Volgen
Bill Stackpole
Bill Stackpole
Professor, Dept of Computing Security, Rochester Institute of Technology
Geverifieerd e-mailadres voor rit.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Third party application forensics on apple mobile devices
A Levinson, B Stackpole, D Johnson
2011 44th Hawaii International Conference on System Sciences, 1-9, 2011
592011
Does a virtual networking laboratory result in similar student achievement and satisfaction?
EA Lawson, W Stackpole
Proceedings of the 7th conference on Information technology education, 105-114, 2006
442006
The evolution of a virtualized laboratory environment
B Stackpole
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
402008
Decentralized virtualization in systems administration education
B Stackpole, J Koppe, T Haskell, L Guay, Y Pan
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
392008
Android malware detection using category-based machine learning classifiers
H Ali Alatwi, T Oh, E Fokoue, B Stackpole
Proceedings of the 17th Annual Conference on Information Technology …, 2016
362016
Best security practices for android, blackberry, and iOS
T Oh, B Stackpole, E Cummins, C Gonzalez, R Ramachandran, S Lim
2012 The First IEEE Workshop on Enabling Technologies for Smartphone and …, 2012
342012
Forensic acquisition and analysis of vmware virtual hard disks
M Hirwani, Y Pan, B Stackpole, D Johnson
The 2012 international conference on security and management, 2012
282012
Forensic course development
L Troell, Y Pan, B Stackpole
Proceedings of the 4th Conference on information Technology Curriculum, 265-269, 2003
272003
Security strategy: From requirements to reality
B Stackpole, E Oksendahl
CRC Press, 2010
252010
Android anti-virus analysis
R Ramachandran, T Oh, W Stackpole
Annual symposium on information assurance & secure knowledge management, 35-40, 2012
212012
Developing small team-based cyber security exercises
B Mauer, W Stackpole, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
202012
Game-based forensics course for first year students
Y Pan, S Mishra, B Yuan, B Stackpole, D Schwartz
Proceedings of the 13th annual conference on Information technology …, 2012
162012
Software deployment, updating, and patching
B Stackpole, P Hanrion
CRC Press, 2007
152007
Forensic course development: one year later
L Troell, Y Pan, B Stackpole
Proceedings of the 5th Conference on information Technology Education, 50-55, 2004
112004
A new covert channel over cellular voice channel in smartphones
B Aloraini, D Johnson, B Stackpole, S Mishra
arXiv preprint arXiv:1504.05647, 2015
102015
Crowdsourcing computer security attack trees
M Tentilucci, N Roberts, S Kandari, D Johnson, D Bogaard, B Stackpole, ...
10th Annual Symposium on Information Assurance, 2015
92015
Malware Analysis for Android Operating System
K Sharma, T Dand, T Oh, B Stackpole
8th Annual Symposium on Information Assurance (ASIA’13), 31-35, 2013
9*2013
Exploring a high-capacity covert channel on the Android operating system
T Heard, D Johnson, B Stackpole
2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015
62015
Computer forensics technologies for personally identifiable information detection and audits
Y Pan, B Stackpole, L Troell
ISACA Journal 2, 44, 2010
62010
Meshed tree protocol for faster convergence in switched networks
K Sharma, B Hartpence, B Stackpole, D Johnson, N Shenoy
ICNS 2014, 102, 2014
52014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20