William Casey
William Casey
Professor of Cyber Science, United States Naval Academy
Verified email at
Cited by
Cited by
Weakly supervised extraction of computer security events from twitter
A Ritter, E Wright, W Casey, T Mitchell
Proceedings of the 24th international conference on world wide web, 896-905, 2015
Process, software arrangement and computer-accessible medium for obtaining information associated with a haplotype
W Casey, T Anantharaman
US Patent 7,805,282, 2010
System, method and software arrangement for bi-allele haplotype phasing
W Casey, T Anantharaman
US Patent App. 11/093,565, 2005
Cybersecurity and applied mathematics
L Metcalf, W Casey
Syngress, 2016
Compliance signaling games: toward modeling the deterrence of insider threats
W Casey, JA Morales, E Wright, Q Zhu, B Mishra
Computational and Mathematical Organization Theory 22, 318-349, 2016
Cyber security via signaling games: Toward a science of cyber security
W Casey, JA Morales, T Nguyen, J Spring, R Weaver, E Wright, L Metcalf, ...
Distributed Computing and Internet Technology: 10th International Conference …, 2014
Compliance control: Managed vulnerability surface in social-technological systems via signaling games
WA Casey, Q Zhu, JA Morales, B Mishra
Proceedings of the 7th ACM CCS international workshop on managing insider …, 2015
Chapter 2-Metrics, similarity, and sets
L Metcalf, W Casey
Cybersecurity and applied mathematics, 3-22, 2016
Chapter 5–Graph theory
L Metcalf, W Casey, L Metcalf, W Casey
Cybersecurity and applied mathematics, 67-94, 2016
Introduction to data analysis
L Metcalf, W Casey
Cybersecurity and applied mathematics, 43-65, 2016
2 fuzzy hashing techniques in applied malware analysis
D French, W Casey
Results of SEI Line-Funded Exploratory New Starts Projects, 2, 2012
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
DS Wise
Communications of the ACM 42 (6), 116-119, 1999
Deception, identity, and security: the game theory of sybil attacks
W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra
Communications of the ACM 62 (1), 85-93, 2018
A sense of life: computational and experimental investigations with models of biochemical and evolutionary processes
B Mishra, RS Daruwala, Y Zhou, N Ugel, A Policriti, M Antoniotti, S Paxia, ...
OMICS A Journal of Integrative Biology 7 (3), 253-268, 2003
Visualizing a malware distribution network
S Peryt, JA Morales, W Casey, A Volkmann, B Mishra, Y Cai
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016
Placing probes along the genome using pairwise distance data
W Casey, B Mishra, M Wigler
Algorithms in Bioinformatics: First International Workshop, WABI 2001 Århus …, 2001
Agent-based trace learning in a recommendation-verification system for cybersecurity
W Casey, E Wright, JA Morales, M Appel, J Gennari, B Mishra
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures
N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ...
10th EAI International Conference on Bio-inspired Information and …, 2017
How signalling games explain mimicry at many levels: from viral epidemiology to human sociology
W Casey, SE Massey, B Mishra
Journal of the Royal Society Interface 18 (175), 20200689, 2021
System, method and computer-accessible medium for deterrence of malware
W Casey, B Mishra
US Patent 10,666,677, 2020
The system can't perform the operation now. Try again later.
Articles 1–20