Global health and the new bottom billion: what do shifts in global poverty and disease burden mean for donor agencies? A Glassman, D Duran, A Sumner Global Policy 4 (1), 1-14, 2013 | 358 | 2013 |
Android malware static analysis techniques S Schmeelk, J Yang, A Aho Proceedings of the 10th annual cyber and information security research …, 2015 | 46 | 2015 |
Global innovation science handbook P Gupta, BE Trusko (No Title), 2014 | 27 | 2014 |
The complexity of affect in an urban mathematics classroom A Alston, GA Goldin, J Jones, A McCulloch, C Rossman, S Schmeelk Proceedings of the 29th Annual Conference of PME-NA, 326-333, 2007 | 24 | 2007 |
What are they researching? Examining industry-based doctoral dissertation research through the lens of machine learning IC Freeman, AJ Haigler, SE Schmeelk, LR Ellrodt, TL Fields 2018 17th IEEE International Conference on Machine Learning and Applications …, 2018 | 21 | 2018 |
Children’s reasoning while building fraction ideas CA Maher, D Yankelewitz Springer, 2017 | 21 | 2017 |
Electronic health records and blockchain interoperability requirements: a scoping review S Schmeelk, M Kanabar, K Peterson, J Pathak JAMIA open 5 (3), ooac068, 2022 | 17 | 2022 |
MobSF: Mobile health care Android applications through the lens of open source static analysis G LaMalva, S Schmeelk 2020 IEEE MIT Undergraduate Research Technology Conference (URTC), 1-4, 2020 | 17 | 2020 |
Defending android applications availability S Schmeelk, A Aho 2017 IEEE 28th Annual Software Technology Conference (STC), 1-5, 2017 | 9 | 2017 |
Teaching effective cybersecurity through escape the classroom paradigm JE DeBello, S Schmeelk, DM Dragos, E Troja, LM Truong 2022 IEEE Global Engineering Education Conference (EDUCON), 17-23, 2022 | 8 | 2022 |
Creating a standardized risk assessment framework library for healthcare information technology S Schmeelk | 8 | 2020 |
Where is the risk? Analysis of government reported patient medical data breaches S Schmeelk IEEE/WIC/ACM International Conference on Web Intelligence-Companion Volume …, 2019 | 8 | 2019 |
Image authenticity implementing principal component analysis (PCA) S Schmeelk, J Schmeelk 2013 10th International Conference and Expo on Emerging Technologies for a …, 2013 | 7 | 2013 |
Mobile Software Assurance Informed through Knowledge Graph Construction: The OWASP Threat of Insecure Data Storage S Schmeelk, L Tao Journal of Computer Science Research 2 (2), 17-29, 2020 | 6 | 2020 |
Where are we looking? Understanding android static analysis techniques S Schmeelk 2019 IEEE World Congress on Services (SERVICES) 2642, 384-385, 2019 | 6 | 2019 |
Towards a unified fault-detection benchmark S Schmeelk Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 2010 | 6 | 2010 |
Top Reported Data Security Risks in the Age of COVID-19 S Schmeelk, K Thakur, ML Ali, DM Dragos, A Al-Hayajneh, BR Pramana 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021 | 5 | 2021 |
Doctor of Professional Studies in Computing: A Categorization of Applied Industry Research LR Ellrodt, IC Freeman, AJ Haigler, SE Schmeelk 2018 IEEE Frontiers in Education Conference (FIE), 1-6, 2018 | 5 | 2018 |
Blockchain smart contracts static analysis for software assurance S Schmeelk, B Rosado, PE Black Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2021 | 4 | 2021 |
Where are we looking for security concerns? Understanding Android Security Static Analysis S Schmeelk Proceedings of the Future Technologies Conference (FTC) 2019: Volume 2, 467-483, 2020 | 4 | 2020 |