MENU
Sky View Through an Archway on Campus

Editing Help

Please reference the Faculty Profile Editing Guide if you have any questions or issues updating your profile. If you receive any error notices please contact webservices@fit.edu.

Educational Background

B.S. University of Central Florida 1992
M.S. University of Central Florida 1995
Ph.D. University of Central Florida 2003

Professional Experience

Dr. Allen is currently an Emeritus Professor at the Florida Institute of Technology.

He served as an Assistant Professor in the Computer Sciences Department from 2003 to 2010 and as Associate Professor of Computer Science from 2010 to 2022. During that time, he taught a range of courses covering programming, computer systems and computer security.  He served as the major advisor for 12 PhD students who went on to successful careers in academia, government and industry.

Selected Publications

Ahmed Alhazmi, Ghassen Kilani, William Allen, TJ OConnor,"A replication study for iot privacy preferences", 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS)

Raed Alharbi, William H Allen, "Collection and Analysis of Digital Forensic Data from Devices in the Internet of Things", IEEE SoutheastCon, 2019

Basman M Hasan Alhafidh, Amar I Daood, William H Allen, "Comparison of classifiers for prediction of human actions in a smart home", 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)

Basman M. Hasan Alhafidh, William H. Allen, “High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling”, in Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), June 2017

Badr Alshehry, William H. Allen, “Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments”, in Proceedings of the 4th International Conference on Applied Computing & Information Technology, December 2016

Yasser M. Hausawi, William H. Allen, “Usable-Security Evaluation”, in Proceedings of the 17th International Conference on Human-Computer Interaction, page 335-346, June 2015

Yasser M. Hausawi, William H. Allen, Gisela Susanne Bahr, “Choice-Based Authentication: A Usable-Security Approach”, in Proceedings of the 16th International Conference on Human-Computer Interaction, June 2014

Ahmed Al-Hamadani and William H. Allen, “RAAODV: a Reputation-Aware AODV for Mobile Ad hoc Networks”, in Proceedings of the 52nd ACM Southeast Conference, March 2014

Gisela Susanne Bahr, William H. Allen, “Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks”, in Proceedings of the 15th International Conference on Human-Computer Interaction, July 2013

Tauhida Parveen, Scott Tilley, William Allen, Gerald A. Marin, Richard Ford, “Detecting Emulated Environments”, in the International Journal of Software Engineering and Knowledge Engineering, vol. 22, no. 7, November 2012

Abdulaziz Alkussayer, William H. Allen, “Security Risk Analysis of Software Architecture Based on AHP”, in Proceedings of the 7th International Conference on Networked Computing, September 2011

Fredric M. Ham, Eyosias Yoseph Imana, William H. Allen, and Richard Ford, “Information-Theoretic Bounds on Security Overhead in Mobile Ad Hoc Networks” in Proceedings of the SPIE Defense, Security, and Sensing Conference, April 2010

Abdulaziz Alkussayer, William H. Allen, "Towards Automatic Security Scenario Generation", in Proceedings of the ACM Computer and Communications Security Conference, 2009

Richard Ford, William Allen, Katherine Hoffman, Attila Ondi, Marco Carvalho, "Generic Danger Detection for Mission Continuity, in Proceedings of the IEEE International Symposium on Network Computing and Applications, 2009

Tauhida Parveen, William Allen, Scott Tilley, Gerald Marin and Richard Ford, "Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls", in Proceedings of the 20th International Conference on Software Engineering and Knowledge Engineering, 2008

William Allen, Richard Ford, Jens Gregor, Gerald Marin, Mike Thomason, James Whittaker, book chapter: "Behavioral Detection of Malicious Code", in Information Security Research: New Methods for Protecting Against Cyber Threats, Ralph Wachter and Gary Toth, Editors, Wiley Publishing, 2007

William H. Allen, Chin Dou, and Gerald A. Marin, “A Model-Based Approach to the Security Testing of Network Protocol Implementations”, in Proceedings of the IEEE Local Computer Networks Workshop on Network Security, November 2006

William H. Allen, "Computer Forensics", IEEE Security and Privacy, vol. 03, no. 4, July/August 2005

William H. Allen and Gerald A. Marin, "On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems", in Proceedings of the IEEE Symposium on Applications of the Internet (SAINT 03), January 2003

Research

Balancing usability with security and privacy

Forensic analysis of digital data

Improving software design methodologies to develop more secure software.

Edit Page