Computer Science

Parent: College of Engineering

eScholarship stats: History by Item for February through May, 2025

ItemTitleTotal requests2025-052025-042025-032025-02
9534w5x1Multi-Stage Delivery of Malware10529222232
0b41q7v8Leveraging Security Metrics to Enhance System and Network Resilience632314917
1xb249ztModeling Systems Using Side Channel Information619241018
4bw6m317The Hive Mind: Applying a Distributed Security Sensor Network to GENI- GENI Spiral 2 Final Project Report561422812
5rz6t3q4NetSage: Open Privacy-Aware Network Measurement, Analysis, And Visualization Service5517131213
0bg5p8chGeneralizing Tanglegrams5418141012
6j27m45dExtracting and visualizing topological information from large high-dimensional data sets5313141214
2jf918dhCSE-92-18 - An Evaluation of Feature Selection Methodsand Their Application to Computer Security5012141410
7xs630v9Distributed Helios - Mitigating Denial of Service Attacks in Online Voting461015912
9zf8102cSecurity Analysis of Scantegrity, an Electronic Voting System46913618
6ww1c3bwParametrization and Effectiveness of Moving Target Defense Security Protections for Industrial Control Systems451216710
6p22t424Parametrization and Effectiveness of Moving Target Defense Security Protections within Industrial Control Systems42161259
8qd7z5c9A Clinic for "Secure" Programming42158514
4qg9f9qwSummit on Education in Secure Software <em>Final Report </em>401511311
9r06p21cWhat Do Firewalls Protect?An Empirical Study of Firewalls, Vulnerabilities, and Attacks40715216
4xb8p2jnResolving the Unexpected in Elections: Election Officials' Options3977421
74f3q3wfApplying Machine Learning to Identify NUMA End-System Bottlenecks for Network I/O381210106
8xf8q913A Pade Approximate Linearization for Solving the Quadratic Eigenvalue Problem with Low-Rank Damping3510979
0th5h2wzCaution: Danger Ahead (with Big Data)33111039
3z8926ksEvolution vs. Intelligent Design in Program Patching3395613
6bs3k9rtYour Security Policy is What??3311679
38h991dgMap navigation app with social posting3113747
1vh1g09qLightweight Change Detection and Response Inspired by Biological Systems3097311
9g41n9s0Antimalware Software: Do We Measure Resilience?2884610
5b10q730Demythifying Cybersecurity2671027
9n44886vTechnology, Training, and Transformation2547410
2rb5352dDynamic, Flexible, and Optimistic Access Control2455410
6t90z6fcInsider Attack Identification and Prevention Using a Declarative Approach174355

Note: Due to the evolving nature of web traffic, the data presented here should be considered approximate and subject to revision. Learn more.