Data security, privacy, availability and integrity in cloud computing: issues and current solutions S Aldossary, W Allen International Journal of Advanced Computer Science and Applications 7 (4), 2016 | 240 | 2016 |
Matching motion trajectories using scale-space K Rangarajan, W Allen, M Shah Pattern recognition 26 (4), 595-610, 1993 | 57 | 1993 |
Computer forensics WH Allen IEEE security & privacy 3 (4), 59-62, 2005 | 46 | 2005 |
The LoSS technique for detecting new denial of service attacks WH Allen, GA Marin IEEE SoutheastCon, 2004. Proceedings., 302-309, 2004 | 37 | 2004 |
A scenario-based framework for the security evaluation of software architecture A Alkussayer, WH Allen 2010 3rd International Conference on Computer Science and Information …, 2010 | 36 | 2010 |
On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems WH Allen, GA Marin Applications and the Internet, 2003. Proceedings. 2003 Symposium on, 242-248, 2003 | 35 | 2003 |
Design and simulation of a smart home managed by an intelligent self-adaptive system BM Alhafidh, W Allen International Journal of Engineering Research and Applications 6 (8), 64-90, 2016 | 25 | 2016 |
A structuration agency approach to security policy enforcement in mobile ad hoc networks M Workman, R Ford, W Allen Information Security Journal: A Global Perspective 17 (5-6), 267-277, 2008 | 23 | 2008 |
Automated detection of malicious reconnaissance to enhance network security WH Allen, GA Marin, LA Rivera Proceedings. IEEE SoutheastCon, 2005., 450-454, 2005 | 22 | 2005 |
The ISDF framework: Integrating security patterns and best practices A Alkussayer, WH Allen Advances in Information Security and Its Application: Third International …, 2009 | 20 | 2009 |
A model-based approach to the security testing of network protocol implementations WH Allen, C Dou, GA Marin Local Computer Networks, Proceedings 2006 31st IEEE Conference on, 1008-1015, 2006 | 20 | 2006 |
N-version programming for the detection of zero-day exploits L Nagy, R Ford, W Allen IEEE Topical Conference on Cybersecurity, Daytona Beach, Florida, USA, 2006 | 19 | 2006 |
Mixing wheat with the chaff: Creating useful test data for ids evaluation WH Allen IEEE Security & Privacy 5 (4), 65-67, 2007 | 16 | 2007 |
Security risk analysis of software architecture based on AHP A Alkussayer, WH Allen 7th International Conference on Networked Computing, 60-67, 2011 | 15 | 2011 |
The ISDF framework: towards secure software development A Alkussayer, WH Allen Journal of Information Processing Systems 6 (1), 91-106, 2010 | 14 | 2010 |
High level design of a home autonomous system based on cyber physical system modeling BMH Alhafidh, WH Allen 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 13 | 2017 |
Malware Shall Greatly Increase... R Ford, WH Allen IEEE Security & Privacy 7 (6), 2009 | 13 | 2009 |
An assessment framework for usable-security based on decision science YM Hausawi, WH Allen Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 11 | 2014 |
Reputation prediction in mobile ad hoc networks using RBF neural networks FM Ham, EY Imana, A Ondi, R Ford, W Allen, M Reedy Engineering Applications of Neural Networks: 11th International Conference …, 2009 | 11 | 2009 |
FPGA hardware implementation of smart home autonomous system based on deep learning BMH Alhafidh, AI Daood, MM Alawad, W Allen Internet of Things–ICIOT 2018: Third International Conference, Held as Part …, 2018 | 10 | 2018 |