Follow
Bryan Dixon
Title
Cited by
Cited by
Year
Location based power analysis to detect malicious code in smartphones
B Dixon, Y Jiang, A Jaiantilal, S Mishra
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
562011
On rootkit and malware detection in smartphones
B Dixon, S Mishra
2010 international conference on dependable systems and networks workshops …, 2010
292010
Power based malicious code detection techniques for smartphones
B Dixon, S Mishra
2013 12th IEEE international conference on trust, security and privacy in …, 2013
222013
Time and location power based malicious code detection techniques for smartphones
B Dixon, S Mishra, J Pepin
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
112014
Investigating clustering algorithm DBSCAN to self select locations for power based malicious code detection on smartphones
B Dixon
2017 Third International Conference on Mobile and Secure Services …, 2017
32017
Exploring low profile techniques for malicious code detection on smartphones
B Dixon
University of Colorado at Boulder, 2013
22013
Automating configuring parallel compute environments for students
B Dixon
Journal of Computing Sciences in Colleges 37 (4), 25-29, 2021
12021
Simplifying teaching continuous integration and continuous deployment with hands-on application in a web development course
B Dixon
Journal of Computing Sciences in Colleges 35 (10), 15-20, 2020
12020
Position Paper on Teaching Operating Systems Using the Rust Programming Language
B Dixon
Journal of Computing Sciences in Colleges 39 (1), 11-17, 2023
2023
Tutorial on automating configuring parallel compute environments
B Dixon
Journal of Computing Sciences in Colleges 38 (5), 127-128, 2022
2022
Code isolation for accurate performance scoring using Raspberry PIs
B Dixon
Journal of Computing Sciences in Colleges 31 (4), 94-99, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–11