Follow
William Casey
William Casey
Professor of Cyber Science, United States Naval Academy
Verified email at usna.edu
Title
Cited by
Cited by
Year
Weakly supervised extraction of computer security events from twitter
A Ritter, E Wright, W Casey, T Mitchell
Proceedings of the 24th international conference on world wide web, 896-905, 2015
1652015
Process, software arrangement and computer-accessible medium for obtaining information associated with a haplotype
W Casey, T Anantharaman
US Patent 7,805,282, 2010
942010
System, method and software arrangement for bi-allele haplotype phasing
W Casey, T Anantharaman
US Patent App. 11/093,565, 2005
862005
Compliance signaling games: toward modeling the deterrence of insider threats
W Casey, JA Morales, E Wright, Q Zhu, B Mishra
Computational and Mathematical Organization Theory 22, 318-349, 2016
342016
Cyber security via signaling games: Toward a science of cyber security
W Casey, JA Morales, T Nguyen, J Spring, R Weaver, E Wright, L Metcalf, ...
Distributed Computing and Internet Technology: 10th International Conference …, 2014
322014
Compliance control: Managed vulnerability surface in social-technological systems via signaling games
WA Casey, Q Zhu, JA Morales, B Mishra
Proceedings of the 7th ACM CCS international workshop on managing insider …, 2015
272015
Introduction to data analysis
L Metcalf, W Casey
Cybersecurity and applied mathematics, 43-65, 2016
252016
Chapter 5–Graph theory
L Metcalf, W Casey, L Metcalf, W Casey
Cybersecurity and applied mathematics, 67-94, 2016
252016
Chapter 2-Metrics, similarity, and sets
L Metcalf, W Casey
Cybersecurity and applied mathematics, 3-22, 2016
202016
2 fuzzy hashing techniques in applied malware analysis
D French, W Casey
Results of SEI Line-Funded Exploratory New Starts Projects, 2, 2012
202012
Deception, identity, and security: the game theory of sybil attacks
W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra
Communications of the ACM 62 (1), 85-93, 2018
192018
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
G Lewandowski, DJ Bouvier, TY Chen, R McCartney, K Sanders, B Simon, ...
Communications of the ACM 53 (7), 60-70, 2010
18*2010
Agent-based trace learning in a recommendation-verification system for cybersecurity
W Casey, E Wright, JA Morales, M Appel, J Gennari, B Mishra
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
132014
A sense of life: computational and experimental investigations with models of biochemical and evolutionary processes
B Mishra, RS Daruwala, Y Zhou, N Ugel, A Policriti, M Antoniotti, S Paxia, ...
OMICS A Journal of Integrative Biology 7 (3), 253-268, 2003
132003
Visualizing a malware distribution network
S Peryt, JA Morales, W Casey, A Volkmann, B Mishra, Y Cai
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016
122016
Placing probes along the genome using pairwise distance data
W Casey, B Mishra, M Wigler
Algorithms in Bioinformatics: First International Workshop, WABI 2001 Århus …, 2001
122001
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures
N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ...
10th EAI International Conference on Bio-inspired Information and …, 2017
112017
How signalling games explain mimicry at many levels: from viral epidemiology to human sociology
W Casey, SE Massey, B Mishra
Journal of the Royal Society Interface 18 (175), 20200689, 2021
102021
System, method and computer-accessible medium for deterrence of malware
W Casey, B Mishra
US Patent 10,666,677, 2020
72020
Identity deception and game deterrence via signaling games
W Casey, P Memarmoshrefi, A Kellner, JA Morales, B Mishra
Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20