James Parker
James Parker
University of Maryland, College Park
Verified email at jamesparker.me
Title
Cited by
Cited by
Year
4D, N = 1 supersymmetry genomics (II)
SJ Gates Jr, J Hallett, J Parker, VGJ Rodgers, K Stiffler
Journal of High Energy Physics 2012 (6), 1-34, 2012
60*2012
4D, N= 1 supersymmetry genomics (I)
SJ Gates Jr, J Gonzales, B MacGregor, J Parker, R Polo-Sherk, ...
Journal of High Energy Physics 2009 (12), 008, 2009
512009
Build it, break it, fix it: Contesting secure development
A Ruef, M Hicks, J Parker, D Levin, ML Mazurek, P Mardziel
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications…, 2016
452016
LWeb: Information flow security for multi-tier web applications
J Parker, N Vazou, M Hicks
Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019
242019
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks
29th {USENIX} Security Symposium ({USENIX} Security 20), 109-126, 2020
162020
Factors predictive of distress in people awaiting a lower gastro-intestinal endoscopy
J Parker, P Kennedy
Psychology, health & medicine 15 (1), 26-33, 2010
152010
LMonad: Information flow control for haskell web applications
JL Parker
132014
4D, = 1 supergravity genomics
I Chappell, SJ Gates, WD Linch, J Parker, S Randall, A Ridgway, K Stiffler
Journal of High Energy Physics 2013 (10), 1-52, 2013
122013
An extended detailed investigation of first and second order supersymmetries for off-shell N= 2 and N= 4 supermultiplets
SJ Gates, J Parker, VGJ Rodgers, L Rodriguez, K Stiffler
Symmetry 7 (2), 1080-1121, 2015
62015
Build it break it: Measuring and comparing development security
A Ruef, M Hicks, J Parker, D Levin, A Memon, J Plane, P Mardziel
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
62015
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
32020
Verifying replicated data types with typeclass refinements in Liquid Haskell
Y Liu, J Parker, P Redmond, L Kuper, M Hicks, N Vazou
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-30, 2020
22020
Froid: Functional Reactive Android
J Parker
Undergraduate Honours Thesis, University of Maryland, 2013
12013
Balboa: Bobbing and Weaving around Network Censorship
MB Rosen, J Parker, AJ Malozemoff
arXiv preprint arXiv:2104.05871, 2021
2021
Advanced Language-based Techniques for Correct, Secure Networked Systems
J Parker
2020
Build It, Break It, Fix It: Contesting Secure Development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
arXiv preprint arXiv:1907.01679, 2019
2019
■ и шНШ
SW Langdon, B Dennee-Sommers, J Parker, P Kennedy
Psychology, Health & Medicine 15 (1), 1-16, 2010
2010
Secure Apparatus to Provide Secure Voice Telephony Via a Rigidly Attached Microphone and Earpiece
P Kennedy, J Parker
MOTOROLA TECHNICAL DEVELOPMENTS 32, 63-63, 1997
1997
Visible to the public Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
D Votipka, K Fulton, J Parker, M Hou, ML Mazurek, M Hicks
The system can't perform the operation now. Try again later.
Articles 1–19