William Casey

Orcid: 0000-0001-7718-7385

Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA


According to our database1, William Casey authored at least 28 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations.
CoRR, 2024

2023
Correction to: Editorial: Renaissance of Biomimicry Computing.
Mob. Networks Appl., April, 2023

Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

2022
Detecting Ransomware Execution in a Timely Manner.
CoRR, 2022

The Visualization of Ransomware Infection.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Change Point Detection with Machine Learning for Rapid Ransomware Detection.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2019
Deception, identity, and security: the game theory of sybil attacks.
Commun. ACM, 2019

Perceiving Behavior of Cyber Malware with Human-Machine Teaming.
Proceedings of the Advances in Human Factors in Cybersecurity, 2019

2018
Pheromone Model Based Visualization of Malware Distribution Networks.
Proceedings of the Computational Science - ICCS 2018, 2018

2017
Malware Fingerprinting under Uncertainty.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
Identity Deception and Game Deterrence via Signaling Games.
EAI Endorsed Trans. Security Safety, 2016

Epistatic Signaling and Minority Games, the Adversarial Dynamics in Social Technological Systems.
Mob. Networks Appl., 2016

Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Compliance signaling games: toward modeling the deterrence of insider threats.
Comput. Math. Organ. Theory, 2016

Visualizing a Malware Distribution Network.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Signature limits: an entire map of clone features and their discovery in nearly linear time.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
Weakly Supervised Extraction of Computer Security Events from Twitter.
Proceedings of the 24th International Conference on World Wide Web, 2015

Sandboxing and reasoning on malware infection trees.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Agent-based trace learning in a recommendation-verification system for cybersecurity.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Cyber Security via Signaling Games: Toward a Science of Cyber Security.
Proceedings of the Distributed Computing and Internet Technology, 2014

Cyber Security via Minority Games with Epistatic Signaling.
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014

2006
Validation of <i>S. Pombe</i> Sequence Assembly by Microarray Hybridization.
J. Comput. Biol., 2006

2003
A Nearly Linear-Time General Algorithm for Genome-Wide Bi-allele Haplotype Phasing.
Proceedings of the High Performance Computing - HiPC 2003, 10th International Conference, 2003

Coupled Oscillator Models for a Set of Communicating Cells.
Proceedings of the Computational Methods in Systems Biology, First International Workshop, 2003

2001
Placing Probes along the Genome Using Pairwise Distance Data.
Proceedings of the Algorithms in Bioinformatics, First International Workshop, 2001

1998
The Effect of Stable Points on the Convergence of Markov Random Fields.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

1996
Institutions of Learning: A Report from the Trenches.
Proceedings of the Learning for the Real World: Proceedings of the Second International Conference on the Learning Sciences, 1996


  Loading...