Robert J. Walls
Robert J. Walls
Worcester Polytechnic University
Geverifieerd e-mailadres voor wpi.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Building an Ontology of Cyber Security
A Oltramari, LF Cranor, RJ Walls, P McDaniel
Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense …, 2014
892014
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
782016
Forensic Triage for Mobile Phones with DEC0DE.
RJ Walls, EG Learned-Miller, BN Levine
USENIX Security Symposium, 2011
542011
Malware traffic detection using tamper resistant features
ZB Celik, RJ Walls, P McDaniel, A Swami
MILCOM 2015-2015 IEEE Military Communications Conference, 330-335, 2015
512015
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
R Walls
Computer Science & Engineering, 2009
502009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
452013
Measuring the impact and perception of acceptable advertisements
RJ Walls, ED Kilmer, N Lageman, PD McDaniel
Proceedings of the 2015 Internet Measurement Conference, 107-120, 2015
382015
Effective Digital Forensics Research Is Investigator-Centric.
RJ Walls, BN Levine, M Liberatore, C Shields
HotSec, 2011
332011
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
222019
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
172014
Confidential deep learning: Executing proprietary models on untrusted devices
PM VanNostrand, I Kyriazis, M Cheng, T Guo, RJ Walls
arXiv preprint arXiv:1908.10730, 2019
152019
A cyber-physical approach to trustworthy operation of health monitoring systems
KK Venkatasubramanian, A Banerjee, SKS Gupta, RJ Walls
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
152017
Computational Ontology of Network Operations
A Oltramari, L Cranor, RJ Walls, P McDaniel
MILCOM 2015, 2015
142015
Single Reflection Spatial Voting: A novel method for discovering reflective surfaces using indoor positioning systems
RK Harle, A Ward, A Hopper
Proceedings of the 1st international conference on Mobile systems …, 2003
132003
Discovering Specification Violations in Networked Software Systems
RJ Walls, Y Brun, M Liberatore, BN Levine
Proceedings of the 26th IEEE International Symposium on Software Reliability …, 2015
122015
BinDNN: Resilient Function Matching Using Deep Learning
N Lageman, ED Kilmer, RJ Walls, PD McDaniel
International Conference on Security and Privacy in Communication Systems …, 2016
92016
Data-free model extraction
JB Truong, P Maini, RJ Walls, N Papernot
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
82021
Efficient smart phone forensics based on relevance feedback
S Varma, RJ Walls, B Lynn, BN Levine
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
72014
Inference-based forensics for extracting information from diverse sources
RJ Walls
72014
Functional Privacy or Why Cookies are Better with Milk
RJ Walls, SS Clark, BN Levine
Proc. USENIX Workshop on Hot Topics in Security., 2012
72012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20