Allen, William
William Allen
Emeritus Faculty | College of Engineering and Science - Electrical Engineering and Computer Science
Educational Background
B.S. University of Central Florida 1992
M.S. University of Central Florida 1995
Ph.D. University of Central Florida 2003
Professional Experience
Dr. Allen is currently an Emeritus Professor at the 澳门100%最准一肖一码.
He served as an Assistant Professor in the Computer Sciences Department from 2003 to 2010 and as Associate Professor of Computer Science from 2010 to 2022. During that time, he taught a range of courses covering programming, computer systems and computer security. He served as the major advisor for 12 PhD students who went on to successful careers in academia, government and industry.
Selected Publications
Ahmed Alhazmi, Ghassen Kilani, William Allen, TJ OConnor,"A replication study for iot privacy preferences", 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)
Raed Alharbi, William H Allen, "Collection and Analysis of Digital Forensic Data from Devices in the Internet of Things", IEEE SoutheastCon, 2019
Basman M Hasan Alhafidh, Amar I Daood, William H Allen, "Comparison of classifiers for prediction of human actions in a smart home", 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)
Basman M. Hasan Alhafidh, William H. Allen, 鈥淗igh Level Design of a Home Autonomous System Based on Cyber Physical System Modeling鈥, in Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), June 2017
Badr Alshehry, William H. Allen, 鈥淧roactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments鈥, in Proceedings of the 4th International Conference on Applied Computing & Information Technology, December 2016
Yasser M. Hausawi, William H. Allen, 鈥淯sable-Security Evaluation鈥, in Proceedings of the 17th International Conference on Human-Computer Interaction, page 335-346, June 2015
Yasser M. Hausawi, William H. Allen, Gisela Susanne Bahr, 鈥淐hoice-Based Authentication: A Usable-Security Approach鈥, in Proceedings of the 16th International Conference on Human-Computer Interaction, June 2014
Ahmed Al-Hamadani and William H. Allen, 鈥淩AAODV: a Reputation-Aware AODV for Mobile Ad hoc Networks鈥, in Proceedings of the 52nd ACM Southeast Conference, March 2014
Gisela Susanne Bahr, William H. Allen, 鈥淩ational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks鈥, in Proceedings of the 15th International Conference on Human-Computer Interaction, July 2013
Tauhida Parveen, Scott Tilley, William Allen, Gerald A. Marin, Richard Ford, 鈥淒etecting Emulated Environments鈥, in the International Journal of Software Engineering and Knowledge Engineering, vol. 22, no. 7, November 2012
Abdulaziz Alkussayer, William H. Allen, 鈥淪ecurity Risk Analysis of Software Architecture Based on AHP鈥, in Proceedings of the 7th International Conference on Networked Computing, September 2011
Fredric M. Ham, Eyosias Yoseph Imana, William H. Allen, and Richard Ford, 鈥淚nformation-Theoretic Bounds on Security Overhead in Mobile Ad Hoc Networks鈥 in Proceedings of the SPIE Defense, Security, and Sensing Conference, April 2010
Abdulaziz Alkussayer, William H. Allen, "Towards Automatic Security Scenario Generation", in Proceedings of the ACM Computer and Communications Security Conference, 2009
Richard Ford, William Allen, Katherine Hoffman, Attila Ondi, Marco Carvalho, "Generic Danger Detection for Mission Continuity, in Proceedings of the IEEE International Symposium on Network Computing and Applications, 2009
Tauhida Parveen, William Allen, Scott Tilley, Gerald Marin and Richard Ford, "Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls", in Proceedings of the 20th International Conference on Software Engineering and Knowledge Engineering, 2008
William Allen, Richard Ford, Jens Gregor, Gerald Marin, Mike Thomason, James Whittaker, book chapter: "Behavioral Detection of Malicious Code", in Information Security Research: New Methods for Protecting Against Cyber Threats, Ralph Wachter and Gary Toth, Editors, Wiley Publishing, 2007
William H. Allen, Chin Dou, and Gerald A. Marin, 鈥淎 Model-Based Approach to the Security Testing of Network Protocol Implementations鈥, in Proceedings of the IEEE Local Computer Networks Workshop on Network Security, November 2006
William H. Allen, "Computer Forensics", IEEE Security and Privacy, vol. 03, no. 4, July/August 2005
William H. Allen and Gerald A. Marin, "On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems", in Proceedings of the IEEE Symposium on Applications of the Internet (SAINT 03), January 2003
Research
Balancing usability with security and privacy
Forensic analysis of digital data
Improving software design methodologies to develop more secure software.