William Casey
Orcid: 0000-0001-7718-7385Affiliations:
- Carnegie Mellon University, Pittsburgh, PA, USA
According to our database1,
William Casey
authored at least 29 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations.
CoRR, 2024
Proceedings of the Intelligent Computing, 2024
2023
Mob. Networks Appl., April, 2023
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
2019
Commun. ACM, 2019
Proceedings of the Advances in Human Factors in Cybersecurity, 2019
2018
Proceedings of the Computational Science - ICCS 2018, 2018
2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
2016
EAI Endorsed Trans. Security Safety, 2016
Epistatic Signaling and Minority Games, the Adversarial Dynamics in Social Technological Systems.
Mob. Networks Appl., 2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Comput. Math. Organ. Theory, 2016
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016
Signature limits: an entire map of clone features and their discovery in nearly linear time.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
Agent-based trace learning in a recommendation-verification system for cybersecurity.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the Distributed Computing and Internet Technology, 2014
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014
2006
J. Comput. Biol., 2006
2003
Proceedings of the High Performance Computing - HiPC 2003, 10th International Conference, 2003
Proceedings of the Computational Methods in Systems Biology, First International Workshop, 2003
2001
Proceedings of the Algorithms in Bioinformatics, First International Workshop, 2001
1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
1996
Proceedings of the Learning for the Real World: Proceedings of the Second International Conference on the Learning Sciences, 1996