William H. Allen

Orcid: 0000-0002-2779-5144

According to our database1, William H. Allen authored at least 31 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Poster Abstract: Comparison of Classifiers for Prediction of Human Actions in a Smart Home.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning.
Proceedings of the Internet of Things - ICIOT 2018, 2018

2017
High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment.
Proceedings of the International Conference on Compute and Data Analysis, 2017

2015
Usable-Security Evaluation.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Choice-Based Authentication: A Usable-Security Approach.
Proceedings of the Universal Access in Human-Computer Interaction. Design and Development Methods for Universal Access, 2014

An Assessment Framework for Usable-Security Based on Decision Science.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Usablity and security trade-off: a design guideline.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

A taxonomy of file-type identification techniques.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

RAAODV: a reputation-aware AODV for mobile ad hoc networks.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks.
Proceedings of the Universal Access in Human-Computer Interaction. User and Context Diversity, 2013

2012
Detecting Emulated Environments.
Int. J. Softw. Eng. Knowl. Eng., 2012

2010
The ISDF Framework: Towards Secure Software Development.
J. Inf. Process. Syst., 2010

Proactive reputation-based defense for MANETs using radial basis function neural networks.
Proceedings of the International Joint Conference on Neural Networks, 2010

2009
Danger theory and collaborative filtering in MANETs.
J. Comput. Virol., 2009

Malware Shall Greatly Increase ....
IEEE Secur. Priv., 2009

Generic Danger Detection for Mission Continuity.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Reputation Prediction in Mobile Ad Hoc Networks Using RBF Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2009

Security in MANETs using reputation-adjusted routing.
Proceedings of the Data Mining, 2009

2008
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Inf. Secur. J. A Glob. Perspect., 2008

Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Securing MANETs with BITSI: danger theory and mission continuity.
Proceedings of the Data Mining, 2008

2007
How Not to Be Seen.
IEEE Secur. Priv., 2007

How Not to Be Seen II: The Defenders Fight Back.
IEEE Secur. Priv., 2007

Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation.
IEEE Secur. Priv., 2007

2006
Needles in Haystacks: Practical Intrusion Detection from Theoretical Results.
Proceedings of the LCN 2006, 2006

A Model-based Approach to the Security Testing of Network Protocol Implementations.
Proceedings of the LCN 2006, 2006

2005
Computer Forensics.
IEEE Secur. Priv., 2005

A Peer-to-Peer System for Small Group Collaboration.
Proceedings of the IASTED International Conference on Web Technologies, 2005

2004
MAGNA: Modeling And Generating Network Attacks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

2003
On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003


  Loading...