Maureen Doyle
Maureen Doyle
Professor of Computer Science, Northern Kentucky University
Verified email at nku.edu - Homepage
Title
Cited by
Cited by
Year
Security of open source web applications
J Walden, M Doyle, GA Welch, M Whelan
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
772009
SAVI: Static-analysis vulnerability indicator
J Walden, M Doyle
IEEE Security & Privacy 10 (3), 32-39, 2012
452012
Girls on the go: a CS summer camp to attract and inspire female high school students
JE Burge, GC Gannod, M Doyle, KC Davis
Proceeding of the 44th ACM technical symposium on Computer science education …, 2013
362013
An empirical study of the evolution of PHP web application security
M Doyle, J Walden
2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011
322011
An informatics perspective on computational thinking
J Walden, M Doyle, R Garns, Z Hart
Proceedings of the 18th ACM conference on Innovation and technology in …, 2013
292013
Idea: java vs. php: security implications of language choice for web applications
J Walden, M Doyle, R Lenhof, J Murray
International Symposium on Engineering Secure Software and Systems, 61-69, 2010
292010
Professionalizing the role of peer leaders in STEM
B Bowling
Journal of STEM Education 16 (2), 2015
262015
Agile Software Development in Practice
M Doyle, L Williams, M Cohn, KS Rubin
Agile XP 2014, 32-45, 2014
202014
Retention of STEM majors using early undergraduate researchexperiences
B Bowling, H Bullen, M Doyle, J Filaseta
Proceeding of the 44th ACM technical symposium on Computer science education …, 2013
202013
Independence and domination separation on chessboard graphs
RD Chatham, M Doyle, GH Fricke, J Reitmann, RD Skaggs, M Wolff
J. Combin. Math. Combin. Comput 68, 3-17, 2009
172009
Increasing awareness of computer science in high school girls
GC Gannod, JE Burge, V McIe, M Doyle, KC Davis
2014 IEEE Frontiers in Education Conference (FIE) Proceedings, 1-8, 2014
132014
A barrier algorithm for large nonlinear optimization problems
M Doyle
stanford university, 2004
112004
Impact of plugins on the security of web applications
J Walden, M Doyle, R Lenhof, J Murray, A Plunkett
Proceedings of the 6th International Workshop on Security Measurements and …, 2010
82010
Engaging constructions: Family-based computing experiences for immigrant middle school students
M Doyle, KG Kirby, G Newell
ACM SIGCSE Bulletin 40 (1), 58-62, 2008
82008
Computer Science and Computer Information Technology majors together: Analyzing factors impacting students' success in introductory programming
M Doyle, D Kasturiratna, BD Richardson, SW Soled
2009 39th IEEE Frontiers in Education Conference, 1-6, 2009
72009
Algorithm performance for chessboard separation problems
RD Chatham, M Doyle, JJ Miller, AM Rogers, RD Skaggs, JA Ward
J. Combin. Math. Combin. Comput 70, 127-142, 2009
72009
Trace matrix analyzer (tma)
W Li, JH Hayes, F Yang, K Imai, J Yannelli, C Carnes, M Doyle
2013 7th International Workshop on Traceability in Emerging Forms of …, 2013
42013
SIGCSE symposium history
M Doyle
ACM SIGCSE Bulletin 47 (4), 7-8, 2015
32015
Agile software development study away
M Doyle, C Gibson, M Melish, R Storm
Proceedings of the 47th ACM Technical Symposium on Computing Science …, 2016
22016
JDLX: Visualization of dancing links
M Doyle, B Rawe, A Rogers
Journal of Computing Sciences in Colleges 24 (1), 2007
22007
The system can't perform the operation now. Try again later.
Articles 1–20