关注
Ronald Watro
Ronald Watro
Boston Fusion Corp
在 bostonfusion.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
TinyPK: securing sensor networks with public key technology
R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
9922004
Multi-tiered scalable network monitoring
WT Strayer, W Milliken, RJ Watro
US Patent 8,321,938, 2012
872012
Intrusion tolerance approaches in ITUA
M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ...
Supplement of the 2001 International Conference on Dependable Systems and …, 2001
522001
Fault-tolerant decision making in totally asynchronous distributed systems
MF Bridgland, RJ Watro
Proceedings of the sixth annual ACM Symposium on Principles of distributed …, 1987
481987
Redex capturing in term graph rewriting (concise version)
WM Farmer, RJ Watro
International Conference on Rewriting Techniques and Applications, 13-24, 1991
461991
Mathematical foundations for time warp systems
JI Leivent, RJ Watro
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 771-794, 1993
321993
Providing intrusion tolerance with itua
M Cukier, T Courtney, J Lyons, HV Ramasamy, WH Sanders, M Seri, ...
Supplement of the 2002 International Conference on Dependable Systems and …, 2002
292002
A correctness proof for combinator reduction with cycles
WM Farmer, JD Ramsdell, RJ Watro
ACM Transactions on Programming Languages and Systems (TOPLAS) 12 (1), 123-134, 1990
281990
Lessons learned in game development for crowdsourced software formal verification
D Dean, S Gaurino, L Eusebi, A Keplinger, T Pavlik, R Watro, ...
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
262015
Providing intrusion tolerance with ITUA
T Courtney, J Lyons, HGV Ramasamy, WH Sanders, M Seri, M Atighetchi, ...
Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002 …, 2002
252002
Probabilistic validation of intrusion tolerance
WH Sanders, M Cukier, F Webber, P Pal, R Watro
Supplemental Volume Int’l Conf. Dependable Systems and Networks (DSN-2002 …, 2002
232002
Quantifying & minimizing attack surfaces containing moving target defenses
N Soule, B Simidchieva, F Yaman, R Watro, J Loyall, M Atighetchi, ...
2015 Resilience Week (RWS), 1-6, 2015
192015
Redex capturing in term graph rewriting
WM Farmer, RJ Watro
International Journal of Foundations of Computer Science 1 (04), 369-386, 1990
131990
Ghost Map: Proving software correctness using games
R Watro, K Moffitt, T Hussain, D Wyschogrod, J Ostwald, D Kong, ...
SECURWARE 2014 223, 2014
92014
Certificate policy (cp) for the resource public key infrastructure (rpki)
S Kent, D Kong, K Seo, R Watro
92012
Privacy-enhanced android for smart cities applications
M Lepinski, D Levin, D McCarthy, R Watro, M Lack, D Hallenbeck, ...
Smart City 360°: First EAI International Summit, Smart City 360°, Bratislava …, 2016
82016
A performance-based comparison of object-oriented simulation tools
E BENSLEY, V GIDDINGS, J LEIVENT, R WATRO
81992
Mapping mission-level availability requirements to system architectures and policy abstractions
RJ Watro, RW Shirey
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
72001
TinyPK
R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004
52004
Intrusion tolerance by unpredictable adaptation (ITUA)
P Pal, M Atighetchi, C Jones, I Keidar, D Levin, J Loyall, P Rubel, ...
Tech. rep., BBNT SOLUTIONS LLC CAMBRIDGE MA, 2005
42005
系统目前无法执行此操作,请稍后再试。
文章 1–20