Weakly supervised extraction of computer security events from twitter A Ritter, E Wright, W Casey, T Mitchell Proceedings of the 24th international conference on world wide web, 896-905, 2015 | 159 | 2015 |
Process, software arrangement and computer-accessible medium for obtaining information associated with a haplotype W Casey, T Anantharaman US Patent 7,805,282, 2010 | 93 | 2010 |
System, method and software arrangement for bi-allele haplotype phasing W Casey, T Anantharaman US Patent App. 11/093,565, 2005 | 85 | 2005 |
Cybersecurity and applied mathematics L Metcalf, W Casey Syngress, 2016 | 64 | 2016 |
Compliance signaling games: toward modeling the deterrence of insider threats W Casey, JA Morales, E Wright, Q Zhu, B Mishra Computational and Mathematical Organization Theory 22, 318-349, 2016 | 33 | 2016 |
Cyber security via signaling games: Toward a science of cyber security W Casey, JA Morales, T Nguyen, J Spring, R Weaver, E Wright, L Metcalf, ... Distributed Computing and Internet Technology: 10th International Conference …, 2014 | 28 | 2014 |
Compliance control: Managed vulnerability surface in social-technological systems via signaling games WA Casey, Q Zhu, JA Morales, B Mishra Proceedings of the 7th ACM CCS international workshop on managing insider …, 2015 | 25 | 2015 |
Chapter 2-Metrics, similarity, and sets L Metcalf, W Casey Cybersecurity and applied mathematics, 3-22, 2016 | 23 | 2016 |
Chapter 5–Graph theory L Metcalf, W Casey, L Metcalf, W Casey Cybersecurity and applied mathematics, 67-94, 2016 | 22 | 2016 |
Introduction to data analysis L Metcalf, W Casey Cybersecurity and applied mathematics, 43-65, 2016 | 20 | 2016 |
2 fuzzy hashing techniques in applied malware analysis D French, W Casey Results of SEI Line-Funded Exploratory New Starts Projects, 2, 2012 | 20 | 2012 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. DS Wise Communications of the ACM 42 (6), 116-119, 1999 | 19* | 1999 |
Deception, identity, and security: the game theory of sybil attacks W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra Communications of the ACM 62 (1), 85-93, 2018 | 18 | 2018 |
A sense of life: computational and experimental investigations with models of biochemical and evolutionary processes B Mishra, RS Daruwala, Y Zhou, N Ugel, A Policriti, M Antoniotti, S Paxia, ... OMICS A Journal of Integrative Biology 7 (3), 253-268, 2003 | 13 | 2003 |
Visualizing a malware distribution network S Peryt, JA Morales, W Casey, A Volkmann, B Mishra, Y Cai 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016 | 12 | 2016 |
Placing probes along the genome using pairwise distance data W Casey, B Mishra, M Wigler Algorithms in Bioinformatics: First International Workshop, WABI 2001 Århus …, 2001 | 12 | 2001 |
Agent-based trace learning in a recommendation-verification system for cybersecurity W Casey, E Wright, JA Morales, M Appel, J Gennari, B Mishra 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 11 | 2014 |
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ... 10th EAI International Conference on Bio-inspired Information and …, 2017 | 10 | 2017 |
How signalling games explain mimicry at many levels: from viral epidemiology to human sociology W Casey, SE Massey, B Mishra Journal of the Royal Society Interface 18 (175), 20200689, 2021 | 8 | 2021 |
System, method and computer-accessible medium for deterrence of malware W Casey, B Mishra US Patent 10,666,677, 2020 | 7 | 2020 |