Computer Science

Parent: College of Engineering

eScholarship stats: History by Item for November, 2024 through February, 2025

ItemTitleTotal requests2025-022025-012024-122024-11
9534w5x1Multi-Stage Delivery of Malware803220199
2jf918dhCSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security6910211721
6j27m45dExtracting and visualizing topological information from large high-dimensional data sets6614162412
3z8926ksEvolution vs. Intelligent Design in Program Patching431311163
0b41q7v8Leveraging Security Metrics to Enhance System and Network Resilience411710104
4xb8p2jnResolving the Unexpected in Elections: Election Officials' Options39216111
9zf8102cSecurity Analysis of Scantegrity, an Electronic Voting System39181542
4qg9f9qwSummit on Education in Secure Software <em>Final Report </em>37111754
9r06p21cWhat Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks36161181
0bg5p8chGeneralizing Tanglegrams35121166
6ww1c3bwParametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems3110966
2rb5352dDynamic, Flexible, and Optimistic Access Control30101181
1xb249ztModeling Systems Using Side Channel Information2918434
5rz6t3q4NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service2913754
6bs3k9rtYour Security Policy is What??249951
74f3q3wfApplying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O236656
7xs630v9Distributed Helios - Mitigating Denial of Service Attacks in Online Voting231292
8xf8q913A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping239761
38h991dgMap navigation app with social posting217941
4bw6m317The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report2012431
8qd7z5c9A Clinic for "Secure" Programming201433
9n44886vTechnology, Training, and Transformation2010631
0th5h2wzCaution: Danger Ahead (with Big Data)199442
5b10q730Demythifying Cybersecurity197552
9g41n9s0Antimalware Software: Do We Measure Resilience?191063
1vh1g09qLightweight Change Detection and Response Inspired by Biological Systems1711312
6p22t424Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems179323
6t90z6fcInsider Attack Identification and Prevention Using a Declarative Approach15582

Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.