4D, N = 1 supersymmetry genomics (II) SJ Gates Jr, J Hallett, J Parker, VGJ Rodgers, K Stiffler Journal of High Energy Physics 2012 (6), 1-34, 2012 | 87* | 2012 |
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks 29th USENIX Security Symposium (USENIX Security 20), 109-126, 2020 | 78 | 2020 |
Build it, break it, fix it: Contesting secure development A Ruef, M Hicks, J Parker, D Levin, ML Mazurek, P Mardziel Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 75 | 2016 |
4D, N= 1 supersymmetry genomics (I) SJ Gates Jr, J Gonzales, B MacGregor, J Parker, R Polo-Sherk, ... Journal of High Energy Physics 2009 (12), 008, 2009 | 55 | 2009 |
LWeb: Information flow security for multi-tier web applications J Parker, N Vazou, M Hicks Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019 | 44 | 2019 |
Creation and Delphi-method refinement of pediatric disaster triage simulations MX Cicero, L Brown, F Overly, J Yarzebski, G Meckler, S Fuchs, ... Prehospital Emergency Care 18 (2), 282-289, 2014 | 28 | 2014 |
Verifying replicated data types with typeclass refinements in Liquid Haskell Y Liu, J Parker, P Redmond, L Kuper, M Hicks, N Vazou Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-30, 2020 | 26 | 2020 |
Build it, break it, fix it: Contesting secure development J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ... ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020 | 14 | 2020 |
4D, = 1 supergravity genomics I Chappell, SJ Gates, WD Linch, J Parker, S Randall, A Ridgway, K Stiffler Journal of High Energy Physics 2013 (10), 1-52, 2013 | 14 | 2013 |
Balboa: Bobbing and weaving around network censorship MB Rosen, J Parker, AJ Malozemoff 30th USENIX Security Symposium (USENIX Security 21), 3399-3413, 2021 | 13 | 2021 |
LMonad: Information flow control for Haskell web applications JL Parker University of Maryland, College Park, 2014 | 12 | 2014 |
Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities S Cuéllar, B Harris, J Parker, S Pernsteiner, E Tromer 32nd USENIX Security Symposium (USENIX Security 23), 6525-6540, 2023 | 7 | 2023 |
An Extended Detailed Investigation of First and Second Order Supersymmetries for Off-Shell and Supermultiplets SJ Gates Jr, J Parker, VGJ Rodgers, L Rodriguez, K Stiffler Symmetry 7 (2), 1080-1121, 2015 | 7 | 2015 |
Understanding the how and the why: Exploring secure development practices through a course competition KR Fulton, D Votipka, D Abrokwa, ML Mazurek, M Hicks, J Parker Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 6 | 2022 |
Build it break it: Measuring and comparing development security A Ruef, M Hicks, J Parker, D Levin, A Memon, J Plane, P Mardziel 8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015 | 6 | 2015 |
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. D Luick, JC Kolesar, T Antonopoulos, WR Harris, J Parker, R Piskac, ... IACR Cryptol. ePrint Arch. 2023, 1762, 2023 | 2 | 2023 |
ANOSY: approximated knowledge synthesis with refinement types for declassification SN Guria, N Vazou, M Guarnieri, J Parker Proceedings of the 43rd ACM SIGPLAN International Conference on Programming …, 2022 | 2 | 2022 |
A tabletop school bus rollover: Connecticut-wide drills to build pediatric disaster preparedness and promote a novel hospital disaster readiness checklist MX Cicero, K Golloshi, M Gawel, J Parker, M Auerbach, P Violano American journal of disaster medicine 14 (2), 75-87, 2019 | 2 | 2019 |
Froid: Functional Reactive Android J Parker Undergraduate Honours Thesis, University of Maryland, 2013 | 2 | 2013 |
Advanced Language-Based Techniques for Correct, Secure Networked Systems J Parker University of Maryland, College Park, 2020 | | 2020 |