William Casey
Orcid: 0000-0001-7718-7385Affiliations:
- Carnegie Mellon University, Pittsburgh, PA, USA
  According to our database1,
  William Casey
  authored at least 30 papers
  between 1996 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2024
Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations.
    
  
    CoRR, 2024
    
  
    Proceedings of the Intelligent Computing, 2024
    
  
    Proceedings of the IEEE Military Communications Conference, 2024
    
  
  2023
    Mob. Networks Appl., April, 2023
    
  
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators.
    
  
    Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
    
  
  2022
    Proceedings of the IEEE Intl. Conf. on Dependable, 2022
    
  
    Proceedings of the IEEE Intl. Conf. on Dependable, 2022
    
  
  2019
    Commun. ACM, 2019
    
  
    Proceedings of the Advances in Human Factors in Cybersecurity, 2019
    
  
  2018
    Proceedings of the Computational Science - ICCS 2018, 2018
    
  
  2017
    Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
    
  
  2016
Epistatic Signaling and Minority Games, the Adversarial Dynamics in Social Technological Systems.
    
  
    Mob. Networks Appl., 2016
    
  
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
    
  
    Comput. Math. Organ. Theory, 2016
    
  
    Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016
    
  
Signature limits: an entire map of clone features and their discovery in nearly linear time.
    
  
    Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
    
  
  2015
    Proceedings of the 24th International Conference on World Wide Web, 2015
    
  
    Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
    
  
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games.
    
  
    Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
    
  
    Proceedings of the BICT 2015, 2015
    
  
  2014
Agent-based trace learning in a recommendation-verification system for cybersecurity.
    
  
    Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
    
  
    Proceedings of the Distributed Computing and Internet Technology, 2014
    
  
    Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014
    
  
  2006
    J. Comput. Biol., 2006
    
  
  2003
    Proceedings of the High Performance Computing - HiPC 2003, 10th International Conference, 2003
    
  
    Proceedings of the Computational Methods in Systems Biology, First International Workshop, 2003
    
  
  2001
    Proceedings of the Algorithms in Bioinformatics, First International Workshop, 2001
    
  
  1998
    Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
    
  
  1996
    Proceedings of the Learning for the Real World: Proceedings of the Second International Conference on the Learning Sciences, 1996