Part of the Information Security Commons
Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin Bo Chen
Using Case Studies To Teach Cybersecurity Courses, Yu Cai Journal of Cybersecurity Education, Research and Practice
PDF
Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities, Ling Jiang, Kristijan Mirkovski, Jeffrey D. Wall, Christian Wagner, Paul Benjamin Lowry Michigan Tech Publications
Link
Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, et. al. Michigan Tech Publications
MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, et. al. Michigan Tech Publications
Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey, Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen Michigan Tech Publications
The organization man and the innovator: Theoretical archetypes to inform behavioral information security research, Jeffrey D. Wall, Rahul Singh Michigan Tech Publications
Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, et. al. Department of Computer Science Publications
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer, Shijie Jia, Luning Xia, Bo Chen, Peng Liu Bo Chen
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer, Shijie Jia, Luning Xia, Bo Chen, Peng Liu Department of Computer Science Publications
Cybersecurity should be taught top-down and case-driven, Yu Cai, Todd O. Arney Michigan Tech Publications
Disruption Aware Routing and link Scheduling for cognitive radio networks, Peng Jiang, ChunSheng Xin, Min Song Michigan Tech Publications
Active snort rules and the needs for computing resources: Computing resources needed to activate different numbers of snort rules, Chad A. Arney, Xinli Wang School of Technology Publications
Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks, Xiaohua Xu, Min Song Michigan Tech Publications
NFPS: adding undetectable secure deletion to flash translation layer, Shijie Jia, Luning Xia, Bo Chen Bo Chen
Maia and Mandos: Tools for Integrity Protection on Arbitrary Files, Paul J. Bonamy Dissertations, Master's Theses and Master's Reports
ACCESS CONTROL PROGRAMMING LIBRARY AND EXPLORATION SYSTEM, Zhitao Qiu Dissertations, Master's Theses and Master's Reports - Open
Advanced Search