![]() |
| 2006 | ||
|---|---|---|
| 6 | EE | William H. Allen, Chin Dou, Gerald A. Marin: A Model-based Approach to the Security Testing of Network Protocol Implementations. LCN 2006: 1008-1015 |
| 5 | EE | Gerald A. Marin, William H. Allen: Needles in Haystacks: Practical Intrusion Detection from Theoretical Results. LCN 2006: 571-573 |
| 2005 | ||
| 4 | William H. Allen, Gareth Farrington: A Peer-to-Peer System for Small Group Collaboration. Web Technologies, Applications, and Services 2005: 123-128 | |
| 3 | EE | William H. Allen: Computer Forensics. IEEE Security & Privacy 3(4): 59-62 (2005) |
| 2004 | ||
| 2 | EE | William H. Allen, Gerald A. Marin: MAGNA: Modeling And Generating Network Attacks. LCN 2004: 423-424 |
| 2003 | ||
| 1 | EE | William H. Allen, Gerald A. Marin: On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems. SAINT 2003: 242-248 |
| 1 | Chin Dou | [6] |
| 2 | Gareth Farrington | [4] |
| 3 | Gerald A. Marin | [1] [2] [5] [6] |