Computer Science
Parent: College of Engineering
eScholarship stats: History by Item for November, 2024 through February, 2025
Item | Title | Total requests | 2025-02 | 2025-01 | 2024-12 | 2024-11 |
---|---|---|---|---|---|---|
9534w5x1 | Multi-Stage Delivery of Malware | 80 | 32 | 20 | 19 | 9 |
2jf918dh | CSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security | 69 | 10 | 21 | 17 | 21 |
6j27m45d | Extracting and visualizing topological information from large high-dimensional data sets | 66 | 14 | 16 | 24 | 12 |
3z8926ks | Evolution vs. Intelligent Design in Program Patching | 43 | 13 | 11 | 16 | 3 |
0b41q7v8 | Leveraging Security Metrics to Enhance System and Network Resilience | 41 | 17 | 10 | 10 | 4 |
4xb8p2jn | Resolving the Unexpected in Elections: Election Officials' Options | 39 | 21 | 6 | 11 | 1 |
9zf8102c | Security Analysis of Scantegrity, an Electronic Voting System | 39 | 18 | 15 | 4 | 2 |
4qg9f9qw | Summit on Education in Secure Software <em>Final Report </em> | 37 | 11 | 17 | 5 | 4 |
9r06p21c | What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks | 36 | 16 | 11 | 8 | 1 |
0bg5p8ch | Generalizing Tanglegrams | 35 | 12 | 11 | 6 | 6 |
6ww1c3bw | Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems | 31 | 10 | 9 | 6 | 6 |
2rb5352d | Dynamic, Flexible, and Optimistic Access Control | 30 | 10 | 11 | 8 | 1 |
1xb249zt | Modeling Systems Using Side Channel Information | 29 | 18 | 4 | 3 | 4 |
5rz6t3q4 | NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service | 29 | 13 | 7 | 5 | 4 |
6bs3k9rt | Your Security Policy is What?? | 24 | 9 | 9 | 5 | 1 |
74f3q3wf | Applying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O | 23 | 6 | 6 | 5 | 6 |
7xs630v9 | Distributed Helios - Mitigating Denial of Service Attacks in Online Voting | 23 | 12 | 9 | 2 | |
8xf8q913 | A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping | 23 | 9 | 7 | 6 | 1 |
38h991dg | Map navigation app with social posting | 21 | 7 | 9 | 4 | 1 |
4bw6m317 | The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report | 20 | 12 | 4 | 3 | 1 |
8qd7z5c9 | A Clinic for "Secure" Programming | 20 | 14 | 3 | 3 | |
9n44886v | Technology, Training, and Transformation | 20 | 10 | 6 | 3 | 1 |
0th5h2wz | Caution: Danger Ahead (with Big Data) | 19 | 9 | 4 | 4 | 2 |
5b10q730 | Demythifying Cybersecurity | 19 | 7 | 5 | 5 | 2 |
9g41n9s0 | Antimalware Software: Do We Measure Resilience? | 19 | 10 | 6 | 3 | |
1vh1g09q | Lightweight Change Detection and Response Inspired by Biological Systems | 17 | 11 | 3 | 1 | 2 |
6p22t424 | Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems | 17 | 9 | 3 | 2 | 3 |
6t90z6fc | Insider Attack Identification and Prevention Using a Declarative Approach | 15 | 5 | 8 | 2 |
Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.