default search action
William Mahoney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i3]George Grispos, William R. Mahoney:
Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry. CoRR abs/2208.03607 (2022) - 2021
- [c14]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. TrustCom 2021: 710-717 - [d1]Sankalp Gilda, Stark C. Draper, Sebastien Fabbro, William Mahoney, Simon Prunet, Kanoa Withington, Matthew Wilson, Yuan-Sen Ting, Andrew Sheinis:
Dataset used in "Uncertainty-Aware Learning for Improvements in Image Quality of the Canada-France-Hawaii Telescope" (https://arxiv.org/abs/2107.00048). Zenodo, 2021 - [i2]Sankalp Gilda, Stark C. Draper, Sebastien Fabbro, William Mahoney, Simon Prunet, Kanoa Withington, Matthew Wilson, Yuan-Sen Ting, Andrew Sheinis:
Uncertainty-Aware Learning for Improvements in Image Quality of the Canada-France-Hawaii Telescope. CoRR abs/2107.00048 (2021) - [i1]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. CoRR abs/2109.05518 (2021) - 2020
- [c13]Chinguun Purevdagva, Rui Zhao, Pei-Chi Huang, William Mahoney:
A machine-learning based framework for detection of fake political speech. BigDataSE 2020: 80-87 - [c12]Talon Flynn, George Grispos, William Bradley Glisson, William Mahoney:
Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack. HICSS 2020: 1-10
2010 – 2019
- 2018
- [c11]William Mahoney, Joseph Franco, Greg Hoff, Jeffrey Todd McDonald:
Leave It to Weaver. SSPREW@ACSAC 2018: 6:1-6:9 - 2016
- [c10]Ramya Manikyam, Jeffrey Todd McDonald, William R. Mahoney, Todd R. Andel, Samuel H. Russ:
Comparing the effectiveness of commercial obfuscators against MATE attacks. SSPREW@ACSAC 2016: 8:1-8:11 - 2015
- [j11]William R. Mahoney:
Modifications to GCC for increased software privacy. Int. J. Inf. Comput. Secur. 7(2/3/4): 160-176 (2015) - [c9]Ryan Grandgenett, William R. Mahoney, Robin A. Gandhi:
Authentication Bypass and Remote Escalated I/O Command Attacks. CISR 2015: 2:1-2:7 - [c8]William Mahoney, Abhishek Parakh:
Towards a New Quasigroup Block Cipher for a Single-Chip FPGA Implementation. ICCCN 2015: 1-6 - 2014
- [c7]William Mahoney, Abhishek Parakh, Matthew Battey:
Hardware Implementation of Quasigroup Encryption for SCADA Networks. NCA 2014: 301-305 - 2013
- [j10]John McCarthy, William Mahoney:
SCADA Threats in the Modern Airport. Int. J. Cyber Warf. Terror. 3(4): 32-39 (2013) - [j9]Anup C. Sharma, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney, William L. Sousan:
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference. Int. J. Inf. Comput. Secur. 5(4): 301-333 (2013) - [c6]Abhishek Parakh, William Mahoney:
Privacy Preserving Computations Using Implicit Security. ICCCN 2013: 1-6 - 2012
- [j8]William R. Mahoney, Robin A. Gandhi:
Reverse engineering: is it art?. Inroads 3(1): 56-61 (2012) - [j7]Robin A. Gandhi, Connie Jones, William R. Mahoney:
A freshman level course on information assurance: can it be done? here's how. Inroads 3(3): 50-61 (2012) - 2011
- [j6]William R. Mahoney, Robin A. Gandhi:
An integrated framework for control system simulation and regulatory compliance monitoring. Int. J. Crit. Infrastructure Prot. 4(1): 41-53 (2011) - [j5]Robin A. Gandhi, Anup C. Sharma, William R. Mahoney, William L. Sousan, Qiuming Zhu, Phillip A. Laplante:
Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political. IEEE Technol. Soc. Mag. 30(1): 28-38 (2011) - [c5]William L. Sousan, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney:
Using anomalous event patterns in control systems for tamper detection. CSIIRW 2011: 26 - 2010
- [c4]Brett Walenz, Robin A. Gandhi, William R. Mahoney, Qiuming Zhu:
Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities. SocialCom/PASSAT 2010: 508-512 - [c3]William L. Sousan, Qiuming Zhu, Robin A. Gandhi, William R. Mahoney, Anup C. Sharma:
Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence. SocialCom/PASSAT 2010: 967-972 - [c2]Anup C. Sharma, Robin A. Gandhi, William R. Mahoney, William L. Sousan, Qiuming Zhu:
Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks. SocialCom/PASSAT 2010: 981-986
2000 – 2009
- 2009
- [j4]William Mahoney, Jay Pedersen:
Teaching compiler code generation: simpler is better. ACM SIGCSE Bull. 41(4): 30-34 (2009) - [j3]William R. Mahoney, Peter Hospodka, William L. Sousan, Ryan Nickell, Qiuming Zhu:
A Coherent Measurement of Web-Search Relevance. IEEE Trans. Syst. Man Cybern. Part A 39(6): 1176-1187 (2009) - 2007
- [j2]William R. Mahoney, William L. Sousan:
Using common off-the-shelf tools to implement dynamic aspects. ACM SIGPLAN Notices 42(2): 34-41 (2007) - [c1]William R. Mahoney, William L. Sousan:
Instrumentation of Open-Source Software for Intrusion Detection. RV 2007: 151-163
1990 – 1999
- 1998
- [j1]Paul F. Hultquist, William R. Mahoney:
Using Simulation to Solve a Conveyor System Controller Design Problem. Simul. 71(1): 31-37 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint