Follow
Maureen Doyle
Maureen Doyle
Professor of Computer Science, Northern Kentucky University
Verified email at nku.edu - Homepage
Title
Cited by
Cited by
Year
Security of open source web applications
J Walden, M Doyle, GA Welch, M Whelan
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
822009
Savi: Static-analysis vulnerability indicator
J Walden, M Doyle
IEEE Security & Privacy 10 (3), 32-39, 2012
492012
Girls on the go: a CS summer camp to attract and inspire female high school students
JE Burge, GC Gannod, M Doyle, KC Davis
Proceeding of the 44th ACM technical symposium on Computer science education …, 2013
442013
An informatics perspective on computational thinking
J Walden, M Doyle, R Garns, Z Hart
Proceedings of the 18th ACM conference on innovation and technology in …, 2013
402013
An empirical study of the evolution of php web application security
M Doyle, J Walden
2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011
352011
Professionalizing the role of peer leaders in STEM
B Bowling
Journal of STEM Education 16 (2), 2015
332015
Idea: java vs. php: security implications of language choice for web applications
J Walden, M Doyle, R Lenhof, J Murray
International Symposium on Engineering Secure Software and Systems, 61-69, 2010
322010
Retention of STEM majors using early undergraduate researchexperiences
B Bowling, H Bullen, M Doyle, J Filaseta
Proceeding of the 44th ACM technical symposium on Computer science education …, 2013
252013
Agile Software Development in Practice
M Doyle, L Williams, M Cohn, KS Rubin
Agile XP 2014, 32-45, 2014
222014
Independence and domination separation on chessboard graphs
RD Chatham, M Doyle, GH Fricke, J Reitmann, RD Skaggs, M Wolff
J. Combin. Math. Combin. Comput 68, 3-17, 2009
212009
Increasing awareness of computer science in high school girls
GC Gannod, JE Burge, V McIe, M Doyle, KC Davis
2014 IEEE Frontiers in Education Conference (FIE) Proceedings, 1-8, 2014
182014
A barrier algorithm for large nonlinear optimization problems
M Doyle
stanford university, 2004
162004
Computing competencies for undergraduate data science programs: an acm task force final report
A Danyluk, P Leidig, A McGettrick, L Cassel, M Doyle, C Servin, K Schmitt, ...
Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021
102021
Impact of plugins on the security of web applications
J Walden, M Doyle, R Lenhof, J Murray, A Plunkett
Proceedings of the 6th International Workshop on Security Measurements and …, 2010
92010
Engaging constructions: Family-based computing experiences for immigrant middle school students
M Doyle, KG Kirby, G Newell
ACM SIGCSE Bulletin 40 (1), 58-62, 2008
82008
Algorithm performance for chessboard separation problems
RD Chatham, M Doyle, JJ Miller, AM Rogers, RD Skaggs, JA Ward
J. Combin. Math. Combin. Comput 70, 127-142, 2009
72009
Trace matrix analyzer (tma)
W Li, JH Hayes, F Yang, K Imai, J Yannelli, C Carnes, M Doyle
2013 7th International Workshop on Traceability in Emerging Forms of …, 2013
62013
Computer Science and Computer Information Technology majors together: Analyzing factors impacting students' success in introductory programming
M Doyle, D Kasturiratna, BD Richardson, SW Soled
2009 39th IEEE Frontiers in Education Conference, 1-6, 2009
62009
Centrosymmetric solutions to chessboard separation problems
RD Chatham, M Doyle, RJ Jeffers, WA Kosters, RD Skaggs, J Ward
Bulletin of the Institute of Combinatorics and its Applications 65, 6-26, 2012
42012
Alternative paths to computing careers and their role in broadening participation
KJ Lehman, M Doyle, LA Lyon, K Thayer
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20