Computer Science

Parent: College of Engineering

eScholarship stats: History by Item for May through August, 2024

ItemTitleTotal requests2024-082024-072024-062024-05
9534w5x1Multi-Stage Delivery of Malware9618291435
6j27m45dExtracting and visualizing topological information from large high-dimensional data sets883826186
1xb249ztModeling Systems Using Side Channel Information6720211313
2jf918dhCSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security6719211215
6ww1c3bwParametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems6724191014
3z8926ksEvolution vs. Intelligent Design in Program Patching491715134
6p22t424Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems481119612
0b41q7v8Leveraging Security Metrics to Enhance System and Network Resilience467131511
6t90z6fcInsider Attack Identification and Prevention Using a Declarative Approach43271321
8xf8q913A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping41171554
0bg5p8chGeneralizing Tanglegrams39141384
74f3q3wfApplying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O341110121
7xs630v9Distributed Helios - Mitigating Denial of Service Attacks in Online Voting3381375
9zf8102cSecurity Analysis of Scantegrity, an Electronic Voting System32131342
4bw6m317The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report3121253
5rz6t3q4NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service2961094
4qg9f9qwSummit on Education in Secure Software <em>Final Report </em>2716641
9g41n9s0Antimalware Software: Do We Measure Resilience?2612824
0th5h2wzCaution: Danger Ahead (with Big Data)254912
38h991dgMap navigation app with social posting2511941
5b10q730Demythifying Cybersecurity2551433
1vh1g09qLightweight Change Detection and Response Inspired by Biological Systems2371231
6bs3k9rtYour Security Policy is What??2210741
9n44886vTechnology, Training, and Transformation208831
9r06p21cWhat Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks207823
8qd7z5c9A Clinic for "Secure" Programming194951
2rb5352dDynamic, Flexible, and Optimistic Access Control186732
4xb8p2jnResolving the Unexpected in Elections: Election Officials' Options187821

Disclaimer: due to the evolving nature of the web traffic we receive and the methods we use to collate it, the data presented here should be considered approximate and subject to revision.