Bill Stackpole
Bill Stackpole
Professor, Dept of Computing Security, Rochester Institute of Technology
Verified email at
Cited by
Cited by
Third party application forensics on apple mobile devices
A Levinson, B Stackpole, D Johnson
2011 44th Hawaii International Conference on System Sciences, 1-9, 2011
Does a virtual networking laboratory result in similar student achievement and satisfaction?
EA Lawson, W Stackpole
Proceedings of the 7th conference on Information technology education, 105-114, 2006
Decentralized virtualization in systems administration education
B Stackpole, J Koppe, T Haskell, L Guay, Y Pan
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
The evolution of a virtualized laboratory environment
B Stackpole
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
Android malware detection using category-based machine learning classifiers
H Ali Alatwi, T Oh, E Fokoue, B Stackpole
Proceedings of the 17th Annual Conference on Information Technology …, 2016
Best security practices for android, blackberry, and iOS
T Oh, B Stackpole, E Cummins, C Gonzalez, R Ramachandran, S Lim
2012 The First IEEE Workshop on Enabling Technologies for Smartphone and …, 2012
Forensic acquisition and analysis of vmware virtual hard disks
M Hirwani, Y Pan, B Stackpole, D Johnson
The 2012 international conference on security and management, 2012
Forensic course development
L Troell, Y Pan, B Stackpole
Proceedings of the 4th Conference on information Technology Curriculum, 265-269, 2003
Security strategy: From requirements to reality
B Stackpole, E Oksendahl
CRC Press, 2010
Android anti-virus analysis
R Ramachandran, T Oh, W Stackpole
Annual symposium on information assurance & secure knowledge management, 35-40, 2012
Game-based forensics course for first year students
Y Pan, S Mishra, B Yuan, B Stackpole, D Schwartz
Proceedings of the 13th annual conference on Information technology …, 2012
Developing small team-based cyber security exercises
B Mauer, W Stackpole, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
Software deployment, updating, and patching
B Stackpole, P Hanrion
CRC Press, 2007
Forensic course development: one year later
L Troell, Y Pan, B Stackpole
Proceedings of the 5th Conference on information Technology Education, 50-55, 2004
A new covert channel over cellular voice channel in smartphones
B Aloraini, D Johnson, B Stackpole, S Mishra
arXiv preprint arXiv:1504.05647, 2015
Crowdsourcing computer security attack trees
M Tentilucci, N Roberts, S Kandari, D Johnson, B Stackpole, ...
Malware Analysis for Android Operating System
K Sharma, T Dand, T Oh, B Stackpole
8th Annual Symposium on Information Assurance (ASIA’13), 31-35, 2013
Exploring a high-capacity covert channel on the Android operating system
T Heard, D Johnson, B Stackpole
2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015
Computer forensics technologies for personally identifiable information detection and audits
Y Pan, B Stackpole, L Troell
ISACA Journal 2, 44, 2010
Meshed tree protocol for faster convergence in switched networks
K Sharma, B Hartpence, B Stackpole, D Johnson, N Shenoy
ICNS 2014, 102, 2014
The system can't perform the operation now. Try again later.
Articles 1–20