Paul D. Williams

According to our database1, Paul D. Williams authored at least 16 papers between 1958 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Prospects for trachoma elimination through mass treatment targeted at children.
Proceedings of the Agent-Directed Simulation Symposium, 2016

2009
Voice and video capacity of a secure IEEE 802.11g wireless network.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

2008
Integrating trust into the CyberCraft Initiative via the Trust Vectors model [Application Notes].
IEEE Comput. Intell. Mag., 2008

Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Cyberspace Policy For Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection II, 2008

2007
CuPIDS: An exploration of highly focused, co-processor-based information system protection.
Comput. Networks, 2007

A Hardware-based Architecture to Support Flexible Real-Time Parallel Intrusion Detection.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

Using Relocatable Bitstreams for Fault Tolerance.
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007

2006
Assessing the Accuracy of Ancestral Protein Reconstruction Methods.
PLoS Comput. Biol., 2006

2005
CuPIDS: Increasing information system security through the use of dedicated co-processing
PhD thesis, 2005

2002
An artificial immune system architecture for computer security applications.
IEEE Trans. Evol. Comput., 2002

The computer defense immune system: current and future research in intrusion detection.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

2001
CDIS: Towards a Computer Immune System for Detecting Network Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

1958
A study of numerical methods for solving differential equations.
Proceedings of the Preprints of papers presented at the 13th national meeting of the Association for Computing Machinery, 1958


  Loading...