팔로우
William Casey
William Casey
Professor of Cyber Science, United States Naval Academy
usna.edu의 이메일 확인됨
제목
인용
인용
연도
Weakly supervised extraction of computer security events from twitter
A Ritter, E Wright, W Casey, T Mitchell
Proceedings of the 24th international conference on world wide web, 896-905, 2015
1682015
Process, software arrangement and computer-accessible medium for obtaining information associated with a haplotype
W Casey, T Anantharaman
US Patent 7,805,282, 2010
962010
System, method and software arrangement for bi-allele haplotype phasing
W Casey, T Anantharaman
US Patent App. 11/093,565, 2005
882005
Compliance signaling games: toward modeling the deterrence of insider threats
W Casey, JA Morales, E Wright, Q Zhu, B Mishra
Computational and Mathematical Organization Theory 22, 318-349, 2016
352016
Cyber security via signaling games: Toward a science of cyber security
W Casey, JA Morales, T Nguyen, J Spring, R Weaver, E Wright, L Metcalf, ...
Distributed Computing and Internet Technology: 10th International Conference …, 2014
322014
Compliance control: Managed vulnerability surface in social-technological systems via signaling games
WA Casey, Q Zhu, JA Morales, B Mishra
Proceedings of the 7th ACM CCS international workshop on managing insider …, 2015
282015
Chapter 5–Graph theory
L Metcalf, W Casey, L Metcalf, W Casey
Cybersecurity and applied mathematics, 67-94, 2016
262016
Introduction to data analysis
L Metcalf, W Casey
Cybersecurity and applied mathematics, 43-65, 2016
252016
Chapter 2-Metrics, similarity, and sets
L Metcalf, W Casey
Cybersecurity and applied mathematics, 3-22, 2016
202016
2 fuzzy hashing techniques in applied malware analysis
D French, W Casey
Results of SEI Line-Funded Exploratory New Starts Projects, 2, 2012
202012
Deception, identity, and security: the game theory of sybil attacks
W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra
Communications of the ACM 62 (1), 85-93, 2018
192018
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
G Lewandowski, DJ Bouvier, TY Chen, R McCartney, K Sanders, B Simon, ...
Communications of the ACM 53 (7), 60-70, 2010
18*2010
Agent-based trace learning in a recommendation-verification system for cybersecurity
W Casey, E Wright, JA Morales, M Appel, J Gennari, B Mishra
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
132014
A sense of life: computational and experimental investigations with models of biochemical and evolutionary processes
B Mishra, RS Daruwala, Y Zhou, N Ugel, A Policriti, M Antoniotti, S Paxia, ...
OMICS A Journal of Integrative Biology 7 (3), 253-268, 2003
132003
Visualizing a malware distribution network
S Peryt, JA Morales, W Casey, A Volkmann, B Mishra, Y Cai
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016
122016
Placing probes along the genome using pairwise distance data
W Casey, B Mishra, M Wigler
Algorithms in Bioinformatics: First International Workshop, WABI 2001 Århus …, 2001
122001
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures
N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ...
10th EAI International Conference on Bio-inspired Information and …, 2017
112017
How signalling games explain mimicry at many levels: from viral epidemiology to human sociology
W Casey, SE Massey, B Mishra
Journal of the Royal Society Interface 18 (175), 20200689, 2021
102021
System, method and computer-accessible medium for deterrence of malware
W Casey, B Mishra
US Patent 10,666,677, 2020
72020
Identity deception and game deterrence via signaling games
W Casey, P Memarmoshrefi, A Kellner, JA Morales, B Mishra
Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016
62016
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20