Robert J. Walls
Robert J. Walls
Worcester Polytechnic University
Verified email at wpi.edu - Homepage
TitleCited byYear
Building an Ontology of Cyber Security
A Oltramari, LF Cranor, RJ Walls, P McDaniel
Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense …, 2014
422014
Forensic Triage for Mobile Phones with DEC0DE.
RJ Walls, EG Learned-Miller, BN Levine
USENIX Security Symposium, 2011
422011
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
R Walls
Computer Science & Engineering, 2009
332009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
322013
Domain-Z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
302016
Effective Digital Forensics Research Is Investigator-Centric.
RJ Walls, BN Levine, M Liberatore, C Shields
HotSec, 2011
302011
Measuring the impact and perception of acceptable advertisements
RJ Walls, ED Kilmer, N Lageman, PD McDaniel
Proceedings of the 2015 Internet Measurement Conference, 107-120, 2015
222015
Malware traffic detection using tamper resistant features
ZB Celik, RJ Walls, P McDaniel, A Swami
MILCOM 2015-2015 IEEE Military Communications Conference, 330-335, 2015
212015
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
152014
Domain-Z: 28 registrations later
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
37th IEEE Symposium on Security and Privacy, 2016
122016
Discovering Specification Violations in Networked Software Systems
RJ Walls, Y Brun, M Liberatore, BN Levine
Proceedings of the 26th IEEE International Symposium on Software Reliability …, 2015
82015
Computational Ontology of Network Operations
A Oltramari, L Cranor, RJ Walls, P McDaniel
MILCOM 2015, 2015
72015
Functional Privacy or Why Cookies are Better with Milk
RJ Walls, SS Clark, BN Levine
Proc. USENIX Workshop on Hot Topics in Security., 2012
72012
Efficient smart phone forensics based on relevance feedback
S Varma, RJ Walls, B Lynn, BN Levine
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
62014
Inference-based forensics for extracting information from diverse sources
RJ Walls
62014
Reverse engineering for mobile systems forensics with Ares
J Tuttle, RJ Walls, E Learned-Miller, BN Levine
Proceedings of the 2010 ACM workshop on Insider threats, 21-28, 2010
62010
Speeding up Deep Learning with Transient Servers
S Li, RJ Walls, L Xu, T Guo
arXiv preprint arXiv:1903.00045, 2019
22019
Mapping sample scenarios to operational models
ZB Celik, N Hu, Y Li, N Papernot, P McDaniel, R Walls, J Rowe, K Levitt, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 7-12, 2016
22016
Measurement and Analysis of Child Pornography Trafficking on Gnutella and eMule
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
2*
BinDNN: Resilient Function Matching Using Deep Learning
N Lageman, ED Kilmer, RJ Walls, PD McDaniel
International Conference on Security and Privacy in Communication Systems …, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20