Computer Science
Parent: College of Engineering
eScholarship stats: Breakdown by Item for July through October, 2024
Item | Title | Total requests | Download | View-only | %Dnld |
---|---|---|---|---|---|
6j27m45d | Extracting and visualizing topological information from large high-dimensional data sets | 101 | 25 | 76 | 24.8% |
9534w5x1 | Multi-Stage Delivery of Malware | 87 | 11 | 76 | 12.6% |
2jf918dh | CSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security | 70 | 7 | 63 | 10.0% |
1xb249zt | Modeling Systems Using Side Channel Information | 64 | 27 | 37 | 42.2% |
6ww1c3bw | Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems | 59 | 27 | 32 | 45.8% |
7xs630v9 | Distributed Helios - Mitigating Denial of Service Attacks in Online Voting | 57 | 13 | 44 | 22.8% |
0bg5p8ch | Generalizing Tanglegrams | 55 | 6 | 49 | 10.9% |
9zf8102c | Security Analysis of Scantegrity, an Electronic Voting System | 52 | 22 | 30 | 42.3% |
6t90z6fc | Insider Attack Identification and Prevention Using a Declarative Approach | 48 | 29 | 19 | 60.4% |
3z8926ks | Evolution vs. Intelligent Design in Program Patching | 45 | 11 | 34 | 24.4% |
4bw6m317 | The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report | 43 | 16 | 27 | 37.2% |
8xf8q913 | A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping | 43 | 20 | 23 | 46.5% |
6bs3k9rt | Your Security Policy is What?? | 41 | 9 | 32 | 22.0% |
6p22t424 | Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems | 40 | 9 | 31 | 22.5% |
4xb8p2jn | Resolving the Unexpected in Elections: Election Officials' Options | 39 | 8 | 31 | 20.5% |
5rz6t3q4 | NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service | 39 | 12 | 27 | 30.8% |
0b41q7v8 | Leveraging Security Metrics to Enhance System and Network Resilience | 38 | 8 | 30 | 21.1% |
9r06p21c | What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks | 36 | 5 | 31 | 13.9% |
74f3q3wf | Applying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O | 34 | 0 | 34 | 0.0% |
4qg9f9qw | Summit on Education in Secure Software <em>Final Report </em> | 30 | 15 | 15 | 50.0% |
9g41n9s0 | Antimalware Software: Do We Measure Resilience? | 29 | 10 | 19 | 34.5% |
2rb5352d | Dynamic, Flexible, and Optimistic Access Control | 26 | 3 | 23 | 11.5% |
38h991dg | Map navigation app with social posting | 26 | 10 | 16 | 38.5% |
0th5h2wz | Caution: Danger Ahead (with Big Data) | 24 | 3 | 21 | 12.5% |
1vh1g09q | Lightweight Change Detection and Response Inspired by Biological Systems | 24 | 2 | 22 | 8.3% |
5b10q730 | Demythifying Cybersecurity | 24 | 10 | 14 | 41.7% |
9n44886v | Technology, Training, and Transformation | 23 | 3 | 20 | 13.0% |
8qd7z5c9 | A Clinic for "Secure" Programming | 19 | 4 | 15 | 21.1% |
Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.