Follow
William Mahoney
Title
Cited by
Cited by
Year
Dimensions of cyber-attacks: Cultural, social, economic, and political
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 30 (1), 28-38, 2011
2162011
Social, Political, Economic, and Cultural
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 1932 (4529/11), 2011
362011
Knock! knock! who is there? investigating data leakage from a medical internet of things hijacking attack
T Flynn, G Grispos, W Glisson, W Mahoney
302020
Comparing the effectiveness of commercial obfuscators against MATE attacks
R Manikyam, JT McDonald, WR Mahoney, TR Andel, SH Russ
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
302016
An integrated framework for control system simulation and regulatory compliance monitoring
W Mahoney, RA Gandhi
International Journal of Critical Infrastructure Protection 4 (1), 41-53, 2011
292011
Building a social dimensional threat model from current and historic events of cyber attacks
AC Sharma, RA Gandhi, W Mahoney, W Sousan, Q Zhu
2010 IEEE Second International Conference on Social Computing, 981-986, 2010
212010
Authentication bypass and remote escalated I/O command attacks
R Grandgenett, W Mahoney, R Gandhi
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
192015
Exploitation of Allen Bradley’s implementation of EtherNet/IP for denial of service against industrial control systems
R Grandgenett, R Gandhi, W Mahoney
9th International Conference on Cyber Warfare and Security 2014, 58-65, 2014
162014
Blast your way through malware malware analysis assisted by bioinformatics tools
J Pedersen, D Bastola, K Dick, R Gandhi, W Mahoney
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
112012
A machine-learning based framework for detection of fake political speech
C Purevdagva, R Zhao, PC Huang, W Mahoney
2020 IEEE 14th International Conference on Big Data Science and Engineering …, 2020
82020
Leave it to Weaver
W Mahoney, J Franco, G Hoff, JT McDonald
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
82018
Scada threats in the modern airport
J McCarthy, W Mahoney
International Journal of Cyber Warfare and Terrorism (IJCWT) 3 (4), 32-39, 2013
82013
A coherent measurement of web-search relevance
WR Mahoney, P Hospodka, W Sousan, R Nickell, Q Zhu
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2009
82009
Privacy preserving computations using implicit security
A Parakh, W Mahoney
2013 22nd International Conference on Computer Communication and Networks …, 2013
72013
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference
A Sharma, R Gandhi, Q Zhu, WR Mahoney, W Sousan
International Journal of Information and Computer Security 5 (4), 301-333, 2013
72013
Cyber-sophistication assessment methodology for public-facing terrorist web sites
DC Derrick, GS Ligon, M Harms, W Mahoney
Journal of Information Warfare 16 (1), 13-30, 2017
62017
Reverse engineering: is it art?
W Mahoney, RA Gandhi
ACM Inroads 3 (1), 56-61, 2012
62012
Teaching compiler code generation: simpler is better
W Mahoney, J Pedersen
ACM SIGCSE Bulletin 41 (4), 30-34, 2010
62010
A freshman level course on information assurance: can it be done? here's how
R Gandhi, C Jones, W Mahoney
ACM Inroads 3 (3), 50-61, 2012
52012
IDEA: A new intrusion detection data source
W Mahoney, W Sousan
2008 International Conference on Information Security and Assurance (isa …, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20