Bill Stackpole

According to our database1, Bill Stackpole authored at least 17 papers between 1998 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Visualization for Spectators in Cybersecurity Competitions.
Proceedings of the 17th IEEE Symposium on Visualization for Cyber Security, VizSec 2020, 2020

2016
Android Malware Detection Using Category-Based Machine Learning Classifiers.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Android malware analysis and conceptual malware mitigation approaches.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
A New Covert Channel over Cellular Voice Channel in Smartphones.
CoRR, 2015

Exploring a high-capacity covert channel on the Android operating system.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2014
Analysis of mobile malware based on user awareness.
Proceedings of the 3rd annual conference on Research in information technology, 2014

2012
Game-based forensics course for first year students.
Proceedings of the ACM Special Interest Group for Information Technology Education Conference, 2012

2011
Third Party Application Forensics on Apple Mobile Devices.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2008
Decentralized virtualization in systems administration education.
Proceedings of the 9th Conference on Information Technology Education, 2008

The evolution of a virtualized laboratory environment.
Proceedings of the 9th Conference on Information Technology Education, 2008

2007
An Introduction to IPSec.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Application-Layer Security Protocols for Networks.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Centralized Authentication Services (Radius, Tacacs, Diameter).
Proceedings of the Information security management handbook, Sixth Edition., 2007

Managing Unmanaged Systems.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2004
Forensic course development: one year later.
Proceedings of the 5th Conference on Information Technology Education, 2004

2003
Forensic course development.
Proceedings of the 4th conference on Information technology curriculum, 2003

1998
Thinking Right About Network Security.
Inf. Secur. J. A Glob. Perspect., 1998


  Loading...