Secure modules for undergraduate software engineering courses

J Yang, A Lodgher, Y Lee - 2018 IEEE Frontiers in Education …, 2018 - ieeexplore.ieee.org
Security affects every software component in different types of computing systems. Many
vulnerabilities and attacks on software systems are due to security weaknesses in the software …

An Innovative Modular Approach of Teaching Cyber Security across Computing Curricula

A Lodgher, J Yang, U Bulut - 2018 IEEE Frontiers in Education …, 2018 - ieeexplore.ieee.org
This work in progress paper in the innovative practice category presents an innovative
approach where cybersecurity concepts and methods are taught as individual modules across …

Fundamental Defensive Programming Practicec with Secure Coding Modules

J Yang, A Lodgher - International Conference on Security and …, 2019 - par.nsf.gov
While many vulnerabilities are often related to computing and network systems, there has
been a growing number of vulnerabilities and attacks in software systems. They are generally …

Feasibility and applications of RFID technologies to support right-of-way functions: Technical report

A Lodgher, JA Perkins, Y Yang, EC Jones… - 2010 - rosap.ntl.bts.gov
Radio frequency identification device (RFID) technology provides the capability to store a
unique identification number and some basic attribute information, which can be retrieved …

Implementation of security modules with model-eliciting activities in computer science courses

J Yang, B Earwood, YR Kim, A Lodgher - 2020 ASEE Virtual Annual …, 2020 - par.nsf.gov
Security is a critical aspect in the design, development, and testing of software systems. Due
to the increasing need for security-related skills within software systems and engineering, …

Semantically constrained exploration and heuristic guidance

H Hamburger, A Lodgher - Intelligent Instruction Computer, 2013 - taylorfrancis.com
Exploration can be an effective learning experience, if suitably constrained and guided.
Moreover, it can provide this benefit for specifically targeted formal skills in the arithmetic …

Managing a laundry using RFID-based automated processes

A Lodgher - Communications of the IIMA, 2009 - scholarworks.lib.csusb.edu
The objective of this paper is to present the use of RFID (Radio Frequency IDentification)
technology to automate the laundry process of collecting, cleaning, and returning garments. …

Exploration in coinland

H Hamburger, A Lodgher - International Conference on Computer …, 1989 - Springer
Coinland is a meaning-oriented approach to facilitating the learning of arithmetic principles.
Algorithms based on those principles, such as those used to carry out operations like milti-…

Emerging consumer technology applications developed at PVAMU

A Lodgher, K Bellam - 2012 Computing, Communications and …, 2012 - ieeexplore.ieee.org
Faculty and graduate students in the Computer Science (CS) and Computer Information
Systems (CIS) at Prairie View A&M University (PVAMU) are working on several emerging …

[BOOK][B] Intelligent tutoring of elementary arithmetic skills and concepts

AH Lodgher - 1990 - search.proquest.com
The objective of this dissertation is to demonstrate and assess the integration of principles of
cognitive science, education, artificial intelligence, curriculum design, and interface design …