Computer Science

Parent: College of Engineering

eScholarship stats: Breakdown by Item for April through July, 2024

ItemTitleTotal requestsDownloadView-only%Dnld
9534w5x1Multi-Stage Delivery of Malware117111069.4%
2jf918dhCSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security65105515.4%
6ww1c3bwParametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems55193634.5%
1xb249ztModeling Systems Using Side Channel Information54114320.4%
6j27m45dExtracting and visualizing topological information from large high-dimensional data sets51104119.6%
0b41q7v8Leveraging Security Metrics to Enhance System and Network Resilience49103920.4%
6p22t424Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems41113026.8%
0bg5p8chGeneralizing Tanglegrams3753213.5%
3z8926ksEvolution vs. Intelligent Design in Program Patching36132336.1%
5rz6t3q4NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service34122235.3%
7xs630v9Distributed Helios - Mitigating Denial of Service Attacks in Online Voting3292328.1%
8xf8q913A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping30121840.0%
74f3q3wfApplying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O270270.0%
0th5h2wzCaution: Danger Ahead (with Big Data)2442016.7%
9r06p21cWhat Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks2451920.8%
5b10q730Demythifying Cybersecurity2112957.1%
9zf8102cSecurity Analysis of Scantegrity, an Electronic Voting System2191242.9%
1vh1g09qLightweight Change Detection and Response Inspired by Biological Systems1931615.8%
8qd7z5c9A Clinic for "Secure" Programming1941521.1%
6bs3k9rtYour Security Policy is What??1821611.1%
6t90z6fcInsider Attack Identification and Prevention Using a Declarative Approach1881044.4%
4xb8p2jnResolving the Unexpected in Elections: Election Officials' Options1641225.0%
9g41n9s0Antimalware Software: Do We Measure Resilience?1661037.5%
38h991dgMap navigation app with social posting145935.7%
9n44886vTechnology, Training, and Transformation1431121.4%
2rb5352dDynamic, Flexible, and Optimistic Access Control1221016.7%
4bw6m317The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report121118.3%
4qg9f9qwSummit on Education in Secure Software <em>Final Report </em>127558.3%

Disclaimer: due to the evolving nature of the web traffic we receive and the methods we use to collate it, the data presented here should be considered approximate and subject to revision.