Search Results - "Riley, Ryan"
-
1
DroidNative: Automating and optimizing detection of Android native code malware variants
Published in Computers & security (01-03-2017)“…According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively (~99%) on the…”
Get full text
Journal Article -
2
Your culture is in your password: An analysis of a demographically-diverse password dataset
Published in Computers & security (01-08-2018)“…A large number of studies on passwords make use of passwords leaked by attackers who compromised online services. Frequently, these leaks contain only the…”
Get full text
Journal Article -
3
PeptideRanger: An R Package to Optimize Synthetic Peptide Selection for Mass Spectrometry Applications
Published in Journal of proteome research (03-02-2023)“…Targeted and semitargeted mass spectrometry-based approaches are reliable methods to consistently detect and quantify low abundance proteins including proteins…”
Get full text
Journal Article -
4
Mass Spectrometry Acquisition and Fractionation Recommendations for TMT11 and TMT16 Labeled Samples
Published in Journal of proteome research (02-08-2024)“…Proteome coverage and accurate protein quantification are both important for evaluating biological systems; however, compromises between quantification,…”
Get full text
Journal Article -
5
Streptococcus mutans Lacking sufCDSUB Is Viable, but Displays Major Defects in Growth, Stress Tolerance Responses and Biofilm Formation
Published in Frontiers in microbiology (24-06-2021)“…Streptococcus mutans appears to possess a sole iron-sulfur (Fe-S) cluster biosynthesis system encoded by the sufCDSUB cluster. This study was designed to…”
Get full text
Journal Article -
6
Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-03-2015)“…In this work, we realize the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed…”
Get full text
Journal Article -
7
Antiplatelet properties of Pim kinase inhibition are mediated through disruption of thromboxane A2 receptor signaling
Published in Haematologica (Roma) (01-07-2021)“…Pim kinases are upregulated in several forms of cancer, contributing to cell survival and tumour development, but their role in platelet function and…”
Get full text
Journal Article -
8
Underdiagnosis of Pediatric Obesity and Underscreening for Fatty Liver Disease and Metabolic Syndrome by Pediatricians and Pediatric Subspecialists
Published in The Journal of pediatrics (01-12-2005)“…To evaluate how often general pediatricians, pediatric endocrinologists, and gastroenterologists diagnose children as overweight and how often interventions…”
Get full text
Journal Article -
9
A framework for prototyping and testing data-only rootkit attacks
Published in Computers & security (01-09-2013)“…Kernel rootkits—attacks which modify a running operating system kernel in order to hide an attacker's presence—are significant threats. Recent advances in…”
Get full text
Journal Article -
10
Development of an in Vitro Thrombosis Model to Assess Endothelial Regulation of Thrombus Formation
Published 01-01-2022“…Arterial thrombosis culminating in myocardial infarction and stroke remains one of the leading causes of death and disability in the western world. Both in…”
Get full text
Dissertation -
11
How Special Education Teachers Implement Ambitious Teaching Practices
Published 01-01-2023“…Implementing ambitious teaching practices is a student-led teaching style that emphasizes being student-centered instead of a teacher-centered teaching…”
Get full text
Dissertation -
12
Enclave-based oblivious RAM using Intel’s SGX
Published in Computers & security (01-04-2020)“…Oblivious RAM (ORAM) schemes exist in order to protect the access pattern of data in a data store. Under an ORAM algorithm, a client accesses a data store in…”
Get full text
Journal Article -
13
Abstract PR002: Global proteomic profiling of endometrial carcinomas identify prognostic markers
Published in Clinical cancer research (01-02-2021)“…Abstract While endometrial cancer (EC) has an overall good prognosis, some patients do poorly and there is room for refinement within current classification…”
Get full text
Journal Article -
14
Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution
Published in 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture (01-12-2014)“…We consider the problem of how to provide an execution environment where the application's secrets are safe even in the presence of malicious system software…”
Get full text
Conference Proceeding -
15
ABNORMAL ANTLERS AND PEDICLES ON ROCKY MOUNTAIN ELK IN NORTHERN ARIZONA
Published in The Southwestern naturalist (01-03-2003)“…Rocky Mountain elk (Cervus elaphus nelsoni) bearing malformed antlers have been observed in northern Arizona during the last 10 years. We collected…”
Get full text
Journal Article -
16
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications
Published in IEEE transactions on dependable and secure computing (01-05-2018)“…We consider the problem of how to provide an execution environment where the application's secrets are safe even in the presence of malicious system software…”
Get full text
Journal Article -
17
Data-Centric OS Kernel Malware Characterization
Published in IEEE transactions on information forensics and security (01-01-2014)“…Traditional malware detection and analysis approaches have been focusing on code-centric aspects of malicious programs, such as detection of the injection of…”
Get full text
Journal Article -
18
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications
Published in 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01-06-2017)“…Android has provided dynamic code loading (DCL) since API level one. DCL allows an app developer to load additional code at runtime. DCL raises numerous…”
Get full text
Conference Proceeding -
19
Plagiat et créativité (treize enquêtes sur l'auteur et son autre)
Published in Nineteenth-Century French Studies (01-04-2012)Get full text
Book Review Journal Article -
20
Mission Planning for Trident: Discovery proposal to Neptune's moon, Triton
Published in 2022 IEEE Aerospace Conference (AERO) (05-03-2022)“…Trident was one of the four Discovery-class Step-1 mission proposals selected by NASA in 2020 for further development and study; however, in 2021, the Step-2…”
Get full text
Conference Proceeding