Robert J. Walls
Robert J. Walls
Worcester Polytechnic University
Verified email at - Homepage
TitleCited byYear
Building an Ontology of Cyber Security
A Oltramari, LF Cranor, RJ Walls, P McDaniel
Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense …, 2014
Forensic Triage for Mobile Phones with DEC0DE.
RJ Walls, EG Learned-Miller, BN Levine
USENIX Security Symposium, 2011
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
R Walls
Computer Science & Engineering, 2009
Measurement and analysis of child pornography trafficking on P2P networks
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013
Domain-Z: 28 registrations later measuring the exploitation of residual trust in domains
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
2016 IEEE Symposium on Security and Privacy (SP), 691-706, 2016
Effective Digital Forensics Research Is Investigator-Centric.
RJ Walls, BN Levine, M Liberatore, C Shields
HotSec, 2011
Measuring the impact and perception of acceptable advertisements
RJ Walls, ED Kilmer, N Lageman, PD McDaniel
Proceedings of the 2015 Internet Measurement Conference, 107-120, 2015
Malware traffic detection using tamper resistant features
ZB Celik, RJ Walls, P McDaniel, A Swami
MILCOM 2015-2015 IEEE Military Communications Conference, 330-335, 2015
Security and science of agility
P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ...
Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014
Domain-Z: 28 registrations later
C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis
37th IEEE Symposium on Security and Privacy, 2016
Discovering Specification Violations in Networked Software Systems
RJ Walls, Y Brun, M Liberatore, BN Levine
Proceedings of the 26th IEEE International Symposium on Software Reliability …, 2015
Computational Ontology of Network Operations
A Oltramari, L Cranor, RJ Walls, P McDaniel
MILCOM 2015, 2015
Functional Privacy or Why Cookies are Better with Milk
RJ Walls, SS Clark, BN Levine
Proc. USENIX Workshop on Hot Topics in Security., 2012
Efficient smart phone forensics based on relevance feedback
S Varma, RJ Walls, B Lynn, BN Levine
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Inference-based forensics for extracting information from diverse sources
RJ Walls
Reverse engineering for mobile systems forensics with Ares
J Tuttle, RJ Walls, E Learned-Miller, BN Levine
Proceedings of the 2010 ACM workshop on Insider threats, 21-28, 2010
Speeding up Deep Learning with Transient Servers
S Li, RJ Walls, L Xu, T Guo
arXiv preprint arXiv:1903.00045, 2019
Mapping sample scenarios to operational models
ZB Celik, N Hu, Y Li, N Papernot, P McDaniel, R Walls, J Rowe, K Levitt, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 7-12, 2016
Measurement and Analysis of Child Pornography Trafficking on Gnutella and eMule
R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ...
BinDNN: Resilient Function Matching Using Deep Learning
N Lageman, ED Kilmer, RJ Walls, PD McDaniel
International Conference on Security and Privacy in Communication Systems …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20