default search action
William H. Allen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c22]Basman M. Hasan Alhafidh, Amar I. Daood, Mohammed M. Alawad, William H. Allen:
FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning. ICIOT 2018: 121-133 - [c21]Basman M. Hasan Alhafidh, Amar I. Daood, William H. Allen:
Poster Abstract: Comparison of Classifiers for Prediction of Human Actions in a Smart Home. IoTDI 2018: 287-288 - 2017
- [c20]Basman M. Hasan Alhafidh, William H. Allen:
Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment. ICCDA 2017: 54-59 - [c19]Basman M. Hasan Alhafidh, William H. Allen:
High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling. ICDCS Workshops 2017: 45-52 - 2015
- [c18]Yasser M. Hausawi, William H. Allen:
Usable-Security Evaluation. HCI (22) 2015: 335-346 - 2014
- [c17]Ahmed Al-hamadani, William H. Allen:
RAAODV: a reputation-aware AODV for mobile ad hoc networks. ACM Southeast Regional Conference 2014: 6:1-6:6 - [c16]Yasser M. Hausawi, William H. Allen:
Usablity and security trade-off: a design guideline. ACM Southeast Regional Conference 2014: 21:1-21:6 - [c15]Nasser S. Alamri, William H. Allen:
A taxonomy of file-type identification techniques. ACM Southeast Regional Conference 2014: 49:1-49:4 - [c14]Yasser M. Hausawi, William H. Allen:
An Assessment Framework for Usable-Security Based on Decision Science. HCI (24) 2014: 33-44 - [c13]Yasser M. Hausawi, William H. Allen, Gisela Susanne Bahr:
Choice-Based Authentication: A Usable-Security Approach. HCI (4) 2014: 114-124 - 2013
- [c12]Gisela Susanne Bahr, William H. Allen:
Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks. HCI (6) 2013: 165-174 - 2012
- [j9]Tauhida Parveen, Scott R. Tilley, William H. Allen, Gerald A. Marin, Richard Ford:
Detecting Emulated Environments. Int. J. Softw. Eng. Knowl. Eng. 22(7): 927-944 (2012) - 2010
- [j8]Abdulaziz Alkussayer, William H. Allen:
The ISDF Framework: Towards Secure Software Development. J. Inf. Process. Syst. 6(1): 91-106 (2010) - [c11]Eyosias Yoseph Imana, Fredric M. Ham, William H. Allen, Richard Ford:
Proactive reputation-based defense for MANETs using radial basis function neural networks. IJCNN 2010: 1-6
2000 – 2009
- 2009
- [j7]Richard Ford, William H. Allen:
Malware Shall Greatly Increase .... IEEE Secur. Priv. 7(6): 69-71 (2009) - [j6]Katherine Hoffman, Attila Ondi, Richard Ford, Marco M. Carvalho, Derek Brown, William H. Allen, Gerald A. Marin:
Danger theory and collaborative filtering in MANETs. J. Comput. Virol. 5(4): 345-355 (2009) - [c10]Attila Ondi, Katherine Hoffman, Carlos Perez, Richard Ford, Marco M. Carvalho, William H. Allen:
Security in MANETs using reputation-adjusted routing. Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009: 734406 - [c9]Fredric M. Ham, Eyosias Yoseph Imana, Attila Ondi, Richard Ford, William H. Allen, Matthew Reedy:
Reputation Prediction in Mobile Ad Hoc Networks Using RBF Neural Networks. EANN 2009: 485-494 - [c8]Richard Ford, William H. Allen, Katherine Hoffman, Attila Ondi, Marco M. Carvalho:
Generic Danger Detection for Mission Continuity. NCA 2009: 102-107 - 2008
- [j5]Michael Workman, Richard Ford, William H. Allen:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks. Inf. Secur. J. A Glob. Perspect. 17(5&6): 267-277 (2008) - [c7]Marco Carvalho, Richard Ford, William H. Allen, Gerald A. Marin:
Securing MANETs with BITSI: danger theory and mission continuity. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 69730D - [c6]Tauhida Parveen, William H. Allen, Scott R. Tilley, Gerald A. Marin, Richard Ford:
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls. SEKE 2008: 802-807 - 2007
- [j4]Richard Ford, William H. Allen:
How Not to Be Seen. IEEE Secur. Priv. 5(1): 67-69 (2007) - [j3]William H. Allen:
Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. IEEE Secur. Priv. 5(4): 65-67 (2007) - [j2]William H. Allen, Richard Ford:
How Not to Be Seen II: The Defenders Fight Back. IEEE Secur. Priv. 5(6): 65-68 (2007) - 2006
- [c5]Gerald A. Marin, William H. Allen:
Needles in Haystacks: Practical Intrusion Detection from Theoretical Results. LCN 2006: 571-573 - [c4]William H. Allen, Chin Dou, Gerald A. Marin:
A Model-based Approach to the Security Testing of Network Protocol Implementations. LCN 2006: 1008-1015 - 2005
- [j1]William H. Allen:
Computer Forensics. IEEE Secur. Priv. 3(4): 59-62 (2005) - [c3]William H. Allen, Gareth Farrington:
A Peer-to-Peer System for Small Group Collaboration. Web Technologies, Applications, and Services 2005: 123-128 - 2004
- [c2]William H. Allen, Gerald A. Marin:
MAGNA: Modeling And Generating Network Attacks. LCN 2004: 423-424 - 2003
- [c1]William H. Allen, Gerald A. Marin:
On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems. SAINT 2003: 242-248
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint