Computer Science
Parent: College of Engineering
eScholarship stats: History by Item for May through August, 2024
Item | Title | Total requests | 2024-08 | 2024-07 | 2024-06 | 2024-05 |
---|---|---|---|---|---|---|
9534w5x1 | Multi-Stage Delivery of Malware | 96 | 18 | 29 | 14 | 35 |
6j27m45d | Extracting and visualizing topological information from large high-dimensional data sets | 88 | 38 | 26 | 18 | 6 |
1xb249zt | Modeling Systems Using Side Channel Information | 67 | 20 | 21 | 13 | 13 |
2jf918dh | CSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security | 67 | 19 | 21 | 12 | 15 |
6ww1c3bw | Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems | 67 | 24 | 19 | 10 | 14 |
3z8926ks | Evolution vs. Intelligent Design in Program Patching | 49 | 17 | 15 | 13 | 4 |
6p22t424 | Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems | 48 | 11 | 19 | 6 | 12 |
0b41q7v8 | Leveraging Security Metrics to Enhance System and Network Resilience | 46 | 7 | 13 | 15 | 11 |
6t90z6fc | Insider Attack Identification and Prevention Using a Declarative Approach | 43 | 27 | 13 | 2 | 1 |
8xf8q913 | A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping | 41 | 17 | 15 | 5 | 4 |
0bg5p8ch | Generalizing Tanglegrams | 39 | 14 | 13 | 8 | 4 |
74f3q3wf | Applying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O | 34 | 11 | 10 | 12 | 1 |
7xs630v9 | Distributed Helios - Mitigating Denial of Service Attacks in Online Voting | 33 | 8 | 13 | 7 | 5 |
9zf8102c | Security Analysis of Scantegrity, an Electronic Voting System | 32 | 13 | 13 | 4 | 2 |
4bw6m317 | The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report | 31 | 21 | 2 | 5 | 3 |
5rz6t3q4 | NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service | 29 | 6 | 10 | 9 | 4 |
4qg9f9qw | Summit on Education in Secure Software <em>Final Report </em> | 27 | 16 | 6 | 4 | 1 |
9g41n9s0 | Antimalware Software: Do We Measure Resilience? | 26 | 12 | 8 | 2 | 4 |
0th5h2wz | Caution: Danger Ahead (with Big Data) | 25 | 4 | 9 | 12 | |
38h991dg | Map navigation app with social posting | 25 | 11 | 9 | 4 | 1 |
5b10q730 | Demythifying Cybersecurity | 25 | 5 | 14 | 3 | 3 |
1vh1g09q | Lightweight Change Detection and Response Inspired by Biological Systems | 23 | 7 | 12 | 3 | 1 |
6bs3k9rt | Your Security Policy is What?? | 22 | 10 | 7 | 4 | 1 |
9n44886v | Technology, Training, and Transformation | 20 | 8 | 8 | 3 | 1 |
9r06p21c | What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks | 20 | 7 | 8 | 2 | 3 |
8qd7z5c9 | A Clinic for "Secure" Programming | 19 | 4 | 9 | 5 | 1 |
2rb5352d | Dynamic, Flexible, and Optimistic Access Control | 18 | 6 | 7 | 3 | 2 |
4xb8p2jn | Resolving the Unexpected in Elections: Election Officials' Options | 18 | 7 | 8 | 2 | 1 |
Disclaimer: due to the evolving nature of the web traffic we receive and the methods we use to collate it, the data presented here should be considered approximate and subject to revision.