Online Articles (Forbes, Gizmodo, UBM, TomsITPro, etc.):
Securing Your Network and Application Infrastructure
24 Experts Share Their Secrets, Mighty Guide, 2015
Christopher Scaffidi, Kevin Bierhoff, Eric Chang, Mikhael Felker, Herman Ng and Chun Jin “Red Opal: Product-Feature Scoring from Reviews” In Proceedings of the 7th ACM Conference on Electronic Commerce (EC 2007) in San Diego, California, June 11to 15, 2007.
Journal / Magazine:
Mikhael Felker, “Analysis of FFIEC Guidance: Technologies and Decisions on Authentication,” Information Systems Control Journal, Vol. 6 Nov. /Dec. 2007.
Mikhael Felker, “Social Engineering Without Really Trying: Customer Service and Security,” ISSA Journal, Dec. 2006.
Mikhael Felker, “Password Management Concerns with IE and Firefox,” SecurityFocus Dec. 2006.
Y. Tung and M. Felker, “Conventional and Virtualized Ground System Architectures,” The Aerospace Corporation, Los Angeles, Tech. Operating Report. TOR-2009(8550)-8381 Nov. 2008.
Mikhael Felker, “A Survey of Security Markup Languages,” The Aerospace Corporation, Los Angeles, Tech. Operating Report. TOR-2008(8550)-7301 Sept. 2007.
Brian Tung and Mikhael Felker., “A Survey of ERM Products,” The Aerospace Corporation, Los Angeles, Tech. Operating Report TOR-2007(8550)-7013 Aug. 2007.
Mikhael Felker, “The Worm Calendar System (WCS),” CERT Network Situational Awareness, Pittsburgh, Pennsylvania, Tech Rep. NETSA-2006-15, Dec. 2006.
Integrating Security Across the Software Development Lifecycle; Security is a Top Priority: WhiteHat Security ReachLocal (2014)
M. Felker, “Internet War Games: Power of the Masses,” IEEE Security and Privacy, vol. 4, no. 2, p. 7, Mar. /Apr. 2006.
Mikhael Felker, “Book Review: Fraud Examination & Prevention,” Information Systems Control Journal, Vol. 4, 2007.
Lead Security Engineer Is An Inside Job, Dice.com