Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,578,803 papers from all fields of science
Search
Sign In
Create Free Account
William Cheswick
Known as:
Bill Cheswick
, Cheswick
William R. "Bill" Cheswick (also known as "Ches") is a computer security and networking researcher.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
COMPASS
Chroot
Firewall (computing)
Firewalls and Internet Security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Characterization of Particulate Matter (PM2.5 and PM10) Relating to a Coal Power Plant in the Boroughs of Springdale and Cheswick, PA
C. Bray
,
W. Battye
,
Pornpan Uttamang
,
Priya Pillai
,
V. Aneja
2017
Corpus ID: 20080657
Ambient concentrations of both fine particulate matter (PM2.5) and particulate matter with an aerodynamic diameter less than 10…
Expand
2015
2015
Bell v. Cheswick: The Era of Court-Regulated Power Plants
I. Pfister
2015
Corpus ID: 131607924
Bell v. Cheswick was a 2012 class action suit brought against GenOn Power Midwest, L.P. in the U.S. District Court for the…
Expand
2014
2014
Bell v. Cheswick and What the Clean Air Act's Savings Clause Means for Fenceline Communities
Eric Anthony DeBellis
2014
Corpus ID: 126436645
Under the doctrine of conflict preemption, courts disallow common law tort claims that would interfere with federal regulatory…
Expand
2013
2013
Bill Cheswick on firewalls
Rik Farrow
,
B. Cheswick
2013
Corpus ID: 185589418
2008
2008
Betwixt and between Recognition: Migrating-Same-Sex Marriages and the Turn Toward the Private
B. Cossman
2008
Corpus ID: 142445070
The paper explores migrating same sex marriages - that is, same-sex marriages or civil unions entered in one jurisdiction that…
Expand
Review
2005
Review
2005
Proceedings of the 2005 symposium on Usable privacy and security
L. Cranor
2005
Corpus ID: 62368216
Welcome to the Symposium On Usable Privacy and Security! This inaugural event brings together an interdisciplinary group of…
Expand
Review
2003
Review
2003
Security architectures for network clients
Victoria Skoularidou
,
D. Spinellis
Information Management & Computer Security
2003
Corpus ID: 15138753
Enumerates and compares a number of security‐enabling architectures for network clients. These architectures, either proposed as…
Expand
2003
2003
Bacon ice cream: The best mix of proactive and reactive security?
B. Cheswick
,
P. Kocher
,
G. McGraw
,
A. Rubin
IEEE Security & Privacy Magazine
2003
Corpus ID: 2228488
Bill Cheswick (Lumeta), Paul Kocher (Cryptography Research), Gary McGraw (Cigital), and Avi Rubin (Johns Hopkins) gave a panel…
Expand
1993
1993
Dapp, a method for tailpipe noise prediction and its use within the Cheswick NVH methodology
R. Willats
1993
Corpus ID: 114838627
Review
1984
Review
1984
Decontamination and decommissioning of the Westinghouse nuclear fuel facility at Cheswick, PA. Volume 1 of 2
J. Denero
,
R. Lange
,
M. L. Ray
,
J. Shoulders
,
H. Woodsum
1984
Corpus ID: 108985221
This report documents the efforts associated with the decontamination and decommissioning of the Westinghouse Nuclear Fuel…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE