Computer Science
Parent: College of Engineering
eScholarship stats: Breakdown by Item for November, 2024 through February, 2025
Item | Title | Total requests | Download | View-only | %Dnld |
---|---|---|---|---|---|
9534w5x1 | Multi-Stage Delivery of Malware | 80 | 11 | 69 | 13.8% |
2jf918dh | CSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security | 69 | 21 | 48 | 30.4% |
6j27m45d | Extracting and visualizing topological information from large high-dimensional data sets | 66 | 5 | 61 | 7.6% |
3z8926ks | Evolution vs. Intelligent Design in Program Patching | 43 | 17 | 26 | 39.5% |
0b41q7v8 | Leveraging Security Metrics to Enhance System and Network Resilience | 41 | 7 | 34 | 17.1% |
4xb8p2jn | Resolving the Unexpected in Elections: Election Officials' Options | 39 | 9 | 30 | 23.1% |
9zf8102c | Security Analysis of Scantegrity, an Electronic Voting System | 39 | 5 | 34 | 12.8% |
4qg9f9qw | Summit on Education in Secure Software <em>Final Report </em> | 37 | 26 | 11 | 70.3% |
9r06p21c | What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks | 36 | 6 | 30 | 16.7% |
0bg5p8ch | Generalizing Tanglegrams | 35 | 4 | 31 | 11.4% |
6ww1c3bw | Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems | 31 | 3 | 28 | 9.7% |
2rb5352d | Dynamic, Flexible, and Optimistic Access Control | 30 | 7 | 23 | 23.3% |
1xb249zt | Modeling Systems Using Side Channel Information | 29 | 4 | 25 | 13.8% |
5rz6t3q4 | NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service | 29 | 3 | 26 | 10.3% |
6bs3k9rt | Your Security Policy is What?? | 24 | 4 | 20 | 16.7% |
74f3q3wf | Applying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O | 23 | 0 | 23 | 0.0% |
7xs630v9 | Distributed Helios - Mitigating Denial of Service Attacks in Online Voting | 23 | 2 | 21 | 8.7% |
8xf8q913 | A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping | 23 | 5 | 18 | 21.7% |
38h991dg | Map navigation app with social posting | 21 | 3 | 18 | 14.3% |
4bw6m317 | The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report | 20 | 3 | 17 | 15.0% |
8qd7z5c9 | A Clinic for "Secure" Programming | 20 | 9 | 11 | 45.0% |
9n44886v | Technology, Training, and Transformation | 20 | 8 | 12 | 40.0% |
0th5h2wz | Caution: Danger Ahead (with Big Data) | 19 | 4 | 15 | 21.1% |
5b10q730 | Demythifying Cybersecurity | 19 | 8 | 11 | 42.1% |
9g41n9s0 | Antimalware Software: Do We Measure Resilience? | 19 | 5 | 14 | 26.3% |
1vh1g09q | Lightweight Change Detection and Response Inspired by Biological Systems | 17 | 3 | 14 | 17.6% |
6p22t424 | Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems | 17 | 0 | 17 | 0.0% |
6t90z6fc | Insider Attack Identification and Prevention Using a Declarative Approach | 15 | 2 | 13 | 13.3% |
Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.