Search Results - "Riley, Ryan"

Refine Results
  1. 1

    DroidNative: Automating and optimizing detection of Android native code malware variants by Alam, Shahid, Qu, Zhengyang, Riley, Ryan, Chen, Yan, Rastogi, Vaibhav

    Published in Computers & security (01-03-2017)
    “…According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively (~99%) on the…”
    Get full text
    Journal Article
  2. 2

    Your culture is in your password: An analysis of a demographically-diverse password dataset by AlSabah, Mashael, Oligeri, Gabriele, Riley, Ryan

    Published in Computers & security (01-08-2018)
    “…A large number of studies on passwords make use of passwords leaked by attackers who compromised online services. Frequently, these leaks contain only the…”
    Get full text
    Journal Article
  3. 3

    PeptideRanger: An R Package to Optimize Synthetic Peptide Selection for Mass Spectrometry Applications by Riley, Ryan M., Spencer Miko, Sandra E., Morin, Ryan D., Morin, Gregg B., Negri, Gian Luca

    Published in Journal of proteome research (03-02-2023)
    “…Targeted and semitargeted mass spectrometry-based approaches are reliable methods to consistently detect and quantify low abundance proteins including proteins…”
    Get full text
    Journal Article
  4. 4

    Mass Spectrometry Acquisition and Fractionation Recommendations for TMT11 and TMT16 Labeled Samples by Riley, Ryan M., Negri, Gian Luca, Cheng, S.-W. Grace, Spencer Miko, Sandra E., Morin, Ryan D., Morin, Gregg B.

    Published in Journal of proteome research (02-08-2024)
    “…Proteome coverage and accurate protein quantification are both important for evaluating biological systems; however, compromises between quantification,…”
    Get full text
    Journal Article
  5. 5

    Streptococcus mutans Lacking sufCDSUB Is Viable, but Displays Major Defects in Growth, Stress Tolerance Responses and Biofilm Formation by Ellepola, Kassapa, Huang, Xiaochang, Riley, Ryan P., Bitoun, Jacob P., Wen, Zezhang Tom

    Published in Frontiers in microbiology (24-06-2021)
    “…Streptococcus mutans appears to possess a sole iron-sulfur (Fe-S) cluster biosynthesis system encoded by the sufCDSUB cluster. This study was designed to…”
    Get full text
    Journal Article
  6. 6

    Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed by Al-Nakhala, Noor, Riley, Ryan, Elfouly, Tarek

    “…In this work, we realize the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Underdiagnosis of Pediatric Obesity and Underscreening for Fatty Liver Disease and Metabolic Syndrome by Pediatricians and Pediatric Subspecialists by Riley, Matthew Ryan, Bass, Nathan Michael, Rosenthal, Philip, Merriman, Raphael B.

    Published in The Journal of pediatrics (01-12-2005)
    “…To evaluate how often general pediatricians, pediatric endocrinologists, and gastroenterologists diagnose children as overweight and how often interventions…”
    Get full text
    Journal Article
  9. 9

    A framework for prototyping and testing data-only rootkit attacks by Riley, Ryan

    Published in Computers & security (01-09-2013)
    “…Kernel rootkits—attacks which modify a running operating system kernel in order to hide an attacker's presence—are significant threats. Recent advances in…”
    Get full text
    Journal Article
  10. 10

    Development of an in Vitro Thrombosis Model to Assess Endothelial Regulation of Thrombus Formation by Riley, Ryan

    Published 01-01-2022
    “…Arterial thrombosis culminating in myocardial infarction and stroke remains one of the leading causes of death and disability in the western world. Both in…”
    Get full text
    Dissertation
  11. 11

    How Special Education Teachers Implement Ambitious Teaching Practices by Riley, Ryan Louis

    Published 01-01-2023
    “…Implementing ambitious teaching practices is a student-led teaching style that emphasizes being student-centered instead of a teacher-centered teaching…”
    Get full text
    Dissertation
  12. 12

    Enclave-based oblivious RAM using Intel’s SGX by Rachid, Maan Haj, Riley, Ryan, Malluhi, Qutaibah

    Published in Computers & security (01-04-2020)
    “…Oblivious RAM (ORAM) schemes exist in order to protect the access pattern of data in a data store. Under an ORAM algorithm, a client accesses a data store in…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution by Evtyushkin, Dmitry, Elwell, Jesse, Ozsoy, Meltem, Ponomarev, Dmitry, Abu Ghazaleh, Nael, Riley, Ryan

    “…We consider the problem of how to provide an execution environment where the application's secrets are safe even in the presence of malicious system software…”
    Get full text
    Conference Proceeding
  15. 15

    ABNORMAL ANTLERS AND PEDICLES ON ROCKY MOUNTAIN ELK IN NORTHERN ARIZONA by Rachlow, Janet L, Lee, Raymond M, Riley, Ryan K

    Published in The Southwestern naturalist (01-03-2003)
    “…Rocky Mountain elk (Cervus elaphus nelsoni) bearing malformed antlers have been observed in northern Arizona during the last 10 years. We collected…”
    Get full text
    Journal Article
  16. 16

    Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications by Evtyushkin, Dmitry, Elwell, Jesse, Ozsoy, Meltem, Ponomarev, Dmitry, Abu Ghazaleh, Nael, Riley, Ryan

    “…We consider the problem of how to provide an execution environment where the application's secrets are safe even in the presence of malicious system software…”
    Get full text
    Journal Article
  17. 17

    Data-Centric OS Kernel Malware Characterization by Junghwan Rhee, Riley, Ryan, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu

    “…Traditional malware detection and analysis approaches have been focusing on code-centric aspects of malicious programs, such as detection of the injection of…”
    Get full text
    Journal Article
  18. 18

    DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications by Zhengyang Qu, Alam, Shahid, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Riley, Ryan

    “…Android has provided dynamic code loading (DCL) since API level one. DCL allows an app developer to load additional code at runtime. DCL raises numerous…”
    Get full text
    Conference Proceeding
  19. 19
  20. 20

    Mission Planning for Trident: Discovery proposal to Neptune's moon, Triton by Sharma, Priyanka, Lawler, Christopher R., Mitchell, Karl L., Bradley, Ben K., Rokey, Mark J., Lam, Try, Landau, Damon F, Woods, Brian, Riley, Ryan, Prockter, Louise

    Published in 2022 IEEE Aerospace Conference (AERO) (05-03-2022)
    “…Trident was one of the four Discovery-class Step-1 mission proposals selected by NASA in 2020 for further development and study; however, in 2021, the Step-2…”
    Get full text
    Conference Proceeding