![]() | ![]() |
2006 | ||
---|---|---|
6 | EE | William H. Allen, Chin Dou, Gerald A. Marin: A Model-based Approach to the Security Testing of Network Protocol Implementations. LCN 2006: 1008-1015 |
5 | EE | Gerald A. Marin, William H. Allen: Needles in Haystacks: Practical Intrusion Detection from Theoretical Results. LCN 2006: 571-573 |
2005 | ||
4 | William H. Allen, Gareth Farrington: A Peer-to-Peer System for Small Group Collaboration. Web Technologies, Applications, and Services 2005: 123-128 | |
3 | EE | William H. Allen: Computer Forensics. IEEE Security & Privacy 3(4): 59-62 (2005) |
2004 | ||
2 | EE | William H. Allen, Gerald A. Marin: MAGNA: Modeling And Generating Network Attacks. LCN 2004: 423-424 |
2003 | ||
1 | EE | William H. Allen, Gerald A. Marin: On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems. SAINT 2003: 242-248 |
1 | Chin Dou | [6] |
2 | Gareth Farrington | [4] |
3 | Gerald A. Marin | [1] [2] [5] [6] |