Third party application forensics on apple mobile devices A Levinson, B Stackpole, D Johnson 2011 44th Hawaii International Conference on System Sciences, 1-9, 2011 | 59 | 2011 |
Does a virtual networking laboratory result in similar student achievement and satisfaction? EA Lawson, W Stackpole Proceedings of the 7th conference on Information technology education, 105-114, 2006 | 44 | 2006 |
The evolution of a virtualized laboratory environment B Stackpole Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008 | 40 | 2008 |
Decentralized virtualization in systems administration education B Stackpole, J Koppe, T Haskell, L Guay, Y Pan Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008 | 39 | 2008 |
Android malware detection using category-based machine learning classifiers H Ali Alatwi, T Oh, E Fokoue, B Stackpole Proceedings of the 17th Annual Conference on Information Technology …, 2016 | 36 | 2016 |
Best security practices for android, blackberry, and iOS T Oh, B Stackpole, E Cummins, C Gonzalez, R Ramachandran, S Lim 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and …, 2012 | 34 | 2012 |
Forensic acquisition and analysis of vmware virtual hard disks M Hirwani, Y Pan, B Stackpole, D Johnson The 2012 international conference on security and management, 2012 | 28 | 2012 |
Forensic course development L Troell, Y Pan, B Stackpole Proceedings of the 4th Conference on information Technology Curriculum, 265-269, 2003 | 27 | 2003 |
Security strategy: From requirements to reality B Stackpole, E Oksendahl CRC Press, 2010 | 25 | 2010 |
Android anti-virus analysis R Ramachandran, T Oh, W Stackpole Annual symposium on information assurance & secure knowledge management, 35-40, 2012 | 21 | 2012 |
Developing small team-based cyber security exercises B Mauer, W Stackpole, D Johnson Proceedings of the International Conference on Security and Management (SAM), 1, 2012 | 20 | 2012 |
Game-based forensics course for first year students Y Pan, S Mishra, B Yuan, B Stackpole, D Schwartz Proceedings of the 13th annual conference on Information technology …, 2012 | 17 | 2012 |
Software deployment, updating, and patching B Stackpole, P Hanrion CRC Press, 2007 | 15 | 2007 |
Forensic course development: one year later L Troell, Y Pan, B Stackpole Proceedings of the 5th Conference on information Technology Education, 50-55, 2004 | 11 | 2004 |
A new covert channel over cellular voice channel in smartphones B Aloraini, D Johnson, B Stackpole, S Mishra arXiv preprint arXiv:1504.05647, 2015 | 10 | 2015 |
Crowdsourcing computer security attack trees M Tentilucci, N Roberts, S Kandari, D Johnson, D Bogaard, B Stackpole, ... 10th Annual Symposium on Information Assurance, 2015 | 9 | 2015 |
Malware Analysis for Android Operating System K Sharma, T Dand, T Oh, B Stackpole 8th Annual Symposium on Information Assurance (ASIA’13), 31-35, 2013 | 9* | 2013 |
Exploring a high-capacity covert channel on the Android operating system T Heard, D Johnson, B Stackpole 2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015 | 6 | 2015 |
Computer forensics technologies for personally identifiable information detection and audits Y Pan, B Stackpole, L Troell ISACA Journal 2, 44, 2010 | 6 | 2010 |
Meshed tree protocol for faster convergence in switched networks K Sharma, B Hartpence, B Stackpole, D Johnson, N Shenoy ICNS 2014, 102, 2014 | 5 | 2014 |