We Have Met the Enemy and He is Us M Bishop, S Engle, S Peisert, S Whalen, C Gates Proceedings of the 2008 Workshop on New Security Paradigms, 1-12, 2008 | 110 | 2008 |
A Risk Management Approach to the "Insider Threat" M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen Insider Threats in Cyber Security 49, 115-137, 2010 | 73 | 2010 |
Source Code Review of the Sequoia Voting System M Blaze, A Cordero, S Engle, C Karlof, N Sastry, M Sherr, T Stegers, ... Top-to-Bottom Review of California Voting Systems, 2007 | 54* | 2007 |
Case Studies of an Insider Framework M Bishop, S Engle, S Peisert, S Whalen, C Gates Proceedings of the 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 48 | 2009 |
A Taxonomy of Buffer Overflow Characteristics M Bishop, S Engle, D Howard, S Whalen Dependable and Secure Computing, IEEE Transactions on 9 (3), 305-317, 2012 | 40 | 2012 |
Unboxing Cluster Heatmaps S Engle, S Whalen, A Joshi, KS Pollard BMC Bioinformatics 18 (2), 63, 2017 | 39 | 2017 |
Modeling and Analyzing Faults to Improve Election Process Robustness BI Simidchieva, SJ Engle, M Clifford, AC Jones, B Allen, S Peisert, ... Proceedings of the 2010 International Conference on Electronic Voting …, 2010 | 37* | 2010 |
Using Animation to Alleviate Overdraw in Multiclass Scatterplot Matrices H Chen, S Engle, A Joshi, ED Ragan, BF Yuksel, L Harrison Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018 | 33 | 2018 |
Reducing Implicit Gender Bias Using a Virtual Workplace Environment K Beltran, C Rowland, N Hashemi, A Nguyen, L Harrison, S Engle, ... Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing …, 2021 | 22 | 2021 |
The Software Assurance CBK and University Curricula M Bishop, S Engle Proceedings of the 10th Colloquium for Information Systems Security …, 2006 | 22 | 2006 |
LBNL Open Power Data S Peisert, R Gentz, J Boverhof, C McParland, S Engle, A Elbashandy, ... https://doi.org/10.21990/C21599, 2017 | 18 | 2017 |
Visualizing Distributed Memory Computations with Hive Plots S Engle, S Whalen Proceedings of the Ninth International Symposium on Visualization for Cyber …, 2012 | 17 | 2012 |
Reflecting on Visualization for Cyber Security C Gates, S Engle 2013 IEEE International Conference on Intelligence and Security Informatics …, 2013 | 16 | 2013 |
Network-Theoretic Classification of Parallel Computation Patterns S Whalen, S Engle, S Peisert, M Bishop International Journal of High Performance Computing Applications 26 (2), 159-169, 2012 | 15 | 2012 |
Expert Code Review and Mastery Learning in a Software Development Course S Engle, S Rollins Journal of Computing Sciences in Colleges 28 (4), 139-147, 2013 | 9 | 2013 |
A Policy-Based Vulnerability Analysis Framework S Engle University of California, Davis, 2010 | 6 | 2010 |
Using a Virtual Workplace Environment to Reduce Implicit Gender Bias K Beltran, C Rowland, N Hashemi, A Nguyen, L Harrison, SJ Engle, ... International Journal of Human–Computer Interaction, 1-17, 2022 | 4 | 2022 |
Collaborative Visual Analytics Using Blockchain D Coelho, R Trailor, D Sill, S Engle, A Joshi, S Mankovskii, M Velez-Rojas, ... International Conference on Cooperative Design, Visualization and …, 2020 | 2 | 2020 |
Understanding Professional Identity Development Among Computer Science Students SN Rollins, A Joshi, X Apedoe, S Engle, M Malensek, G Bruno 2021 ASEE Virtual Annual Conference Content Access, 2021 | 1 | 2021 |
Engendering Community to Computer Science Freshmen through an Early Arrival Program A Joshi, G Bruno, X Apedoe, S Engle, S Rollins, M Malensek 2020 ASEE Virtual Annual Conference Content Access, 2020 | 1 | 2020 |