Security of open source web applications J Walden, M Doyle, GA Welch, M Whelan 2009 3rd International Symposium on Empirical Software Engineering and …, 2009 | 84 | 2009 |
Savi: Static-analysis vulnerability indicator J Walden, M Doyle IEEE Security & Privacy 10 (3), 32-39, 2012 | 56 | 2012 |
An informatics perspective on computational thinking J Walden, M Doyle, R Garns, Z Hart Proceedings of the 18th ACM conference on innovation and technology in …, 2013 | 49 | 2013 |
Girls on the go: a CS summer camp to attract and inspire female high school students JE Burge, GC Gannod, M Doyle, KC Davis Proceeding of the 44th ACM technical symposium on Computer science education …, 2013 | 47 | 2013 |
Professionalizing the role of peer leaders in STEM B Bowling Journal of STEM Education 16 (2), 2015 | 41 | 2015 |
An empirical study of the evolution of PHP web application security M Doyle, J Walden 2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011 | 40 | 2011 |
Idea: java vs. php: security implications of language choice for web applications J Walden, M Doyle, R Lenhof, J Murray Engineering Secure Software and Systems: Second International Symposium …, 2010 | 31 | 2010 |
Retention of STEM majors using early undergraduate researchexperiences B Bowling, H Bullen, M Doyle, J Filaseta Proceeding of the 44th ACM technical symposium on Computer science education …, 2013 | 29 | 2013 |
Agile Software Development in Practice M Doyle, L Williams, M Cohn, KS Rubin Agile XP 2014, 32-45, 2014 | 25 | 2014 |
Increasing awareness of computer science in high school girls GC Gannod, JE Burge, V McIe, M Doyle, KC Davis 2014 IEEE Frontiers in Education Conference (FIE) Proceedings, 1-8, 2014 | 24 | 2014 |
Independence and domination separation on chessboard graphs RD Chatham, M Doyle, GH Fricke, J Reitmann, RD Skaggs, M Wolff J. Combin. Math. Combin. Comput 68, 3-17, 2009 | 21 | 2009 |
Computing competencies for undergraduate data science programs: An ACM task force final report A Danyluk, P Leidig, A McGettrick, L Cassel, M Doyle, C Servin, K Schmitt, ... Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021 | 15 | 2021 |
A barrier algorithm for large nonlinear optimization problems M Doyle stanford university, 2004 | 15 | 2004 |
Impact of plugins on the security of web applications J Walden, M Doyle, R Lenhof, J Murray, A Plunkett Proceedings of the 6th International Workshop on Security Measurements and …, 2010 | 9 | 2010 |
Algorithm performance for chessboard separation problems RD Chatham, M Doyle, JJ Miller, AM Rogers, RD Skaggs, JA Ward J. Combin. Math. Combin. Comput 70, 127-142, 2009 | 8 | 2009 |
Engaging constructions: family-based computing experiences for immigrant middle school students M Doyle, KG Kirby, G Newell ACM SIGCSE Bulletin 40 (1), 58-62, 2008 | 8 | 2008 |
Agile Processes in Software Engineering and Extreme Programming L Plonka, H Sharp, P Gregory, K Taylor, M Kaisti, T Mujunen, T Mäkilä, ... Lecture Notes in Business Information Processing 179, 2014 | 7 | 2014 |
Computer Science and Computer Information Technology majors together: Analyzing factors impacting students' success in introductory programming M Doyle, D Kasturiratna, BD Richardson, SW Soled 2009 39th IEEE Frontiers in Education Conference, 1-6, 2009 | 7 | 2009 |
Trace matrix analyzer (tma) W Li, JH Hayes, F Yang, K Imai, J Yannelli, C Carnes, M Doyle 2013 7th International Workshop on Traceability in Emerging Forms of …, 2013 | 6 | 2013 |
Centrosymmetric solutions to chessboard separation problems RD Chatham, M Doyle, RJ Jeffers, WA Kosters, RD Skaggs, J Ward Bulletin of the Institute of Combinatorics and its Applications 65, 6-26, 2012 | 5 | 2012 |