Home
Browse
Ask Us
Chat
Harmful Language Statement
Log in
Institutional Repository
Advanced Search
Year
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
TO
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
Type
Text
119
Image
1
Format
application/pdf
119
Collection
Computer Science Archive
1
UScholar Works
118
Filters:
Department:
"Computing, School of"
Type:
"Text"
1
-
25
of
119
<
1
2
3
4
5
>
Gallery view
Number of results to display per page
10
25
50
100
200
Sort by Relevance
Sort by Title A-Z
Sort by Title Z-A
Sort by Date Ascending
Sort by Date Descending
Sort by Last Modified Ascending
Sort by Last Modified Descending
Title
Date
Type
Setname
1
The flask security architecture: system support for diverse security policies
1998
Text
ir_uspace
2
The Fluke Security Project
2000-04
Text
ir_computersa
3
Speculatorum Oculi
2014-01-01
Text
ir_uspace
4
Isolation of malicious external inputs in a security focused adaptive execution environment
2013-01-01
Text
ir_uspace
5
Exploiting altruism in social networks for friend-to-friend malware detection
2014-01-01
Text
ir_uspace
6
Microkernels meet recursive virtual machines (draft. May 10, 1996))
1996
Text
ir_uspace
7
Password cracking: a game of wits
1989
Text
ir_uspace
8
A tour of the worm
1989
Text
ir_uspace
9
Low latency workstation cluster communications using sender-based protocols
1996
Text
ir_uspace
10
Graphical man/machine communications: November 1969
1969-11
Text
ir_uspace
11
Enhancing covert communications with multiple colluding receivers
2010-10-06
Text; Image
ir_uspace
12
On fast and accurate detection of unauthorized wireless access points using clock skews
2010-03
Text
ir_uspace
13
Notes on thread models in Mach 3.0
1993
Text
ir_uspace
14
Using khazana to support distributed application development
1999
Text
ir_uspace
15
Understanding integer overflow in C/C++
2012-01-01
Text
ir_uspace
16
Secret key extraction using Bluetooth wireless signal strength measurements
2014-01-01
Text
ir_uspace
17
Java operating systems: design and implementation
1998
Text
ir_uspace
18
Edicts: implementing features with flexible binding times
2008-01-01
Text
ir_uspace
19
Graphical man/machine communications: June 1971
1971
Text
ir_uspace
20
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
2010-01
Text
ir_uspace
21
Graphical man/machine communications: May 1971
1971-05
Text
ir_uspace
22
Khazana An infrastructure for building distributed services
1998
Text
ir_uspace
23
Khazana an infrastructure for building distributed services
1998
Text
ir_uspace
24
A survey on sensor classifications for industrial applications
1995
Text
ir_uspace
25
Detecting receiver attacks in VRTI-based device free localization
2012-01-01
Text
ir_uspace
1
-
25
of
119
<
1
2
3
4
5
>