Remote collection of computer forensic evidence FN Adelstein, MA Stillerman, R Joyce US Patent 7,496,959, 2009 | 240 | 2009 |
Software assurance system for runtime environments RA Joyce, MP Donovan US Patent 10,558,809, 2020 | 114 | 2020 |
Temporal segmentation of video using frame and histogram space RA Joyce, B Liu IEEE Transactions on multimedia 8 (1), 130-140, 2006 | 97 | 2006 |
Dynamic network resource allocation using multimedia content features and traffic features M Wu, RA Joyce, A Vetro, HS Wong, L Guan, SY Kung US Patent 6,947,378, 2005 | 92 | 2005 |
Scalable distributed processing of RDF data MA Stillerman, RA Joyce US Patent 8,756,237, 2014 | 90 | 2014 |
Dynamic resource allocation via video content and short-term traffic statistics M Wu, RA Joyce, HS Wong, L Guan, SY Kung IEEE Transactions on Multimedia 3 (2), 186-199, 2001 | 84 | 2001 |
Fight-through nodes with disposable virtual machines and rollback of persistent state J Powers, SK Brueckner, RA Joyce, KJ Thurber US Patent 9,769,250, 2017 | 59 | 2017 |
Cybersecurity and threat assessment platform for computing environments C Dominessy, S Aloisio, RA Joyce US Patent 10,868,825, 2020 | 53 | 2020 |
Extensible software tool for investigating peer-to-peer usage on a target device FN Adelstein, J Powers, RA Joyce, D Bronner US Patent 7,886,049, 2011 | 48 | 2011 |
Configurable investigative tool DP Bronner, RA Joyce, MP Donovan, JA Baker US Patent 10,057,298, 2018 | 44 | 2018 |
Configurable forensic investigative tool DP Bronner, RA Joyce, MP Donovan, JA Baker US Patent 10,067,787, 2018 | 43 | 2018 |
Fight-through nodes with disposable virtual machines and rollback of persistent state SK Brueckner, RA Joyce, C Manson, H Inoue, KJ Thurber US Patent 8,839,426, 2014 | 43 | 2014 |
Visualization in testing a volatile memory forensic tool H Inoue, F Adelstein, RA Joyce Digital Investigation 8, S42-S51, 2011 | 43 | 2011 |
Physically locating wireless intruders F Adelstein, P Alla, R Joyce, GG Richard International Conference on Information Technology: Coding and Computing …, 2004 | 40 | 2004 |
Systems and methods for improving the ranking and prioritization of attack-related events S Aloisio, R Joyce, J Powers US Patent 10,749,890, 2020 | 31 | 2020 |
Service oriented architecture version and dependency control DJ Tingstrom, RA Joyce, MA Stillerman, SK Brueckner, HY Bar US Patent 8,898,285, 2014 | 29 | 2014 |
Remote collection of computer forensic evidence FN Adelstein, MA Stillerman, RA Joyce US Patent 8,474,047, 2013 | 29 | 2013 |
MEGA: A tool for Mac OS X operating system and application forensics RA Joyce, J Powers, F Adelstein digital investigation 5, S83-S90, 2008 | 25 | 2008 |
Systems and methods for unified hierarchical cybersecurity R Joyce, S Aloisio US Patent 11,128,654, 2021 | 22 | 2021 |
Lightweight application virtualization architecture J Powers, RA Joyce US Patent 9,501,304, 2016 | 20 | 2016 |