Ikuti
Ronald Watro
Ronald Watro
Boston Fusion Corp
Email yang diverifikasi di bostonfusion.com
Judul
Dikutip oleh
Dikutip oleh
Tahun
TinyPK: securing sensor networks with public key technology
R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
9832004
Multi-tiered scalable network monitoring
WT Strayer, W Milliken, RJ Watro
US Patent 8,321,938, 2012
842012
Intrusion tolerance approaches in ITUA
M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ...
Supplement of the 2001 International Conference on Dependable Systems and …, 2001
522001
Redex capturing in term graph rewriting (concise version)
WM Farmer, RJ Watro
International Conference on Rewriting Techniques and Applications, 13-24, 1991
481991
Fault-tolerant decision making in totally asynchronous distributed systems
MF Bridgland, RJ Watro
Proceedings of the sixth annual ACM Symposium on Principles of distributed …, 1987
471987
Mathematical foundations for time warp systems
JI Leivent, RJ Watro
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 771-794, 1993
321993
Providing intrusion tolerance with itua
M Cukier, T Courtney, J Lyons, HV Ramasamy, WH Sanders, M Seri, ...
Supplement of the 2002 International Conference on Dependable Systems and …, 2002
292002
A correctness proof for combinator reduction with cycles
WM Farmer, JD Ramsdell, RJ Watro
ACM Transactions on Programming Languages and Systems (TOPLAS) 12 (1), 123-134, 1990
281990
Providing intrusion tolerance with ITUA
T Courtney, J Lyons, HGV Ramasamy, WH Sanders, M Seri, M Atighetchi, ...
Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002 …, 2002
262002
Lessons learned in game development for crowdsourced software formal verification
D Dean, S Gaurino, L Eusebi, A Keplinger, T Pavlik, R Watro, ...
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
252015
Probabilistic validation of intrusion tolerance
WH Sanders, M Cukier, F Webber, P Pal, R Watro
Supplemental Volume Int’l Conf. Dependable Systems and Networks (DSN-2002 …, 2002
242002
Quantifying & minimizing attack surfaces containing moving target defenses
N Soule, B Simidchieva, F Yaman, R Watro, J Loyall, M Atighetchi, ...
2015 Resilience Week (RWS), 1-6, 2015
212015
Redex capturing in term graph rewriting
WM Farmer, RJ Watro
International Journal of Foundations of Computer Science 1 (04), 369-386, 1990
131990
Privacy-enhanced android for smart cities applications
M Lepinski, D Levin, D McCarthy, R Watro, M Lack, D Hallenbeck, ...
Smart City 360°: First EAI International Summit, Smart City 360°, Bratislava …, 2016
92016
Ghost Map: Proving software correctness using games
R Watro, K Moffitt, T Hussain, D Wyschogrod, J Ostwald, D Kong, ...
SECURWARE 2014 223, 2014
92014
Certificate policy (cp) for the resource public key infrastructure (rpki)
S Kent, D Kong, K Seo, R Watro
92012
A performance-based comparison of object-oriented simulation tools
EH Bensley, VT Giddings, JI Leivent, RJ Watro
The MITRE Cooperation, Bedford, MA, 1992
91992
Mapping mission-level availability requirements to system architectures and policy abstractions
RJ Watro, RW Shirey
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
72001
Intrusion tolerance by unpredictable adaptation (ITUA)
P Pal, M Atighetchi, C Jones, I Keidar, D Levin, J Loyall, P Rubel, ...
Tech. rep., BBNT SOLUTIONS LLC CAMBRIDGE MA, 2005
42005
TinyPK
R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004
42004
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20