| Third party application forensics on apple mobile devices A Levinson, B Stackpole, D Johnson 2011 44th Hawaii International Conference on System Sciences, 1-9, 2011 | 62 | 2011 |
| Does a virtual networking laboratory result in similar student achievement and satisfaction? EA Lawson, W Stackpole Proceedings of the 7th conference on Information technology education, 105-114, 2006 | 45 | 2006 |
| Decentralized virtualization in systems administration education B Stackpole, J Koppe, T Haskell, L Guay, Y Pan Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008 | 42 | 2008 |
| The evolution of a virtualized laboratory environment B Stackpole Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008 | 41 | 2008 |
| Best security practices for android, blackberry, and iOS T Oh, B Stackpole, E Cummins, C Gonzalez, R Ramachandran, S Lim 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and …, 2012 | 40 | 2012 |
| Android malware detection using category-based machine learning classifiers H Ali Alatwi, T Oh, E Fokoue, B Stackpole Proceedings of the 17th Annual Conference on Information Technology …, 2016 | 36 | 2016 |
| Security strategy: From requirements to reality B Stackpole, E Oksendahl CRC Press, 2010 | 28 | 2010 |
| Forensic acquisition and analysis of vmware virtual hard disks M Hirwani, Y Pan, B Stackpole, D Johnson | 27 | 2012 |
| Forensic course development L Troell, Y Pan, B Stackpole Proceedings of the 4th Conference on information Technology Curriculum, 265-269, 2003 | 26 | 2003 |
| Game-based forensics course for first year students Y Pan, S Mishra, B Yuan, B Stackpole, D Schwartz Proceedings of the 13th annual conference on Information technology …, 2012 | 22 | 2012 |
| Android anti-virus analysis R Ramachandran, T Oh, W Stackpole Annual symposium on information assurance & secure knowledge management, 35-40, 2012 | 22 | 2012 |
| Developing small team-based cyber security exercises B Mauer, B Stackpole, D Johnson | 18 | 2012 |
| Software deployment, updating, and patching B Stackpole, P Hanrion CRC Press, 2007 | 15 | 2007 |
| A new covert channel over cellular voice channel in smartphones B Aloraini, D Johnson, B Stackpole, S Mishra arXiv preprint arXiv:1504.05647, 2015 | 11 | 2015 |
| Crowdsourcing computer security attack trees M Tentilucci, N Roberts, S Kandari, D Johnson, B Stackpole, ... | 11 | 2015 |
| Forensic course development: one year later L Troell, Y Pan, B Stackpole Proceedings of the 5th Conference on information Technology Education, 50-55, 2004 | 11 | 2004 |
| Malware Analysis for Android Operating System K Sharma, T Dand, T Oh, B Stackpole 8th Annual Symposium on Information Assurance (ASIA’13), 31-35, 2013 | 9* | 2013 |
| Computer forensics technologies for personally identifiable information detection and audits Y Pan, B Stackpole, L Troell ISACA 2, 2010 | 7 | 2010 |
| Covert channel using icmpv6 and ipv6 addressing G Ackerman, D Johnson, B Stackpole Proceedings of the International Conference on Security and Management (SAM), 63, 2015 | 6 | 2015 |
| Exploring a high-capacity covert channel on the Android operating system T Heard, D Johnson, B Stackpole 2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015 | 5 | 2015 |