Citation Impact

Citing Papers

Transparent run-time defense against stack smashing attacks
2000
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
2003
TIED, LibsafePlus: tools for runtime buffer overflow protection
2004
Statically detecting likely buffer overflow vulnerabilities
2001
Detecting format string vulnerabilities with type qualifiers
2001 Standout
Practical Byzantine fault tolerance
1999 Standout
PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
2008
Cyclone: A Safe Dialect of C
2002
Static detection of security vulnerabilities in scripting languages
2006 Standout
Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks
2006
Address obfuscation: an efficient approach to combat a board range of memory error exploits
2003
Type-Assisted Dynamic Buffer Overflow Detection
2002
A study of android application security
2011 Standout
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
2007 Standout
KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs
2008 Standout
A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks.
2003
Finding security vulnerabilities in java applications with static analysis
2005 Standout
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
2010 Standout
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
2000
High coverage detection of input-related security facults
2003
Scrash: a system for generating secure crash information
2003
Secure routing in wireless sensor networks: attacks and countermeasures
2003 Standout
Mitigating denial of service attacks: A tutorial
2005
When and how to develop domain-specific languages
2005 Standout
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
2018
Enhancing Our Lives with Immersive Virtual Reality
2016 Standout
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
2006 Standout
OceanStore
2000 Standout
Vigilante
2005
Distributed, object-based programming systems
1991
Literature review of Industry 4.0 and related technologies
2018 Standout
A survey of techniques for internet traffic classification using machine learning
2008 Standout
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
2005 Standout
ATL: An Adaptive Transport Layer Suite for Next-Generation Wireless Internet
2004
A network worm vaccine architecture
2004
Blockchain technology in the energy sector: A systematic review of challenges and opportunities
2018 Standout
Period selection for integrated controller tasks in cyber-physical systems
2015
A Survey on Quality of Experience of HTTP Adaptive Streaming
2014 Standout
Secure Execution via Program Shepherding
2002
Networked Graphics: Building Networked Games and Virtual Environments
2009
Introduction to Cyber-Physical System Security: A Cross-Layer Perspective
2016
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
2010 Standout
Computer security — What should you spend your money on?
1999
Domain-specific languages: from design to implementation application to video device drivers generation
1999
The economics of information security investment
2002 Standout
Blockchains and Smart Contracts for the Internet of Things
2016 Standout
Survey of intrusion detection systems: techniques, datasets and challenges
2019 Standout
Ensemble Prediction Algorithm of Anomaly Monitoring Based on Big Data Analysis Platform of Open‐Pit Mine Slope
2018 Standout
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software
2006
Practical byzantine fault tolerance and proactive recovery
2002 Standout
Demand Side Management: Demand Response, Intelligent Energy Systems, and Smart Loads
2011 Standout
A Review on the Use of Blockchain for the Internet of Things
2018 Standout
An overview on smart contracts: Challenges, advances and platforms
2019 Standout
Countering code-injection attacks with instruction-set randomization
2003 Standout
Blockchain challenges and opportunities: a survey
2018 Standout
A survey of rollback-recovery protocols in message-passing systems
2002 Standout
Automatic creation of SQL Injection and cross-site scripting attacks
2009 Standout
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
A survey of schemes for Internet-based video delivery
2011
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures
2008
A synthetic traffic model for Quake3
2004
Cloud mobile gaming
2012
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
2013 Standout
ARC: The Analytical Rate Control Scheme for Real-Time Traffic in Wireless Networks
2004
A survey on wireless multimedia sensor networks
2006 Standout
Improving security using extensible lightweight static analysis
2002 Standout
Multimedia communication in wireless sensor networks
2005
TaintDroid
2014 Standout
GENESIS: an efficient, transparent and easy to use cluster operating system
2002
A synthetic traffic model for Half-Life
2024
Principled design of the modern Web architecture
2002 Standout
Security in Building Automation Systems
2009
Wireless mesh networks: a survey
2005 Standout
Cyber-Physical Systems Security—A Survey
2017 Standout
Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications
2013 Standout

Works of Jonathan Walpole being referenced

Microlanguages for Operating System Specialization
1997
Operating system design: towards a holistic approach?
1987
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
1998
MIST: PVM with Transparent Migration and Checkpointing
1995
Analysis of a reservation-based feedback scheduler
2003
Provisioning on-line games
2002
Low-latency adaptive streaming over tcp
2008
<title>Flow and congestion control for Internet media streaming applications</title>
1997
A traffic characterization of popular on-line games
2005
A Specialization Toolkit to Increase the Diversity of Operating Systems
1996
Rankless by CCL
2026