S 4 LVE: shareable videogame analysis and visualization | 0 | 0.34 | 2019 |
Adapting The "Unessay" For Use In Computer Science | 0 | 0.34 | 2019 |
Exercises for teaching reverse engineering. | 0 | 0.34 | 2018 |
Entombed: An archaeological examination of an Atari 2600 game. | 0 | 0.34 | 2018 |
Stick to the script: lightweight recording and playback of live coding. | 1 | 0.37 | 2018 |
Code Protection: When Abstinence is not an Option. | 2 | 0.49 | 2016 |
An Industrial Partnership Game Development Capstone Course. | 0 | 0.34 | 2016 |
A Game Engine in Pure Python for CS1: Design, Experience, and Limits | 0 | 0.34 | 2015 |
Stringlish: improved English string searching in binary files | 0 | 0.34 | 2015 |
Applied Computer History: Experience Teaching Systems Topics through Retrogames | 2 | 0.45 | 2015 |
Assured Supraliminal Steganography in Computer Games | 1 | 0.35 | 2013 |
μPython: non-majors programming from the very first lecture | 1 | 0.48 | 2012 |
Lightweight Client-Side Methods for Detecting Email Forgery. | 4 | 0.40 | 2012 |
Babel: a secure computer is a polyglot | 0 | 0.34 | 2012 |
ThinAV: truly lightweight mobile cloud-based anti-malware | 21 | 0.94 | 2012 |
What's in a name. . . generator? | 0 | 0.34 | 2012 |
The Gold Standard: Automatically Generating Puzzle Game Levels. | 4 | 0.47 | 2012 |
Human subjects, agents, or bots: current issues in ethics and computer security research | 3 | 0.48 | 2011 |
User-preference-based automated level generation for platform games. | 7 | 0.49 | 2011 |
Does domain highlighting help people identify phishing sites? | 30 | 1.15 | 2011 |
SPoIM: A close look at pollution attacks in P2P live streaming | 6 | 0.45 | 2010 |
Enbug: when debuggers go bad | 1 | 0.38 | 2010 |
Ethical proactive threat research | 0 | 0.34 | 2010 |
Early action in an Earley parser | 1 | 0.36 | 2009 |
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles | 1 | 0.36 | 2009 |
A Multi-Agent Approach to Testing Anti-Spam Software | 0 | 0.34 | 2009 |
Code Obfuscation Using Pseudo-random Number Generators | 1 | 0.37 | 2009 |
Kwyjibo: automatic domain name generation | 7 | 0.92 | 2008 |
Global-scale Anti-spam Testing in Your Own Back Yard | 0 | 0.34 | 2008 |
Image spam - ASCII to the rescue! | 1 | 0.35 | 2008 |
Spamulator: the Internet on a laptop | 1 | 0.38 | 2008 |
The tale of the weather worm | 3 | 0.53 | 2008 |
Army of Botnets | 32 | 3.39 | 2007 |
Anti-disassembly using Cryptographic Hash Functions | 9 | 0.71 | 2006 |
Timing is everything | 2 | 0.39 | 2005 |
Improved Port Knocking with Strong Authentication | 17 | 1.55 | 2005 |
Choice in the classroom | 2 | 0.46 | 2005 |
NEST: NEtwork Server Tool | 1 | 0.36 | 2004 |
A brief history of just-in-time | 93 | 4.15 | 2003 |
Practical Earley Parsing | 16 | 1.20 | 2002 |
Even faster generalized LR parsing | 20 | 1.53 | 2001 |
Directly-Executable Earley Parsing | 7 | 0.83 | 2001 |
Schrödinger's token. | 12 | 1.31 | 2001 |
Simple Generation of Static Single-Assignment Form | 18 | 0.83 | 2000 |
Analysis of Equation Structure using Least Cost Parsing | 0 | 0.34 | 2000 |
Faster Generalized LR Parsing | 24 | 1.75 | 1999 |