متابعة
Ashley Podhradsky, A. Podhradsky
Ashley Podhradsky, A. Podhradsky
Professor of Digital Forensics, VP Research Dakota State University
بريد إلكتروني تم التحقق منه على dsu.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Cybher: A method for empowering, motivating, educating and anchoring girls to a cybersecurity career path
P Rowland, A Podhradsky, S Plucker
162018
Xbox 360 hoaxes, social engineering, and gamertag exploits
A Podhradsky, R DOvidio, P Engebretson, C Casey
2013 46th Hawaii International Conference on System Sciences, 3239-3250, 2013
162013
Personal denial of service (PDOS) attacks: A discussion and exploration of a new category of cyber crime
MR Bartolacci, LJ LeBlanc, A Podhradsky
Journal of Digital Forensics, Security and Law 9 (1), 2, 2014
132014
The Bluetooth honeypot project: Measuring and managing bluetooth risks in the workplace
A Podhradsky, C Casey, P Ceretti
International Journal of Interdisciplinary Telecommunications and Networking …, 2012
92012
The Bluetooth honeypot project
AL Podhradsky, C Casey, P Ceretti
Wireless Telecommunications Symposium 2012, 1-10, 2012
62012
The XBOX 360 and Steganography: How Criminals and Terrorists Could Be" Going Dark"
A Podhradsky, R D’Ovidio, C Casey
52012
A practitioners guide to the forensic investigation of xbox 360 gaming consoles
AL Podhradsky, R D’Ovidio, C Casey
52011
Digforce: Digital Forensics for Cyber Enforcement at Dakota State University Working Towards Public-Private Cybercrime Investigations
A Podhradsky, F Opoku-Boateng, A Kulm, T Jones
SDL Rev. 65, 589, 2020
32020
Managing Bluetooth risks in the workplace
AL Podhradsky, C Casey, P Ceretti
Wireless Telecommunications Symposium 2012, 1-9, 2012
32012
Internet of Medical Things: Forensics Investigation on Zebra Phones
K Sager, C Fofie, A Podhradsky
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems …, 2022
22022
Salaries in Higher Education Systems: A System-wide Perspective on Career Advancement and Gender Equity
AL Liebl, P Rowland, A Kiesow, A Podhradsky, M Redlin, M Gaiani, ...
ADVANCE Journal, 2021
12021
Security Vulnerabilities in Children's Toys.
A Ahmed, A Podhradsky
AMCIS, 2016
12016
An analysis of security vulnerabilities of the Xbox 360 and Xbox Live mobile network
P Engebretson, A Podhradsky, C Casey
International Journal of Mobile Network Design and Innovation 5 (1), 9-16, 2013
12013
Testing Data Sanitization Practices of Retired Drives with The Digital Forensics Data Recovery Project
AL Podhradsky, K Streff
Journal of Information Privacy and Security 7 (3), 46-63, 2011
12011
Review of Mobile Applications Used for Covert Communication
A Ahmed, A Podhradsky
2017
Reverse Engineering a Nit That Unmasks Tor Users
M Miller, J Stroschein, A Podhradsky
2016
Security Analysis of Xbox 360 Vulnerabilities
P Engebretson, A Podhradsky, DL Grahek, AJ Bierschbach
International Institute of Informatics and Systematics. As of 4, 2014
2014
Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses.
AL Podhradsky, LJ LeBlanc, MR Bartolacci
J. Cyber Secur. Mobil. 3 (3), 339-356, 2014
2014
An Innovative Approach to Information Technology Risk Assessment for Small and Medium Sized Financial Institutions
AL Podhradsky
2010
Computers for Humanity: A Service Learning Approach to Computer Education
WE Pauli, A Podhradsky, C Pauli, M Moran
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20