Robert N. M. Watson

3.1k total citations
81 papers, 1.7k citations indexed

About

Robert N. M. Watson is a scholar working on Artificial Intelligence, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Robert N. M. Watson has authored 81 papers receiving a total of 1.7k indexed citations (citations by other indexed papers that have themselves been cited), including 56 papers in Artificial Intelligence, 38 papers in Computer Networks and Communications and 25 papers in Signal Processing. Recurrent topics in Robert N. M. Watson's work include Security and Verification in Computing (54 papers), Advanced Malware Detection Techniques (25 papers) and Distributed systems and fault tolerance (23 papers). Robert N. M. Watson is often cited by papers focused on Security and Verification in Computing (54 papers), Advanced Malware Detection Techniques (25 papers) and Distributed systems and fault tolerance (23 papers). Robert N. M. Watson collaborates with scholars based in United Kingdom, United States and Canada. Robert N. M. Watson's co-authors include Ben Laurie, Jonathan Anderson, Peter G. Neumann, Simon W. Moore, David Chisnall, Brooks Davis, Jonathan Woodruff, Michael Roe, Mark Handley and Robert M. Norton and has published in prestigious journals such as Communications of the ACM, The American Journal of Medicine and Journal of Leukocyte Biology.

In The Last Decade

Robert N. M. Watson

78 papers receiving 1.6k citations

Peers

Robert N. M. Watson
Andrew Baumann United States
Kaveh Razavi Netherlands
Sangho Lee United States
Chengyu Song United States
Jonathan M. McCune United States
Steve Beattie United States
Cynthia Irvine United States
Andrew Baumann United States
Robert N. M. Watson
Citations per year, relative to Robert N. M. Watson Robert N. M. Watson (= 1×) peers Andrew Baumann

Countries citing papers authored by Robert N. M. Watson

Since Specialization
Citations

This map shows the geographic impact of Robert N. M. Watson's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Robert N. M. Watson with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Robert N. M. Watson more than expected).

Fields of papers citing papers by Robert N. M. Watson

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Robert N. M. Watson. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Robert N. M. Watson. The network helps show where Robert N. M. Watson may publish in the future.

Co-authorship network of co-authors of Robert N. M. Watson

This figure shows the co-authorship network connecting the top 25 collaborators of Robert N. M. Watson. A scholar is included among the top collaborators of Robert N. M. Watson based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Robert N. M. Watson. Robert N. M. Watson is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chisnall, David, Nathaniel Wesley Filardo, Ben Laurie, et al.. (2025). CHERIoT RTOS: An OS for Fine-Grained Memory-Safe Compartments on Low-Cost Embedded Devices. 67–84.
2.
Memarian, Kayvan, Ricardo Almeida, Brooks Davis, et al.. (2024). Formal Mechanised Semantics of CHERI C: Capabilities, Undefined Behaviour, and Provenance. Apollo (University of Cambridge). 181–196. 2 indexed citations
3.
Filardo, Nathaniel Wesley, Brett F. Gutstein, Jonathan Woodruff, et al.. (2024). Cornucopia Reloaded: Load Barriers for CHERI Heap Temporal Safety. Apollo (University of Cambridge). 251–268. 6 indexed citations
4.
Watson, Robert N. M., David Chisnall, Brooks Davis, et al.. (2024). CHERI: Hardware-Enabled C/C++ Memory Protection at Scale. IEEE Security & Privacy. 22(4). 50–61. 1 indexed citations
5.
Chisnall, David, Nathaniel Wesley Filardo, Ben Laurie, et al.. (2023). CHERIoT: Complete Memory Safety for Embedded Devices. 641–653. 12 indexed citations
6.
Watson, Robert N. M., et al.. (2023). The Arm Morello Evaluation Platform—Validating CHERI-Based Security in a High-Performance System. IEEE Micro. 43(3). 50–57. 12 indexed citations
7.
Woodruff, Jonathan, Matthew Naylor, Michael Roe, et al.. (2023). Randomized Testing of RISC-V CPUs Using Direct Instruction Injection. IEEE Design and Test. 41(1). 40–49. 4 indexed citations
8.
Woodruff, Jonathan, Anthony Fox, Robert M. Norton, et al.. (2019). CHERI Concentrate: Practical Compressed Capabilities. IEEE Transactions on Computers. 68(10). 1455–1469. 38 indexed citations
9.
Watson, Robert N. M., et al.. (2017). Disk|Crypt|Net. 211–224. 9 indexed citations
10.
Woodruff, Jonathan, Simon W. Moore, Robert N. M. Watson, et al.. (2017). Efficient Tagged Memory. 641–648. 27 indexed citations
11.
Chisnall, David, Brooks Davis, Khilan Gudka, et al.. (2017). CHERI JNI. 569–583. 16 indexed citations
12.
Watson, Robert N. M., Simon W. Moore, & Peter G. Neumann. (2016). CHERI: A Hardware-Software System to Support the Principle of Least Privilege.. ERCIM news/ERCIM news online edition. 2016. 1 indexed citations
13.
Gog, Ionel, Malte Schwarzkopf, Adam Gleave, Robert N. M. Watson, & Steven Hand. (2016). Firmament: fast, centralized cluster scheduling at scale. Operating Systems Design and Implementation. 99–115. 109 indexed citations
14.
Schwarzkopf, Malte, Ionel Gog, Robert N. M. Watson, et al.. (2015). Queues don't matter when you can JUMP them!. Apollo (University of Cambridge). 1–14. 106 indexed citations
15.
Watson, Robert N. M.. (2013). A decade of OS access-control extensibility. Communications of the ACM. 56(2). 52–63. 23 indexed citations
16.
Watson, Robert N. M., et al.. (2010). Introducing Capsicum: practical capabilities for UNIX. 35(6). 7–17.
17.
Watson, Robert N. M.. (2007). Exploiting concurrency vulnerabilities in system call wrappers. Journal of Leukocyte Biology. 50(3). 2–8. 48 indexed citations
18.
Watson, Robert N. M., et al.. (2003). The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0.. USENIX Annual Technical Conference. 285–296. 25 indexed citations
19.
Watson, Robert N. M.. (2001). TrustedBSD: Adding Trusted Operating System Features to FreeBSD. USENIX Annual Technical Conference. 15–28. 35 indexed citations
20.
Watson, Robert N. M.. (1993). DMA controller programming in C. 11(11). 35–54. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026