William Mahoney
Orcid: 0000-0002-5534-771X
According to our database1,
William Mahoney
authored at least 28 papers
between 1998 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry.
CoRR, 2022
2021
Dataset used in "Uncertainty-Aware Learning for Improvements in Image Quality of the Canada-France-Hawaii Telescope" (https://arxiv.org/abs/2107.00048).
Dataset, August, 2021
Uncertainty-Aware Learning for Improvements in Image Quality of the Canada-France-Hawaii Telescope.
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020
2018
2016
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
2015
Int. J. Inf. Comput. Secur., 2015
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015
2014
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014
2013
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference.
Int. J. Inf. Comput. Secur., 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
2012
Inroads, 2012
2011
IEEE Technol. Soc. Mag., 2011
An integrated framework for control system simulation and regulatory compliance monitoring.
Int. J. Crit. Infrastructure Prot., 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2009
IEEE Trans. Syst. Man Cybern. Part A, 2009
2007
ACM SIGPLAN Notices, 2007
Proceedings of the Runtime Verification, 7th International Workshop, 2007
1998