Computer Science

Parent: College of Engineering

eScholarship stats: Breakdown by Item for November, 2024 through February, 2025

ItemTitleTotal requestsDownloadView-only%Dnld
9534w5x1Multi-Stage Delivery of Malware80116913.8%
2jf918dhCSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security69214830.4%
6j27m45dExtracting and visualizing topological information from large high-dimensional data sets665617.6%
3z8926ksEvolution vs. Intelligent Design in Program Patching43172639.5%
0b41q7v8Leveraging Security Metrics to Enhance System and Network Resilience4173417.1%
4xb8p2jnResolving the Unexpected in Elections: Election Officials' Options3993023.1%
9zf8102cSecurity Analysis of Scantegrity, an Electronic Voting System3953412.8%
4qg9f9qwSummit on Education in Secure Software <em>Final Report </em>37261170.3%
9r06p21cWhat Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks3663016.7%
0bg5p8chGeneralizing Tanglegrams3543111.4%
6ww1c3bwParametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems313289.7%
2rb5352dDynamic, Flexible, and Optimistic Access Control3072323.3%
1xb249ztModeling Systems Using Side Channel Information2942513.8%
5rz6t3q4NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service2932610.3%
6bs3k9rtYour Security Policy is What??2442016.7%
74f3q3wfApplying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O230230.0%
7xs630v9Distributed Helios - Mitigating Denial of Service Attacks in Online Voting232218.7%
8xf8q913A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping2351821.7%
38h991dgMap navigation app with social posting2131814.3%
4bw6m317The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report2031715.0%
8qd7z5c9A Clinic for "Secure" Programming2091145.0%
9n44886vTechnology, Training, and Transformation2081240.0%
0th5h2wzCaution: Danger Ahead (with Big Data)1941521.1%
5b10q730Demythifying Cybersecurity1981142.1%
9g41n9s0Antimalware Software: Do We Measure Resilience?1951426.3%
1vh1g09qLightweight Change Detection and Response Inspired by Biological Systems1731417.6%
6p22t424Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems170170.0%
6t90z6fcInsider Attack Identification and Prevention Using a Declarative Approach1521313.3%

Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.