William Mahoney

According to our database1, William Mahoney authored at least 27 papers between 1998 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry.
CoRR, 2022

2021
Uncertainty-Aware Learning for Improvements in Image Quality of the Canada-France-Hawaii Telescope.
CoRR, 2021

A Digital Forensics Investigation of a Smart Scale IoT Ecosystem.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

A machine-learning based framework for detection of fake political speech.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2018
Leave It to Weaver.
Proceedings of the 8th Software Security, 2018

2016
Comparing the effectiveness of commercial obfuscators against MATE attacks.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Modifications to GCC for increased software privacy.
Int. J. Inf. Comput. Secur., 2015

Towards a New Quasigroup Block Cipher for a Single-Chip FPGA Implementation.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Authentication Bypass and Remote Escalated I/O Command Attacks.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Hardware Implementation of Quasigroup Encryption for SCADA Networks.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

2013
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference.
Int. J. Inf. Comput. Secur., 2013

SCADA Threats in the Modern Airport.
Int. J. Cyber Warf. Terror., 2013

Privacy Preserving Computations Using Implicit Security.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
Reverse engineering: <i>is it art?</i>.
Inroads, 2012

A freshman level course on information assurance: can it be done? <i>here's how</i>.
Inroads, 2012

2011
Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political.
IEEE Technol. Soc. Mag., 2011

An integrated framework for control system simulation and regulatory compliance monitoring.
Int. J. Crit. Infrastructure Prot., 2011

Using anomalous event patterns in control systems for tamper detection.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
A Coherent Measurement of Web-Search Relevance.
IEEE Trans. Syst. Man Cybern. Part A, 2009

Teaching compiler code generation: simpler is better.
ACM SIGCSE Bull., 2009

2007
Using common off-the-shelf tools to implement dynamic aspects.
ACM SIGPLAN Notices, 2007

Instrumentation of Open-Source Software for Intrusion Detection.
Proceedings of the Runtime Verification, 7th International Workshop, 2007

1998
Using Simulation to Solve a Conveyor System Controller Design Problem.
Simul., 1998


  Loading...