Computer Science

Parent: College of Engineering

eScholarship stats: Breakdown by Item for July through October, 2024

ItemTitleTotal requestsDownloadView-only%Dnld
6j27m45dExtracting and visualizing topological information from large high-dimensional data sets101257624.8%
9534w5x1Multi-Stage Delivery of Malware87117612.6%
2jf918dhCSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security7076310.0%
1xb249ztModeling Systems Using Side Channel Information64273742.2%
6ww1c3bwParametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems59273245.8%
7xs630v9Distributed Helios - Mitigating Denial of Service Attacks in Online Voting57134422.8%
0bg5p8chGeneralizing Tanglegrams5564910.9%
9zf8102cSecurity Analysis of Scantegrity, an Electronic Voting System52223042.3%
6t90z6fcInsider Attack Identification and Prevention Using a Declarative Approach48291960.4%
3z8926ksEvolution vs. Intelligent Design in Program Patching45113424.4%
4bw6m317The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report43162737.2%
8xf8q913A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping43202346.5%
6bs3k9rtYour Security Policy is What??4193222.0%
6p22t424Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems4093122.5%
4xb8p2jnResolving the Unexpected in Elections: Election Officials' Options3983120.5%
5rz6t3q4NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service39122730.8%
0b41q7v8Leveraging Security Metrics to Enhance System and Network Resilience3883021.1%
9r06p21cWhat Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks3653113.9%
74f3q3wfApplying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O340340.0%
4qg9f9qwSummit on Education in Secure Software <em>Final Report </em>30151550.0%
9g41n9s0Antimalware Software: Do We Measure Resilience?29101934.5%
2rb5352dDynamic, Flexible, and Optimistic Access Control2632311.5%
38h991dgMap navigation app with social posting26101638.5%
0th5h2wzCaution: Danger Ahead (with Big Data)2432112.5%
1vh1g09qLightweight Change Detection and Response Inspired by Biological Systems242228.3%
5b10q730Demythifying Cybersecurity24101441.7%
9n44886vTechnology, Training, and Transformation2332013.0%
8qd7z5c9A Clinic for "Secure" Programming1941521.1%

Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.