Robert J. Walls
Robert J. Walls
Worcester Polytechnic University
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Building an Ontology of Cyber Security
A Oltramari, LF Cranor, RJ Walls, P McDaniel
Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense …, 2014
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
Forensic Triage for Mobile Phones with DEC0DE.
RJ Walls, EG Learned-Miller, BN Levine
USENIX Security Symposium, 2011
Malware traffic detection using tamper resistant features
ZB Celik, RJ Walls, P McDaniel, A Swami
MILCOM 2015-2015 IEEE Military Communications Conference, 330-335, 2015
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
R Walls
Computer Science & Engineering, 2009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Measuring the impact and perception of acceptable advertisements
RJ Walls, ED Kilmer, N Lageman, PD McDaniel
Proceedings of the 2015 Internet Measurement Conference, 107-120, 2015
Effective Digital Forensics Research Is Investigator-Centric.
RJ Walls, BN Levine, M Liberatore, C Shields
HotSec, 2011
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
Confidential deep learning: Executing proprietary models on untrusted devices
PM VanNostrand, I Kyriazis, M Cheng, T Guo, RJ Walls
arXiv preprint arXiv:1908.10730, 2019
A cyber-physical approach to trustworthy operation of health monitoring systems
KK Venkatasubramanian, A Banerjee, SKS Gupta, RJ Walls
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
Computational Ontology of Network Operations
A Oltramari, L Cranor, RJ Walls, P McDaniel
MILCOM 2015, 2015
Single Reflection Spatial Voting: A novel method for discovering reflective surfaces using indoor positioning systems
RK Harle, A Ward, A Hopper
Proceedings of the 1st international conference on Mobile systems …, 2003
Discovering Specification Violations in Networked Software Systems
RJ Walls, Y Brun, M Liberatore, BN Levine
Proceedings of the 26th IEEE International Symposium on Software Reliability …, 2015
BinDNN: Resilient Function Matching Using Deep Learning
N Lageman, ED Kilmer, RJ Walls, PD McDaniel
International Conference on Security and Privacy in Communication Systems …, 2016
Data-free model extraction
JB Truong, P Maini, RJ Walls, N Papernot
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
Efficient smart phone forensics based on relevance feedback
S Varma, RJ Walls, B Lynn, BN Levine
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Inference-based forensics for extracting information from diverse sources
RJ Walls
Functional Privacy or Why Cookies are Better with Milk
RJ Walls, SS Clark, BN Levine
Proc. USENIX Workshop on Hot Topics in Security., 2012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20