Ronald Watro
Ronald Watro
Boston Fusion Corp
Email yang diverifikasi di bostonfusion.com
Judul
Dikutip oleh
Dikutip oleh
Tahun
TinyPK: securing sensor networks with public key technology
R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
9392004
Intrusion tolerance approaches in ITUA
M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ...
Supplement of the 2001 International Conference on Dependable Systems and …, 2001
522001
Multi-tiered scalable network monitoring
WT Strayer, W Milliken, RJ Watro
US Patent 8,321,938, 2012
512012
Fault-tolerant decision making in totally asynchronous distributed systems
MF Bridgland, RJ Watro
Proceedings of the sixth annual ACM Symposium on Principles of distributed …, 1987
451987
Redex capturing in term graph rewriting (concise version)
WM Farmer, RJ Watro
International Conference on Rewriting Techniques and Applications, 13-24, 1991
441991
Mathematical foundations for time warp systems
JI Leivent, RJ Watro
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 771-794, 1993
301993
Providing intrusion tolerance with itua
M Cukier, T Courtney, J Lyons, HV Ramasamy, WH Sanders, M Seri, ...
Supplement of the 2002 International Conference on Dependable Systems and …, 2002
282002
A correctness proof for combinator reduction with cycles
WM Farmer, JD Ramsdell, RJ Watro
ACM Transactions on Programming Languages and Systems (TOPLAS) 12 (1), 123-134, 1990
281990
Probabilistic validation of intrusion tolerance
WH Sanders, M Cukier, F Webber, P Pal, R Watro
Supplemental Volume Int’l Conf. Dependable Systems and Networks (DSN-2002 …, 2002
262002
Providing intrusion tolerance with ITUA
T Courtney, J Lyons, HGV Ramasamy, WH Sanders, M Seri, M Atighetchi, ...
Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002 …, 2002
252002
Lessons learned in game development for crowdsourced software formal verification
D Dean, S Gaurino, L Eusebi, A Keplinger, T Pavlik, R Watro, ...
2015 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2015
242015
Quantifying & minimizing attack surfaces containing moving target defenses
N Soule, B Simidchieva, F Yaman, R Watro, J Loyall, M Atighetchi, ...
2015 Resilience Week (RWS), 1-6, 2015
152015
Redex capturing in term graph rewriting
WM Farmer, RJ Watro
International Journal of Foundations of Computer Science 1 (04), 369-386, 1990
141990
Ghost map: Proving software correctness using games
R Watro, K Moffitt, T Hussain, D Wyschogrod, J Ostwald, D Kong, ...
SECURWARE 2014 223, 2014
102014
Privacy-enhanced android for smart cities applications
M Lepinski, D Levin, D McCarthy, R Watro, M Lack, D Hallenbeck, ...
Smart City 360°, 66-77, 2016
82016
Mapping mission-level availability requirements to system architectures and policy abstractions
RJ Watro, RW Shirey
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
72001
A Performance-Based Comparison of Object-Oriented Simulation Tools
EH Bensley, VT Giddings, JI Leivent, RJ Watro
MITRE CORP BEDFORD MA, 1992
51992
Certificate policy (cp) for the resource public key infrastructure (rpki)
S Kent, D Kong, K Seo, R Watro
RFC6484, Feb, 2012
42012
Gardiner Ch
RJ Watro, D Kong, SF Cuti
Lynn Ch., Kruus P.: TinyPK: securing sensor networks with public key …, 0
3
An architecture for scalable network defense
T Strayer, W Milliken, R Watro, W Heimerdinger, S Harp, RP Goldman, ...
2009 IEEE 34th Conference on Local Computer Networks, 368-371, 2009
22009
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20