Segui
William H. Allen
William H. Allen
Associate Professor of Computer Science, Florida Institute of Technology
Email verificata su fit.edu
Titolo
Citata da
Citata da
Anno
Data security, privacy, availability and integrity in cloud computing: issues and current solutions
S Aldossary, W Allen
International Journal of Advanced Computer Science and Applications 7 (4), 2016
2402016
Matching motion trajectories using scale-space
K Rangarajan, W Allen, M Shah
Pattern recognition 26 (4), 595-610, 1993
571993
Computer forensics
WH Allen
IEEE security & privacy 3 (4), 59-62, 2005
462005
The LoSS technique for detecting new denial of service attacks
WH Allen, GA Marin
IEEE SoutheastCon, 2004. Proceedings., 302-309, 2004
372004
A scenario-based framework for the security evaluation of software architecture
A Alkussayer, WH Allen
2010 3rd International Conference on Computer Science and Information …, 2010
362010
On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
WH Allen, GA Marin
Applications and the Internet, 2003. Proceedings. 2003 Symposium on, 242-248, 2003
352003
Design and simulation of a smart home managed by an intelligent self-adaptive system
BM Alhafidh, W Allen
International Journal of Engineering Research and Applications 6 (8), 64-90, 2016
252016
A structuration agency approach to security policy enforcement in mobile ad hoc networks
M Workman, R Ford, W Allen
Information Security Journal: A Global Perspective 17 (5-6), 267-277, 2008
232008
Automated detection of malicious reconnaissance to enhance network security
WH Allen, GA Marin, LA Rivera
Proceedings. IEEE SoutheastCon, 2005., 450-454, 2005
222005
The ISDF framework: Integrating security patterns and best practices
A Alkussayer, WH Allen
Advances in Information Security and Its Application: Third International …, 2009
202009
A model-based approach to the security testing of network protocol implementations
WH Allen, C Dou, GA Marin
Local Computer Networks, Proceedings 2006 31st IEEE Conference on, 1008-1015, 2006
202006
N-version programming for the detection of zero-day exploits
L Nagy, R Ford, W Allen
IEEE Topical Conference on Cybersecurity, Daytona Beach, Florida, USA, 2006
192006
Mixing wheat with the chaff: Creating useful test data for ids evaluation
WH Allen
IEEE Security & Privacy 5 (4), 65-67, 2007
162007
Security risk analysis of software architecture based on AHP
A Alkussayer, WH Allen
7th International Conference on Networked Computing, 60-67, 2011
152011
The ISDF framework: towards secure software development
A Alkussayer, WH Allen
Journal of Information Processing Systems 6 (1), 91-106, 2010
142010
High level design of a home autonomous system based on cyber physical system modeling
BMH Alhafidh, WH Allen
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
132017
Malware Shall Greatly Increase...
R Ford, WH Allen
IEEE Security & Privacy 7 (6), 2009
132009
An assessment framework for usable-security based on decision science
YM Hausawi, WH Allen
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
112014
Reputation prediction in mobile ad hoc networks using RBF neural networks
FM Ham, EY Imana, A Ondi, R Ford, W Allen, M Reedy
Engineering Applications of Neural Networks: 11th International Conference …, 2009
112009
FPGA hardware implementation of smart home autonomous system based on deep learning
BMH Alhafidh, AI Daood, MM Alawad, W Allen
Internet of Things–ICIOT 2018: Third International Conference, Held as Part …, 2018
102018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20