Follow
William Casey
William Casey
Professor of Cyber Science, United States Naval Academy
Verified email at usna.edu
Title
Cited by
Cited by
Year
Weakly supervised extraction of computer security events from twitter
A Ritter, E Wright, W Casey, T Mitchell
Proceedings of the 24th international conference on world wide web, 896-905, 2015
1592015
Process, software arrangement and computer-accessible medium for obtaining information associated with a haplotype
W Casey, T Anantharaman
US Patent 7,805,282, 2010
932010
System, method and software arrangement for bi-allele haplotype phasing
W Casey, T Anantharaman
US Patent App. 11/093,565, 2005
852005
Cybersecurity and applied mathematics
L Metcalf, W Casey
Syngress, 2016
642016
Compliance signaling games: toward modeling the deterrence of insider threats
W Casey, JA Morales, E Wright, Q Zhu, B Mishra
Computational and Mathematical Organization Theory 22, 318-349, 2016
332016
Cyber security via signaling games: Toward a science of cyber security
W Casey, JA Morales, T Nguyen, J Spring, R Weaver, E Wright, L Metcalf, ...
Distributed Computing and Internet Technology: 10th International Conference …, 2014
282014
Compliance control: Managed vulnerability surface in social-technological systems via signaling games
WA Casey, Q Zhu, JA Morales, B Mishra
Proceedings of the 7th ACM CCS international workshop on managing insider …, 2015
252015
Chapter 2-Metrics, similarity, and sets
L Metcalf, W Casey
Cybersecurity and applied mathematics, 3-22, 2016
232016
Chapter 5–Graph theory
L Metcalf, W Casey, L Metcalf, W Casey
Cybersecurity and applied mathematics, 67-94, 2016
222016
Introduction to data analysis
L Metcalf, W Casey
Cybersecurity and applied mathematics, 43-65, 2016
202016
2 fuzzy hashing techniques in applied malware analysis
D French, W Casey
Results of SEI Line-Funded Exploratory New Starts Projects, 2, 2012
202012
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
DS Wise
Communications of the ACM 42 (6), 116-119, 1999
19*1999
Deception, identity, and security: the game theory of sybil attacks
W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra
Communications of the ACM 62 (1), 85-93, 2018
182018
A sense of life: computational and experimental investigations with models of biochemical and evolutionary processes
B Mishra, RS Daruwala, Y Zhou, N Ugel, A Policriti, M Antoniotti, S Paxia, ...
OMICS A Journal of Integrative Biology 7 (3), 253-268, 2003
132003
Visualizing a malware distribution network
S Peryt, JA Morales, W Casey, A Volkmann, B Mishra, Y Cai
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016
122016
Placing probes along the genome using pairwise distance data
W Casey, B Mishra, M Wigler
Algorithms in Bioinformatics: First International Workshop, WABI 2001 Århus …, 2001
122001
Agent-based trace learning in a recommendation-verification system for cybersecurity
W Casey, E Wright, JA Morales, M Appel, J Gennari, B Mishra
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
112014
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures
N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ...
10th EAI International Conference on Bio-inspired Information and …, 2017
102017
How signalling games explain mimicry at many levels: from viral epidemiology to human sociology
W Casey, SE Massey, B Mishra
Journal of the Royal Society Interface 18 (175), 20200689, 2021
82021
System, method and computer-accessible medium for deterrence of malware
W Casey, B Mishra
US Patent 10,666,677, 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20