Method, Systems, and Computer Program Products for Implementing Function-Parallel Network Firewall EW Fulp, RJ Farley US Patent 8,037,517, 2011 | 275 | 2011 |
On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers R Zhang, X Wang, R Farley, X Yang, X Jiang 4th ACM International Symposium on Information, Computer, and Communications …, 2009 | 67 | 2009 |
A Function-Parallel Architecture for High-Speed Firewalls EW Fulp, RJ Farley IEEE International Conference on Communications (ICC) 5, 2213-2218, 2006 | 31 | 2006 |
Roving Bugnet: Distributed Surveillance Threat and Mitigation R Farley, X Wang Computers & Security 29 (5), 592-602, 2010 | 14 | 2010 |
VoIP Shield: A Transparent Protection of Deployed VoIP Systems from SIP-based Exploits R Farley, X Wang IEEE/IFIP Network Operations and Management Symposium (NOMS), 486-489, 2012 | 13 | 2012 |
CodeXt: automatic extraction of obfuscated attack code from memory dump R Farley, X Wang Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 10 | 2014 |
An Empirical Investigation into the Security of Phone Features in SIP-based VoIP Systems R Zhang, X Wang, X Yang, R Farley, X Jiang 5th International Conference on Information Security Practice and Experience …, 2009 | 10 | 2009 |
Parallel Firewall Designs for High-Speed Networks RJ Farley Wake Forest University, 2005 | 9 | 2005 |
Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation R Farley, X Wang International journal of critical infrastructure protection 7 (3), 141-154, 2014 | 7 | 2014 |
Effects of Processing Delay on Function-Parallel Firewalls RJ Farley, EW Fulp 24th IASTED International Conference on Parallel and Distributed Computing …, 2006 | 7 | 2006 |
Roving Bugnet: Distributed Surveillance Threat and Mitigation R Farley, X Wang Emerging Challenges for Security, Privacy and Trust 297, 39-50, 2009 | 3 | 2009 |
Introducing A Dark Web Archival Framework JF Brunelle, R Farley, G Atkins, T Bostic, M Hendrix, Z Zebrowski arXiv preprint arXiv:2107.04070, 2021 | 2 | 2021 |
Toward Automated Forensic Analysis of Obfuscated Malware R Farley George Mason University, 2015 | 2 | 2015 |
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation R Farley, X Wang 9th International Conference on Security and Privacy in Communication …, 2013 | 2 | 2013 |
CodeXt: Automatic Extraction of Obfuscated Attack R Farley, X Wang | | 2014 |