Follow
Bill Stackpole
Bill Stackpole
Professor, Dept of Computing Security, Rochester Institute of Technology
Verified email at rit.edu
Title
Cited by
Cited by
Year
Third party application forensics on apple mobile devices
A Levinson, B Stackpole, D Johnson
2011 44th Hawaii International Conference on System Sciences, 1-9, 2011
602011
Does a virtual networking laboratory result in similar student achievement and satisfaction?
EA Lawson, W Stackpole
Proceedings of the 7th conference on Information technology education, 105-114, 2006
442006
Decentralized virtualization in systems administration education
B Stackpole, J Koppe, T Haskell, L Guay, Y Pan
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
402008
The evolution of a virtualized laboratory environment
B Stackpole
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
402008
Android malware detection using category-based machine learning classifiers
H Ali Alatwi, T Oh, E Fokoue, B Stackpole
Proceedings of the 17th Annual Conference on Information Technology …, 2016
362016
Best security practices for android, blackberry, and iOS
T Oh, B Stackpole, E Cummins, C Gonzalez, R Ramachandran, S Lim
2012 The First IEEE Workshop on Enabling Technologies for Smartphone and …, 2012
352012
Forensic acquisition and analysis of vmware virtual hard disks
M Hirwani, Y Pan, B Stackpole, D Johnson
The 2012 international conference on security and management, 2012
272012
Forensic course development
L Troell, Y Pan, B Stackpole
Proceedings of the 4th Conference on information Technology Curriculum, 265-269, 2003
272003
Security strategy: From requirements to reality
B Stackpole, E Oksendahl
CRC Press, 2010
252010
Android anti-virus analysis
R Ramachandran, T Oh, W Stackpole
Annual symposium on information assurance & secure knowledge management, 35-40, 2012
222012
Game-based forensics course for first year students
Y Pan, S Mishra, B Yuan, B Stackpole, D Schwartz
Proceedings of the 13th annual conference on Information technology …, 2012
212012
Developing small team-based cyber security exercises
B Mauer, W Stackpole, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
182012
Software deployment, updating, and patching
B Stackpole, P Hanrion
CRC Press, 2007
152007
Forensic course development: one year later
L Troell, Y Pan, B Stackpole
Proceedings of the 5th Conference on information Technology Education, 50-55, 2004
112004
A new covert channel over cellular voice channel in smartphones
B Aloraini, D Johnson, B Stackpole, S Mishra
arXiv preprint arXiv:1504.05647, 2015
102015
Crowdsourcing computer security attack trees
M Tentilucci, N Roberts, S Kandari, D Johnson, B Stackpole, ...
92015
Malware Analysis for Android Operating System
K Sharma, T Dand, T Oh, B Stackpole
8th Annual Symposium on Information Assurance (ASIA’13), 31-35, 2013
9*2013
Exploring a high-capacity covert channel on the Android operating system
T Heard, D Johnson, B Stackpole
2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015
62015
Computer forensics technologies for personally identifiable information detection and audits
Y Pan, B Stackpole, L Troell
ISACA Journal 2, 44, 2010
62010
Meshed tree protocol for faster convergence in switched networks
K Sharma, B Hartpence, B Stackpole, D Johnson, N Shenoy
ICNS 2014, 102, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20