Cybher: A method for empowering, motivating, educating and anchoring girls to a cybersecurity career path P Rowland, A Podhradsky, S Plucker | 16 | 2018 |
Xbox 360 hoaxes, social engineering, and gamertag exploits A Podhradsky, R DOvidio, P Engebretson, C Casey 2013 46th Hawaii International Conference on System Sciences, 3239-3250, 2013 | 16 | 2013 |
Personal denial of service (PDOS) attacks: A discussion and exploration of a new category of cyber crime MR Bartolacci, LJ LeBlanc, A Podhradsky Journal of Digital Forensics, Security and Law 9 (1), 2, 2014 | 13 | 2014 |
The Bluetooth honeypot project: Measuring and managing bluetooth risks in the workplace A Podhradsky, C Casey, P Ceretti International Journal of Interdisciplinary Telecommunications and Networking …, 2012 | 9 | 2012 |
The Bluetooth honeypot project AL Podhradsky, C Casey, P Ceretti Wireless Telecommunications Symposium 2012, 1-10, 2012 | 6 | 2012 |
The XBOX 360 and Steganography: How Criminals and Terrorists Could Be" Going Dark" A Podhradsky, R D’Ovidio, C Casey | 5 | 2012 |
A practitioners guide to the forensic investigation of xbox 360 gaming consoles AL Podhradsky, R D’Ovidio, C Casey | 5 | 2011 |
Digforce: Digital Forensics for Cyber Enforcement at Dakota State University Working Towards Public-Private Cybercrime Investigations A Podhradsky, F Opoku-Boateng, A Kulm, T Jones SDL Rev. 65, 589, 2020 | 3 | 2020 |
Managing Bluetooth risks in the workplace AL Podhradsky, C Casey, P Ceretti Wireless Telecommunications Symposium 2012, 1-9, 2012 | 3 | 2012 |
Internet of Medical Things: Forensics Investigation on Zebra Phones K Sager, C Fofie, A Podhradsky 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022 | 2 | 2022 |
Salaries in Higher Education Systems: A System-wide Perspective on Career Advancement and Gender Equity AL Liebl, P Rowland, A Kiesow, A Podhradsky, M Redlin, M Gaiani, ... ADVANCE Journal, 2021 | 1 | 2021 |
Security Vulnerabilities in Children's Toys. A Ahmed, A Podhradsky AMCIS, 2016 | 1 | 2016 |
An analysis of security vulnerabilities of the Xbox 360 and Xbox Live mobile network P Engebretson, A Podhradsky, C Casey International Journal of Mobile Network Design and Innovation 5 (1), 9-16, 2013 | 1 | 2013 |
Testing Data Sanitization Practices of Retired Drives with The Digital Forensics Data Recovery Project AL Podhradsky, K Streff Journal of Information Privacy and Security 7 (3), 46-63, 2011 | 1 | 2011 |
Review of Mobile Applications Used for Covert Communication A Ahmed, A Podhradsky | | 2017 |
Reverse Engineering a Nit That Unmasks Tor Users M Miller, J Stroschein, A Podhradsky | | 2016 |
Security Analysis of Xbox 360 Vulnerabilities P Engebretson, A Podhradsky, DL Grahek, AJ Bierschbach International Institute of Informatics and Systematics. As of 4, 2014 | | 2014 |
Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses. AL Podhradsky, LJ LeBlanc, MR Bartolacci J. Cyber Secur. Mobil. 3 (3), 339-356, 2014 | | 2014 |
An Innovative Approach to Information Technology Risk Assessment for Small and Medium Sized Financial Institutions AL Podhradsky | | 2010 |
Computers for Humanity: A Service Learning Approach to Computer Education WE Pauli, A Podhradsky, C Pauli, M Moran | | |