Secure modules for undergraduate software engineering courses
Security affects every software component in different types of computing systems. Many
vulnerabilities and attacks on software systems are due to security weaknesses in the software …
vulnerabilities and attacks on software systems are due to security weaknesses in the software …
An Innovative Modular Approach of Teaching Cyber Security across Computing Curricula
This work in progress paper in the innovative practice category presents an innovative
approach where cybersecurity concepts and methods are taught as individual modules across …
approach where cybersecurity concepts and methods are taught as individual modules across …
Fundamental Defensive Programming Practicec with Secure Coding Modules
J Yang, A Lodgher - International Conference on Security and …, 2019 - par.nsf.gov
While many vulnerabilities are often related to computing and network systems, there has
been a growing number of vulnerabilities and attacks in software systems. They are generally …
been a growing number of vulnerabilities and attacks in software systems. They are generally …
Feasibility and applications of RFID technologies to support right-of-way functions: Technical report
A Lodgher, JA Perkins, Y Yang, EC Jones… - 2010 - rosap.ntl.bts.gov
Radio frequency identification device (RFID) technology provides the capability to store a
unique identification number and some basic attribute information, which can be retrieved …
unique identification number and some basic attribute information, which can be retrieved …
Implementation of security modules with model-eliciting activities in computer science courses
Security is a critical aspect in the design, development, and testing of software systems. Due
to the increasing need for security-related skills within software systems and engineering, …
to the increasing need for security-related skills within software systems and engineering, …
Semantically constrained exploration and heuristic guidance
H Hamburger, A Lodgher - Intelligent Instruction Computer, 2013 - taylorfrancis.com
Exploration can be an effective learning experience, if suitably constrained and guided.
Moreover, it can provide this benefit for specifically targeted formal skills in the arithmetic …
Moreover, it can provide this benefit for specifically targeted formal skills in the arithmetic …
Managing a laundry using RFID-based automated processes
A Lodgher - Communications of the IIMA, 2009 - scholarworks.lib.csusb.edu
The objective of this paper is to present the use of RFID (Radio Frequency IDentification)
technology to automate the laundry process of collecting, cleaning, and returning garments. …
technology to automate the laundry process of collecting, cleaning, and returning garments. …
Exploration in coinland
H Hamburger, A Lodgher - International Conference on Computer …, 1989 - Springer
Coinland is a meaning-oriented approach to facilitating the learning of arithmetic principles.
Algorithms based on those principles, such as those used to carry out operations like milti-…
Algorithms based on those principles, such as those used to carry out operations like milti-…
Emerging consumer technology applications developed at PVAMU
A Lodgher, K Bellam - 2012 Computing, Communications and …, 2012 - ieeexplore.ieee.org
Faculty and graduate students in the Computer Science (CS) and Computer Information
Systems (CIS) at Prairie View A&M University (PVAMU) are working on several emerging …
Systems (CIS) at Prairie View A&M University (PVAMU) are working on several emerging …
[BOOK][B] Intelligent tutoring of elementary arithmetic skills and concepts
AH Lodgher - 1990 - search.proquest.com
The objective of this dissertation is to demonstrate and assess the integration of principles of
cognitive science, education, artificial intelligence, curriculum design, and interface design …
cognitive science, education, artificial intelligence, curriculum design, and interface design …