Weakly supervised extraction of computer security events from twitter A Ritter, E Wright, W Casey, T Mitchell Proceedings of the 24th international conference on world wide web, 896-905, 2015 | 171 | 2015 |
Process, software arrangement and computer-accessible medium for obtaining information associated with a haplotype W Casey, T Anantharaman US Patent 7,805,282, 2010 | 98 | 2010 |
System, method and software arrangement for bi-allele haplotype phasing W Casey, T Anantharaman US Patent App. 11/093,565, 2005 | 91 | 2005 |
Compliance signaling games: toward modeling the deterrence of insider threats W Casey, JA Morales, E Wright, Q Zhu, B Mishra Computational and Mathematical Organization Theory 22, 318-349, 2016 | 37 | 2016 |
Cyber security via signaling games: Toward a science of cyber security W Casey, JA Morales, T Nguyen, J Spring, R Weaver, E Wright, L Metcalf, ... Distributed Computing and Internet Technology: 10th International Conference …, 2014 | 32 | 2014 |
Chapter 5–Graph theory L Metcalf, W Casey, L Metcalf, W Casey Cybersecurity and applied mathematics, 67-94, 2016 | 31 | 2016 |
Introduction to data analysis L Metcalf, W Casey Cybersecurity and applied mathematics, 43-65, 2016 | 29 | 2016 |
Compliance control: Managed vulnerability surface in social-technological systems via signaling games WA Casey, Q Zhu, JA Morales, B Mishra Proceedings of the 7th ACM CCS international workshop on managing insider …, 2015 | 28 | 2015 |
Deception, identity, and security: the game theory of sybil attacks W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra Communications of the ACM 62 (1), 85-93, 2018 | 20 | 2018 |
Chapter 2-Metrics, similarity, and sets L Metcalf, W Casey Cybersecurity and applied mathematics, 3-22, 2016 | 20 | 2016 |
2 fuzzy hashing techniques in applied malware analysis D French, W Casey Results of SEI Line-Funded Exploratory New Starts Projects, 2, 2012 | 20 | 2012 |
This malware looks familiar: Laymen identify malware run-time similarity with chernoff faces and stick figures N VanHoudnos, W Casey, D French, B Lindauer, E Kanal, E Wright, ... 10th EAI International Conference on Bio-inspired Information and …, 2017 | 13 | 2017 |
Agent-based trace learning in a recommendation-verification system for cybersecurity W Casey, E Wright, JA Morales, M Appel, J Gennari, B Mishra 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 13 | 2014 |
A sense of life: computational and experimental investigations with models of biochemical and evolutionary processes B Mishra, RS Daruwala, Y Zhou, N Ugel, A Policriti, M Antoniotti, S Paxia, ... OMICS A Journal of Integrative Biology 7 (3), 253-268, 2003 | 13 | 2003 |
How signalling games explain mimicry at many levels: from viral epidemiology to human sociology W Casey, SE Massey, B Mishra Journal of the Royal Society Interface 18 (175), 20200689, 2021 | 12 | 2021 |
Visualizing a malware distribution network S Peryt, JA Morales, W Casey, A Volkmann, B Mishra, Y Cai 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016 | 12 | 2016 |
Placing probes along the genome using pairwise distance data W Casey, B Mishra, M Wigler Algorithms in Bioinformatics: First International Workshop, WABI 2001 Århus …, 2001 | 12 | 2001 |
System, method and computer-accessible medium for deterrence of malware W Casey, B Mishra US Patent 10,666,677, 2020 | 7 | 2020 |
Identity deception and game deterrence via signaling games W Casey, P Memarmoshrefi, A Kellner, JA Morales, B Mishra Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016 | 6 | 2016 |
Threats from Inside: Dynamic Utility (Mis) Alignments in an Agent based Model. W Casey, JA Morales, B Mishra J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (1), 97-117, 2016 | 6 | 2016 |