Computer Science
Parent: College of Engineering
eScholarship stats: History by Item for February through May, 2025
Item | Title | Total requests | 2025-05 | 2025-04 | 2025-03 | 2025-02 |
---|---|---|---|---|---|---|
9534w5x1 | Multi-Stage Delivery of Malware | 105 | 29 | 22 | 22 | 32 |
0b41q7v8 | Leveraging Security Metrics to Enhance System and Network Resilience | 63 | 23 | 14 | 9 | 17 |
1xb249zt | Modeling Systems Using Side Channel Information | 61 | 9 | 24 | 10 | 18 |
4bw6m317 | The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report | 56 | 14 | 22 | 8 | 12 |
5rz6t3q4 | NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service | 55 | 17 | 13 | 12 | 13 |
0bg5p8ch | Generalizing Tanglegrams | 54 | 18 | 14 | 10 | 12 |
6j27m45d | Extracting and visualizing topological information from large high-dimensional data sets | 53 | 13 | 14 | 12 | 14 |
2jf918dh | CSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security | 50 | 12 | 14 | 14 | 10 |
7xs630v9 | Distributed Helios - Mitigating Denial of Service Attacks in Online Voting | 46 | 10 | 15 | 9 | 12 |
9zf8102c | Security Analysis of Scantegrity, an Electronic Voting System | 46 | 9 | 13 | 6 | 18 |
6ww1c3bw | Parametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems | 45 | 12 | 16 | 7 | 10 |
6p22t424 | Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems | 42 | 16 | 12 | 5 | 9 |
8qd7z5c9 | A Clinic for "Secure" Programming | 42 | 15 | 8 | 5 | 14 |
4qg9f9qw | Summit on Education in Secure Software <em>Final Report </em> | 40 | 15 | 11 | 3 | 11 |
9r06p21c | What Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks | 40 | 7 | 15 | 2 | 16 |
4xb8p2jn | Resolving the Unexpected in Elections: Election Officials' Options | 39 | 7 | 7 | 4 | 21 |
74f3q3wf | Applying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O | 38 | 12 | 10 | 10 | 6 |
8xf8q913 | A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping | 35 | 10 | 9 | 7 | 9 |
0th5h2wz | Caution: Danger Ahead (with Big Data) | 33 | 11 | 10 | 3 | 9 |
3z8926ks | Evolution vs. Intelligent Design in Program Patching | 33 | 9 | 5 | 6 | 13 |
6bs3k9rt | Your Security Policy is What?? | 33 | 11 | 6 | 7 | 9 |
38h991dg | Map navigation app with social posting | 31 | 13 | 7 | 4 | 7 |
1vh1g09q | Lightweight Change Detection and Response Inspired by Biological Systems | 30 | 9 | 7 | 3 | 11 |
9g41n9s0 | Antimalware Software: Do We Measure Resilience? | 28 | 8 | 4 | 6 | 10 |
5b10q730 | Demythifying Cybersecurity | 26 | 7 | 10 | 2 | 7 |
9n44886v | Technology, Training, and Transformation | 25 | 4 | 7 | 4 | 10 |
2rb5352d | Dynamic, Flexible, and Optimistic Access Control | 24 | 5 | 5 | 4 | 10 |
6t90z6fc | Insider Attack Identification and Prevention Using a Declarative Approach | 17 | 4 | 3 | 5 | 5 |
Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.