default search action
Edmund Novak
Person information
- affiliation: The College of William and Mary, Williamsburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j8]Ed Novak, Zhuofan Tang, Qun Li:
Ultrasound Proximity Networking on Smart Mobile Devices for IoT Applications. IEEE Internet Things J. 6(1): 399-409 (2019) - 2018
- [j7]Nancy J. Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin:
Graphical passwords for older computer users. Int. J. Secur. Networks 13(4): 211-227 (2018) - [j6]Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Ed Novak, Sanglu Lu:
CamK: Camera-Based Keystroke Detection and Localization for Small Mobile Devices. IEEE Trans. Mob. Comput. 17(10): 2236-2251 (2018) - 2017
- [j5]Zijiang Hao, Ed Novak, Shanhe Yi, Qun Li:
Challenges and Software Architecture for Fog Computing. IEEE Internet Comput. 21(2): 44-53 (2017) - [j4]Cheng Li, Zhengrui Qin, Ed Novak, Qun Li:
Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks. IEEE Internet Things J. 4(5): 1156-1164 (2017) - [j3]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen:
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. IEEE Trans. Mob. Comput. 16(7): 2065-2078 (2017) - 2016
- [j2]Daniel Graham, Gang Zhou, Ed Novak, Jeffrey Buffkin:
A Smartphone Compatible SONAR Ranging Attachment for 2-D Mapping. IEEE Internet Things J. 3(5): 779-786 (2016) - [j1]Kyle Wallace, Kevin Moran, Ed Novak, Gang Zhou, Kun Sun:
Toward Sensor-Based Random Number Generation for Mobile and IoT Devices. IEEE Internet Things J. 3(6): 1189-1201 (2016)
Conference and Workshop Papers
- 2023
- [c17]Peter Ohmann, Ed Novak, Scott J. Reckinger, Shanon M. Reckinger:
Have You Tried Oral Exams in Your CS Class? SIGCSE (2) 2023: 1250 - [c16]Ed Novak:
A Worked Example Model for Teaching Dynamic Programming. SIGCSE (2) 2023: 1286 - 2020
- [c15]Ian Walk, Arnold Yim, Ed Novak, Charles Reiss, Daniel Graham:
Redesigning the Online Video Lecture Player to Promote Active Learning. FIE 2020: 1-5 - [c14]Dai Hou, Hao Han, Ed Novak:
TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing. SEC 2020: 340-345 - [c13]Ed Novak, Phyo Thuta Aung, Thu Do:
VPN+ Towards Detection and Remediation of Information Leakage on Smartphones. MDM 2020: 39-48 - 2019
- [c12]Ed Novak, Chris Marchini:
Android App Update Timing: A Measurement Study. MDM 2019: 551-556 - 2017
- [c11]Nancy J. Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin, Jiquo Yu:
Graphical passwords for older computer users. HotWeb 2017: 7:1-7:7 - 2016
- [c10]Zhengrui Qin, Yutao Tang, Edmund Novak, Qun Li:
MobiPlay: a remote execution based record-and-replay tool for mobile applications. ICSE 2016: 571-582 - [c9]Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak:
AMIL: Localizing neighboring mobile devices through a simple gesture. INFOCOM 2016: 1-9 - [c8]Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM 2016: 1-9 - [c7]Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Edmund Novak, Sanglu Lu:
CamK: A camera-based keyboard for small mobile devices. INFOCOM 2016: 1-9 - [c6]Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM Workshops 2016: 1017-1018 - [c5]Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak:
AMIL: Localizing neighboring mobile devices through a simple gesture. INFOCOM Workshops 2016: 1027-1028 - 2015
- [c4]Edmund Novak, Yutao Tang, Zijiang Hao, Qun Li, Yifan Zhang:
Physical media covert channels on smart mobile devices. UbiComp 2015: 367-378 - [c3]Zijiang Hao, Yutao Tang, Yifan Zhang, Edmund Novak, Nancy J. Carter, Qun Li:
SMOC: A secure mobile cloud computing platform. INFOCOM 2015: 2668-2676 - 2014
- [c2]Edmund Novak, Qun Li:
Near-pri: Private, proximity based location sharing. INFOCOM 2014: 37-45 - 2013
- [c1]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen:
Extracting secret key from wireless link dynamics in vehicular environments. INFOCOM 2013: 2283-2291
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint