Dimensions of cyber-attacks: Cultural, social, economic, and political R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante IEEE Technology and Society Magazine 30 (1), 28-38, 2011 | 218 | 2011 |
Social, Political, Economic, and Cultural R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante IEEE Technology and Society Magazine 1932 (4529/11), 2011 | 36 | 2011 |
Knock! knock! who is there? investigating data leakage from a medical internet of things hijacking attack T Flynn, G Grispos, W Glisson, W Mahoney | 30 | 2020 |
Comparing the effectiveness of commercial obfuscators against MATE attacks R Manikyam, JT McDonald, WR Mahoney, TR Andel, SH Russ Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016 | 30 | 2016 |
An integrated framework for control system simulation and regulatory compliance monitoring W Mahoney, RA Gandhi International Journal of Critical Infrastructure Protection 4 (1), 41-53, 2011 | 29 | 2011 |
Building a social dimensional threat model from current and historic events of cyber attacks AC Sharma, RA Gandhi, W Mahoney, W Sousan, Q Zhu 2010 IEEE Second International Conference on Social Computing, 981-986, 2010 | 21 | 2010 |
Authentication bypass and remote escalated I/O command attacks R Grandgenett, W Mahoney, R Gandhi Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 19 | 2015 |
Exploitation of Allen Bradley’s implementation of EtherNet/IP for denial of service against industrial control systems R Grandgenett, R Gandhi, W Mahoney 9th International Conference on Cyber Warfare and Security 2014, 58-65, 2014 | 16 | 2014 |
Blast your way through malware malware analysis assisted by bioinformatics tools J Pedersen, D Bastola, K Dick, R Gandhi, W Mahoney Proceedings of the International Conference on Security and Management (SAM), 1, 2012 | 11 | 2012 |
A machine-learning based framework for detection of fake political speech C Purevdagva, R Zhao, PC Huang, W Mahoney 2020 IEEE 14th International Conference on Big Data Science and Engineering …, 2020 | 8 | 2020 |
Leave it to Weaver W Mahoney, J Franco, G Hoff, JT McDonald Proceedings of the 8th Software Security, Protection, and Reverse …, 2018 | 8 | 2018 |
Scada threats in the modern airport J McCarthy, W Mahoney International Journal of Cyber Warfare and Terrorism (IJCWT) 3 (4), 32-39, 2013 | 8 | 2013 |
A coherent measurement of web-search relevance WR Mahoney, P Hospodka, W Sousan, R Nickell, Q Zhu IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2009 | 8 | 2009 |
Privacy preserving computations using implicit security A Parakh, W Mahoney 2013 22nd International Conference on Computer Communication and Networks …, 2013 | 7 | 2013 |
A social dimensional cyber threat model with formal concept analysis and fact-proposition inference A Sharma, R Gandhi, Q Zhu, WR Mahoney, W Sousan International Journal of Information and Computer Security 5 (4), 301-333, 2013 | 7 | 2013 |
Cyber-sophistication assessment methodology for public-facing terrorist web sites DC Derrick, GS Ligon, M Harms, W Mahoney Journal of Information Warfare 16 (1), 13-30, 2017 | 6 | 2017 |
Reverse engineering: is it art? W Mahoney, RA Gandhi ACM Inroads 3 (1), 56-61, 2012 | 6 | 2012 |
Teaching compiler code generation: simpler is better W Mahoney, J Pedersen ACM SIGCSE Bulletin 41 (4), 30-34, 2010 | 6 | 2010 |
A freshman level course on information assurance: can it be done? here's how R Gandhi, C Jones, W Mahoney ACM Inroads 3 (3), 50-61, 2012 | 5 | 2012 |
IDEA: A new intrusion detection data source W Mahoney, W Sousan 2008 International Conference on Information Security and Assurance (isa …, 2008 | 5 | 2008 |