Allen, William H.
19603  results:
Search for persons X
?
3

Comparison and Performance Analysis of Machine Learning Alg..:

, In: Proceedings of the International Conference on Compute and Data Analysis,
 
?
4

High Level Design of a Home Autonomous System Based on Cybe..:

, In: 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW),
 
?
5

A taxonomy of file-type identification techniques:

, In: Proceedings of the 2014 ACM Southeast Regional Conference,
 
?
6

Usablity and security trade-off : a design guideline:

, In: Proceedings of the 2014 ACM Southeast Regional Conference,
 
?
7

RAAODV : a reputation-aware AODV for mobile ad hoc netwo..:

, In: Proceedings of the 2014 ACM Southeast Regional Conference,
 
?
8

The ISDF Framework: Integrating Security Patterns and Best ..:

, In: Advances in Information Security and Its Application; Communications in Computer and Information Science,
 
?
9

Malware Shall Greatly Increase:

Ford, Richard ; Allen, William H.
IEEE Security & Privacy.  7 (2009)  6 - p. 69-71 , 2009
 
?
10

Danger theory and collaborative filtering in MANETs:

Hoffman, Katherine ; Ondi, Attila ; Ford, Richard...
Journal in Computer Virology.  5 (2008)  4 - p. 345-355 , 2008
 
?
11

How Not to Be Seen:

Ford, Richard ; Allen, William H.
IEEE Security & Privacy.  5 (2007)  1 - p. 67-69 , 2007
 
?
12

Mixing Wheat with the Chaff: Creating Useful Test Data for ..:

Allen, William H.
IEEE Security & Privacy Magazine.  5 (2007)  4 - p. 65-67 , 2007
 
?
13

How Not to Be Seen II: The Defenders Fight Back:

Ford, Richard ; Allen, William H.
IEEE Security & Privacy.  5 (2007)  6 - p. 65-68 , 2007
 
1-15