William H. Allen
Orcid: 0000-0002-2779-5144
According to our database1,
William H. Allen
authored at least 31 papers
between 2003 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Poster Abstract: Comparison of Classifiers for Prediction of Human Actions in a Smart Home.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
Proceedings of the Internet of Things - ICIOT 2018, 2018
2017
High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment.
Proceedings of the International Conference on Compute and Data Analysis, 2017
2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
Proceedings of the Universal Access in Human-Computer Interaction. Design and Development Methods for Universal Access, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks.
Proceedings of the Universal Access in Human-Computer Interaction. User and Context Diversity, 2013
2012
2010
J. Inf. Process. Syst., 2010
Proactive reputation-based defense for MANETs using radial basis function neural networks.
Proceedings of the International Joint Conference on Neural Networks, 2010
2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of the Engineering Applications of Neural Networks, 2009
Proceedings of the Data Mining, 2009
2008
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Inf. Secur. J. A Glob. Perspect., 2008
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
Proceedings of the Data Mining, 2008
2007
IEEE Secur. Priv., 2007
2006
Proceedings of the LCN 2006, 2006
Proceedings of the LCN 2006, 2006
2005
A Peer-to-Peer System for Small Group Collaboration.
Proceedings of the IASTED International Conference on Web Technologies, 2005
2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
2003
On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003