Now showing items 1-5 of 5

  • Emergent requirements for supporting introductory programming 

    Coull, Natalie J.; Duncan, Ishbel M. M. (Higher Education Academy Subject Centre for Information and Computer Sciences, 2011-02)
    The problems associated with learning and teaching first year University Computer Science (CS1) programming classes are summarized showing that various support tools and techniques have been developed and evaluated. From ...
  • The innocent hill walker 

    Ball, Leslie D.; Coull, Natalie J. (Oxford University Press, 2012)
    Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie Coull.
  • A method for resolving security vulnerabilities through the use of design patterns 

    Walker, Nick; Coull, Natalie J.; Ferguson, R. Ian; Milne, Allan C. (Springer, 2014-05-14)
    Most software development companies conduct in-house testing of their code prior to releasing their product, yet software vulnerabilities are still found every single day in the most prevalent of applications. Memory ...
  • Quantifying information dynamics through a new valuation system 

    Vaish, Abhishek; Prabhakar, Aditya; Mishra, Himanshu; Dayal, Nupur; Shishir, Kumar S.; Goel, Utkarsh; Coull, Natalie J. (Emerald, 2011)
    The aim of this research is to demonstrate the importance of placing a valuation on information assets and to propose a new valuation technique that complements existing valuation methods and provides improved results. It ...
  • Undermining - social engineering using open source intelligence gathering 

    Ball, Leslie D.; Ewan, Gavin; Coull, Natalie J. (SciTePress - Science and Technology Publications, 2012)
    Digital deposits are undergoing exponential growth. These may in turn be exploited to support cyber security initiatives through open source intelligence gathering. Open source intelligence itself is a doubleedged sword ...