed by members of a program committee (PC) in charge of selecting the conference program. There are many software packages...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Visualization and interactivity are valuable active learning techniques that can improve mastery of difficult concepts. In this paper we describe jFAST, an easy-to-use graphical s...
Real-world case studies are important to complement the academic skills and knowledge acquired by computer science students. In this paper we relate our experiences with a course ...
Klaas Sikkel, Ton A. M. Spil, Rob L. W. van de Weg
“Objects-first” is an increasingly popular strategy for teaching object-oriented programming by introducing the concepts of objects, classes, and instances before procedural e...
Sally H. Moritz, Fang Wei, Shahida M. Parvez, Glen...