Robert J. Walls
Cited by
Cited by
Building an Ontology of Cyber Security
A Oltramari, LF Cranor, RJ Walls, P McDaniel
Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense …, 2014
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE symposium on security and privacy (SP), 691-706, 2016
Malware traffic detection using tamper resistant features
ZB Celik, RJ Walls, P McDaniel, A Swami
MILCOM 2015-2015 IEEE Military Communications Conference, 330-335, 2015
Data-free model extraction
JB Truong, P Maini, RJ Walls, N Papernot
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
Forensic Triage for Mobile Phones with DEC0DE.
RJ Walls, EG Learned-Miller, BN Levine
USENIX Security Symposium, 2011
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
R Walls
Computer Science & Engineering, 2009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Measuring the impact and perception of acceptable advertisements
RJ Walls, ED Kilmer, N Lageman, PD McDaniel
Proceedings of the 2015 Internet Measurement Conference, 107-120, 2015
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
Effective Digital Forensics Research Is Investigator-Centric.
RJ Walls, BN Levine, M Liberatore, C Shields
HotSec, 2011
Silhouette: Efficient protected shadow stacks for embedded systems
J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls
Proceedings of the 29th USENIX Conference on Security Symposium, 1219-1236, 2020
A cyber-physical approach to trustworthy operation of health monitoring systems
KK Venkatasubramanian, A Banerjee, SKS Gupta, RJ Walls
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
Confidential deep learning: Executing proprietary models on untrusted devices
PM VanNostrand, I Kyriazis, M Cheng, T Guo, RJ Walls
arXiv preprint arXiv:1908.10730, 2019
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
Computational Ontology of Network Operations
A Oltramari, L Cranor, RJ Walls, P McDaniel
MILCOM 2015, 2015
Characterizing and modeling distributed training with transient cloud gpu servers
S Li, RJ Walls, T Guo
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
Speeding up deep learning with transient servers
S Li, RJ Walls, L Xu, T Guo
2019 IEEE International Conference on Autonomic Computing (ICAC), 125-135, 2019
Discovering Specification Violations in Networked Software Systems
RJ Walls, Y Brun, M Liberatore, BN Levine
Proceedings of the 26th IEEE International Symposium on Software Reliability …, 2015
BinDNN: Resilient Function Matching Using Deep Learning
N Lageman, ED Kilmer, RJ Walls, PD McDaniel
Security and Privacy in Communication Networks: 12th International …, 2017
Demystifying the placement policies of the NVIDIA GPU thread block scheduler for concurrent kernels
G Gilman, SS Ogden, T Guo, RJ Walls
ACM SIGMETRICS Performance Evaluation Review 48 (3), 81-88, 2021
The system can't perform the operation now. Try again later.
Articles 1–20