search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
William Casey
William Casey
William Casey is an SEI alumni employee.
All
Tech Publications
Blog Posts
Compliance Signaling Games: Toward Modeling the Deterrence of Insider Threats
April 8, 2016
•
Article
By
William Casey
,
Jose A. Morales
,
Evan Wright
,
Quanyan Zhu (New York University)
,
Bud Mishra (New York University)
What Ant Colonies Can Teach Us About Securing the Internet
April 4, 2016
•
Blog Post
By
William Casey
Cyber Security via Signaling Games Poster (SEI 2015 Research Review)
October 22, 2015
•
Poster
By
William Casey
Cybersecurity via Signaling Games
October 16, 2015
•
Presentation
By
William Casey
Provenance Inference in Software
February 3, 2014
•
Blog Post
By
William Casey
More from William Casey
Cyber Security via Signaling Games Poster (SEI 2015 Research Review)
October 22, 2015
•
Poster
By
William Casey
Results of SEI Line-Funded Exploratory New Starts Projects
August 1, 2012
•
Technical Report
By
Len Bass
,
Nanette Brown
,
Gene Cahill
,
William Casey
,
Sagar Chaki
,
Cory Cohen
,
Dionisio de Niz
,
David French
,
Arie Gurfinkel
,
Rick Kazman
,
Edwin J. Morris
,
Brad Myers
,
Bill Nichols
,
Robert Nord
,
Ipek Ozkaya
,
Raghvinder Sangwan
,
Soumya Simanta
,
Ofer Strichman
,
Peppo Valetto
More from William Casey
What Ant Colonies Can Teach Us About Securing the Internet
April 4, 2016
•
Blog Post
By
William Casey
Provenance Inference in Software
February 3, 2014
•
Blog Post
By
William Casey
Deterrence for Malware: Towards a Deception-Free Internet
September 23, 2013
•
Blog Post
By
William Casey
Modeling Malware with Suffix Trees
January 9, 2012
•
Blog Post
By
William Casey
A New Approach to Modeling Malware using Sparse Representation
March 21, 2011
•
Blog Post
By
William Casey
More from William Casey