Robert J. Walls
Robert J. Walls
Worcester Polytechnic University
Verified email at - Homepage
TitleCited byYear
Building an Ontology of Cyber Security
A Oltramari, LF Cranor, RJ Walls, P McDaniel
Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense …, 2014
Forensic Triage for Mobile Phones with DEC0DE.
RJ Walls, EG Learned-Miller, BN Levine
USENIX Security Symposium, 2011
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
R Walls
Computer Science & Engineering, 2009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Domain-Z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
Effective Digital Forensics Research Is Investigator-Centric.
RJ Walls, BN Levine, M Liberatore, C Shields
HotSec, 2011
Measuring the impact and perception of acceptable advertisements
RJ Walls, ED Kilmer, N Lageman, PD McDaniel
Proceedings of the 2015 Internet Measurement Conference, 107-120, 2015
Malware traffic detection using tamper resistant features
ZB Celik, RJ Walls, P McDaniel, A Swami
MILCOM 2015-2015 IEEE Military Communications Conference, 330-335, 2015
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
Single Reflection Spatial Voting: A novel method for discovering reflective surfaces using indoor positioning systems
RK Harle, A Ward, A Hopper
Proceedings of the 1st international conference on Mobile systems …, 2003
Domain-Z: 28 registrations later
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
37th IEEE Symposium on Security and Privacy, 2016
Discovering Specification Violations in Networked Software Systems
RJ Walls, Y Brun, M Liberatore, BN Levine
Proceedings of the 26th IEEE International Symposium on Software Reliability …, 2015
A cyber-physical approach to trustworthy operation of health monitoring systems
KK Venkatasubramanian, A Banerjee, SKS Gupta, RJ Walls
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
Computational Ontology of Network Operations
A Oltramari, L Cranor, RJ Walls, P McDaniel
MILCOM 2015, 2015
Functional Privacy or Why Cookies are Better with Milk
RJ Walls, SS Clark, BN Levine
Proc. USENIX Workshop on Hot Topics in Security., 2012
Efficient smart phone forensics based on relevance feedback
S Varma, RJ Walls, B Lynn, BN Levine
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Inference-based forensics for extracting information from diverse sources
RJ Walls
Reverse engineering for mobile systems forensics with Ares
J Tuttle, RJ Walls, E Learned-Miller, BN Levine
Proceedings of the 2010 ACM workshop on Insider threats, 21-28, 2010
Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices
PM VanNostrand, I Kyriazis, M Cheng, T Guo, RJ Walls
arXiv preprint arXiv:1908.10730, 2019
Speeding up deep learning with transient servers
S Li, RJ Walls, L Xu, T Guo
2019 IEEE International Conference on Autonomic Computing (ICAC), 125-135, 2019
The system can't perform the operation now. Try again later.
Articles 1–20