Challenges and software architecture for fog computing Z Hao, E Novak, S Yi, Q Li IEEE Internet Computing 21 (2), 44-53, 2017 | 240 | 2017 |
Securing SDN infrastructure of IoT–fog networks from MitM attacks C Li, Z Qin, E Novak, Q Li IEEE Internet of Things Journal 4 (5), 1156-1164, 2017 | 172 | 2017 |
Glassgesture: Exploring head gesture interface of smart glasses S Yi, Z Qin, E Novak, Y Yin, Q Li IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 105 | 2016 |
Mobiplay: A remote execution based record-and-replay tool for mobile applications Z Qin, Y Tang, E Novak, Q Li Proceedings of the 38th International Conference on Software Engineering …, 2016 | 93 | 2016 |
Near-pri: Private, proximity based location sharing E Novak, Q Li IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 37-45, 2014 | 58 | 2014 |
Toward sensor-based random number generation for mobile and IoT devices K Wallace, K Moran, E Novak, G Zhou, K Sun IEEE Internet of Things Journal 3 (6), 1189-1201, 2016 | 57 | 2016 |
A survey of security and privacy in online social networks E Novak, Q Li College of William and Mary computer science technical report, 1-32, 2012 | 42 | 2012 |
Physical media covert channels on smart mobile devices E Novak, Y Tang, Z Hao, Q Li, Y Zhang Proceedings of the 2015 ACM International Joint Conference on Pervasive and …, 2015 | 36 | 2015 |
AMIL: Localizing neighboring mobile devices through a simple gesture H Han, S Yi, Q Li, G Shen, Y Liu, E Novak IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 29 | 2016 |
Ultrasound proximity networking on smart mobile devices for IoT applications E Novak, Z Tang, Q Li IEEE Internet of Things Journal 6 (1), 399-409, 2018 | 28 | 2018 |
SMOC: A secure mobile cloud computing platform Z Hao, Y Tang, Y Zhang, E Novak, N Carter, Q Li 2015 IEEE Conference on Computer Communications (INFOCOM), 2668-2676, 2015 | 21 | 2015 |
CamK: Camera-based keystroke detection and localization for small mobile devices Y Yin, Q Li, L Xie, S Yi, E Novak, S Lu IEEE Transactions on Mobile Computing 17 (10), 2236-2251, 2018 | 16 | 2018 |
Graphical passwords for older computer users N Carter, C Li, Q Li, JA Stevens, E Novak, Z Qin, J Yu Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and …, 2017 | 16 | 2017 |
Android app update timing: A measurement study E Novak, C Marchini 2019 20th IEEE International Conference on Mobile Data Management (MDM), 551-556, 2019 | 9 | 2019 |
A survey of security and privacy research in online social networks E Novak, Q Li College of William and Mary, Tech. Rep. WM-CS-2012 2, 2012 | 8 | 2012 |
VPN+ towards detection and remediation of information leakage on smartphones E Novak, PT Aung, T Do 2020 21st IEEE International Conference on Mobile Data Management (MDM), 39-48, 2020 | 7 | 2020 |
Taes: Two-factor authentication with end-to-end security against voip phishing D Hou, H Han, E Novak 2020 IEEE/ACM Symposium on Edge Computing (SEC), 340-345, 2020 | 5 | 2020 |
Oral Exams in CS-Education: Pros and Cons in the Age of AI Assisted Programming E Novak, P Ohmann Journal of Computing Sciences in Colleges 39 (3), 32-33, 2023 | 2 | 2023 |
Redesigning the online video lecture player to promote active learning I Walk, A Yim, E Novak, C Reiss, D Graham 2020 IEEE Frontiers in Education Conference (FIE), 1-5, 2020 | 2 | 2020 |
A Smartphone Compatible SONAR Ranging Attachment for 2-D Mapping D Graham, G Zhou, E Novak, J Buffkin IEEE Internet of Things Journal 3 (5), 779-786, 2015 | 2 | 2015 |