Part of the Information Security Commons

Works in Information Security

2019

Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin
Bo Chen

2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai
Journal of Cybersecurity Education, Research and Practice

PDF

Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities, Ling Jiang, Kristijan Mirkovski, Jeffrey D. Wall, Christian Wagner, Paul Benjamin Lowry
Michigan Tech Publications

Towards privacy preserving social recommendation under personalized privacy settings, Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Li, et. al.
Michigan Tech Publications

MobiCeal: Towards secure and practical plausibily deniable encryption on mobile devices, Bing Chang, Fengwei Zhang, Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, et. al.
Michigan Tech Publications

Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey, Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen
Michigan Tech Publications

PDF

The organization man and the innovator: Theoretical archetypes to inform behavioral information security research, Jeffrey D. Wall, Rahul Singh
Michigan Tech Publications

2017

Supporting transparent snapshot for bare-metal malware analysis on mobile devices, Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, et. al.
Department of Computer Science Publications

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer, Shijie Jia, Luning Xia, Bo Chen, Peng Liu
Bo Chen

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer, Shijie Jia, Luning Xia, Bo Chen, Peng Liu
Department of Computer Science Publications

Cybersecurity should be taught top-down and case-driven, Yu Cai, Todd O. Arney
Michigan Tech Publications

Disruption Aware Routing and link Scheduling for cognitive radio networks, Peng Jiang, ChunSheng Xin, Min Song
Michigan Tech Publications

2016

Active snort rules and the needs for computing resources: Computing resources needed to activate different numbers of snort rules, Chad A. Arney, Xinli Wang
School of Technology Publications

PDF

Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks, Xiaohua Xu, Min Song
Michigan Tech Publications

NFPS: adding undetectable secure deletion to flash translation layer, Shijie Jia, Luning Xia, Bo Chen
Bo Chen

Maia and Mandos: Tools for Integrity Protection on Arbitrary Files, Paul J. Bonamy
Dissertations, Master's Theses and Master's Reports

PDF

2015

ACCESS CONTROL PROGRAMMING LIBRARY AND EXPLORATION SYSTEM, Zhitao Qiu
Dissertations, Master's Theses and Master's Reports - Open

PDF