Follow
Ryan Farley
Ryan Farley
The MITRE Corporation
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Method, Systems, and Computer Program Products for Implementing Function-Parallel Network Firewall
EW Fulp, RJ Farley
US Patent 8,037,517, 2011
2762011
On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers
R Zhang, X Wang, R Farley, X Yang, X Jiang
4th ACM International Symposium on Information, Computer, and Communications …, 2009
672009
A Function-Parallel Architecture for High-Speed Firewalls
EW Fulp, RJ Farley
IEEE International Conference on Communications (ICC) 5, 2213-2218, 2006
312006
Roving Bugnet: Distributed Surveillance Threat and Mitigation
R Farley, X Wang
Computers & Security 29 (5), 592-602, 2010
142010
VoIP Shield: A Transparent Protection of Deployed VoIP Systems from SIP-based Exploits
R Farley, X Wang
IEEE/IFIP Network Operations and Management Symposium (NOMS), 486-489, 2012
132012
CodeXt: automatic extraction of obfuscated attack code from memory dump
R Farley, X Wang
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
102014
An Empirical Investigation into the Security of Phone Features in SIP-based VoIP Systems
R Zhang, X Wang, X Yang, R Farley, X Jiang
5th International Conference on Information Security Practice and Experience …, 2009
102009
Parallel Firewall Designs for High-Speed Networks
RJ Farley
Wake Forest University, 2005
92005
Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation
R Farley, X Wang
International journal of critical infrastructure protection 7 (3), 141-154, 2014
72014
Effects of Processing Delay on Function-Parallel Firewalls
RJ Farley, EW Fulp
24th IASTED International Conference on Parallel and Distributed Computing …, 2006
72006
Roving Bugnet: Distributed Surveillance Threat and Mitigation
R Farley, X Wang
Emerging Challenges for Security, Privacy and Trust 297, 39-50, 2009
32009
Toward Automated Forensic Analysis of Obfuscated Malware
R Farley
George Mason University, 2015
22015
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
R Farley, X Wang
9th International Conference on Security and Privacy in Communication …, 2013
22013
Introducing A Dark Web Archival Framework
JF Brunelle, R Farley, G Atkins, T Bostic, M Hendrix, Z Zebrowski
arXiv preprint arXiv:2107.04070, 2021
12021
CodeXt: Automatic Extraction of Obfuscated Attack
R Farley, X Wang
2014
The system can't perform the operation now. Try again later.
Articles 1–15