Joel Coffman
United States Air Force Academy
H-index: 9
North America-United States
Top articles of Joel Coffman
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Cloud Security Frameworks: A Comparison to Evaluate Cloud Control Standards | Taarika Hegde Josh Gangl Stanislav Babenko Joel Coffman | 2023/12/4 | |
Exploring Solutions for Container Image Security | Frank Campo Howe Wang Joel Coffman | 2023/10/12 | |
A Comparative Analysis of Linux Mandatory Access Control Policy Enforcement Mechanisms | Brennon Brimhall Justin Garrard Christopher De La Garza Joel Coffman | 2023/5/8 | |
Visual vs. Textual Programming Languages in CS0. 5: Comparing Student Learning with and Student Perception of RAPTOR and Python | Joel Coffman Adrian A de Freitas Justin M Hill Troy Weingart | 2023/3/2 | |
Is Securing an Untrusted Cloud with Cryptography Still Economically Unviable? | Kevin Klassen Jake Skinner Joel Coffman | 2023/12/4 | |
Falconcode: A multiyear dataset of python code samples from an introductory computer science course | Adrian de Freitas Joel Coffman Michelle de Freitas Justin Wilson Troy Weingart | 2023/3/2 | |
Educational Data in the Cloud Legal Implications and Technical Recommendations | Ben Cohen Ashley Hu Deisy Patino Joel Coffman | 2022/12/6 | |
Good Students are Good Students Student Achievement with Visual versus Textual Programming | Joel Coffman Justin M Hill Shannon Beck Adrian A De Freitas Troy Weingart | 2022/10/8 | |
Introducing Software Development Process, Software Engineering, and Artificial Intelligence in a CS0. 5 Course Project | Steven M Hadfield Alexander C Roosma Adrian A de Freitas Kimberly A Braun Steven P Fulton | 2022/7/7 | |
Using amazon managed blockchain for ePHI an analysis of hyperledger fabric and ethereum | Audrey Long Daniel Choi Joel Coffman | 2022/6/6 | |
Using a CTF Activity to Teach Cloud and Web Security | Joel Coffman Zachary Romano Jennifer Windsor Mathew Vanderpol | 2022 | |
Game-theoretic modeling of DDoS attacks in cloud computing | Kaho Wan Joel Coffman | 2021/12/6 | |
Election security in the cloud: A ctf activity to teach cloud and web security | Zachary Romano Jennifer Windsor Mathew VanDerPol Joel Coffman | 2021/10/13 | |
The use of Neural Networks to Classify Malware Families | European Conference on Cyber Warfare and Security | Theodore Drewes Joel Coffman | 2021/6/1 |
A kubernetes ci/cd pipeline with asylo as a trusted execution environment abstraction framework | Jamal Mahboob Joel Coffman | 2021/1/27 | |
Data Science Techniques to Detect Fraudulent Resource Consumption in the Cloud | Lauren Courtney Xiang Li Rongzuo Xu Joel Coffman | 2021/1/27 | |
Evaluating techniques for practical cloud-based network intrusion detection | Peter Cocoros Matthew Sobocinski Kyle Steiger Joel Coffman | 2020/11/6 | |
The Cost of a Macaroon | Muhammad Ayub Patrick Knowles Brandon Phan Joel Coffman | 2020/7/1 | |
Cyber Probability of Kill: The Effectiveness of Malware in a Heterogeneous Software Environment | International Conference on Cyber Warfare and Security | Brandon Webster Matthew Stenger Alix Valcin Joel Coffman Carlos Salazar | 2020/3/1 |
Docker container security in cloud computing | Kelly Brady Seung Moon Tuan Nguyen Joel Coffman | 2020/1/6 |