Location based power analysis to detect malicious code in smartphones B Dixon, Y Jiang, A Jaiantilal, S Mishra Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 56 | 2011 |
On rootkit and malware detection in smartphones B Dixon, S Mishra 2010 international conference on dependable systems and networks workshops …, 2010 | 30 | 2010 |
Power based malicious code detection techniques for smartphones B Dixon, S Mishra 2013 12th IEEE international conference on trust, security and privacy in …, 2013 | 23 | 2013 |
Time and location power based malicious code detection techniques for smartphones B Dixon, S Mishra, J Pepin 2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014 | 11 | 2014 |
Investigating clustering algorithm DBSCAN to self select locations for power based malicious code detection on smartphones B Dixon 2017 Third International Conference on Mobile and Secure Services …, 2017 | 5 | 2017 |
Exploring low profile techniques for malicious code detection on smartphones B Dixon University of Colorado at Boulder, 2013 | 2 | 2013 |
Automating configuring parallel compute environments for students B Dixon Journal of Computing Sciences in Colleges 37 (4), 25-29, 2021 | 1 | 2021 |
Simplifying teaching continuous integration and continuous deployment with hands-on application in a web development course B Dixon Journal of Computing Sciences in Colleges 35 (10), 15-20, 2020 | 1 | 2020 |
Position Paper on Teaching Operating Systems Using the Rust Programming Language B Dixon Journal of Computing Sciences in Colleges 39 (1), 11-17, 2023 | | 2023 |
Tutorial on automating configuring parallel compute environments B Dixon Journal of Computing Sciences in Colleges 38 (5), 127-128, 2022 | | 2022 |
Code isolation for accurate performance scoring using Raspberry PIs B Dixon Journal of Computing Sciences in Colleges 31 (4), 94-99, 2016 | | 2016 |