TinyPK: securing sensor networks with public key technology R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 985 | 2004 |
Multi-tiered scalable network monitoring WT Strayer, W Milliken, RJ Watro US Patent 8,321,938, 2012 | 85 | 2012 |
Intrusion tolerance approaches in ITUA M Cukier, J Lyons, P Pandey, HGV Ramasamy, WH Sanders, P Pal, ... Supplement of the 2001 International Conference on Dependable Systems and …, 2001 | 52 | 2001 |
Redex capturing in term graph rewriting (concise version) WM Farmer, RJ Watro International Conference on Rewriting Techniques and Applications, 13-24, 1991 | 48 | 1991 |
Fault-tolerant decision making in totally asynchronous distributed systems MF Bridgland, RJ Watro Proceedings of the sixth annual ACM Symposium on Principles of distributed …, 1987 | 47 | 1987 |
Mathematical foundations for time warp systems JI Leivent, RJ Watro ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (5), 771-794, 1993 | 32 | 1993 |
Providing intrusion tolerance with itua M Cukier, T Courtney, J Lyons, HV Ramasamy, WH Sanders, M Seri, ... Supplement of the 2002 International Conference on Dependable Systems and …, 2002 | 29 | 2002 |
A correctness proof for combinator reduction with cycles WM Farmer, JD Ramsdell, RJ Watro ACM Transactions on Programming Languages and Systems (TOPLAS) 12 (1), 123-134, 1990 | 28 | 1990 |
Providing intrusion tolerance with ITUA T Courtney, J Lyons, HGV Ramasamy, WH Sanders, M Seri, M Atighetchi, ... Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002 …, 2002 | 26 | 2002 |
Lessons learned in game development for crowdsourced software formal verification D Dean, S Gaurino, L Eusebi, A Keplinger, T Pavlik, R Watro, ... 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015 | 25 | 2015 |
Probabilistic validation of intrusion tolerance WH Sanders, M Cukier, F Webber, P Pal, R Watro Supplemental Volume IntĒl Conf. Dependable Systems and Networks (DSN-2002 …, 2002 | 24 | 2002 |
Quantifying & minimizing attack surfaces containing moving target defenses N Soule, B Simidchieva, F Yaman, R Watro, J Loyall, M Atighetchi, ... 2015 Resilience Week (RWS), 1-6, 2015 | 21 | 2015 |
Redex capturing in term graph rewriting WM Farmer, RJ Watro International Journal of Foundations of Computer Science 1 (04), 369-386, 1990 | 13 | 1990 |
Privacy-enhanced android for smart cities applications M Lepinski, D Levin, D McCarthy, R Watro, M Lack, D Hallenbeck, ... Smart City 360°: First EAI International Summit, Smart City 360°, Bratislava …, 2016 | 9 | 2016 |
Ghost Map: Proving software correctness using games R Watro, K Moffitt, T Hussain, D Wyschogrod, J Ostwald, D Kong, ... SECURWARE 2014 223, 2014 | 9 | 2014 |
Certificate policy (cp) for the resource public key infrastructure (rpki) S Kent, D Kong, K Seo, R Watro | 9 | 2012 |
A performance-based comparison of object-oriented simulation tools EH Bensley, VT Giddings, JI Leivent, RJ Watro The MITRE Cooperation, Bedford, MA, 1992 | 9 | 1992 |
Mapping mission-level availability requirements to system architectures and policy abstractions RJ Watro, RW Shirey Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 7 | 2001 |
Intrusion tolerance by unpredictable adaptation (ITUA) P Pal, M Atighetchi, C Jones, I Keidar, D Levin, J Loyall, P Rubel, ... Tech. rep., BBNT SOLUTIONS LLC CAMBRIDGE MA, 2005 | 4 | 2005 |
TinyPK R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004 | 4 | 2004 |