Home
Browse
Ask Us
Chat
Harmful Language Statement
Log in
Institutional Repository
Advanced Search
Year
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
TO
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
Type
Text
335
Format
application/pdf
335
Collection
Computer Science Archive
1
Honors Theses Open Access
9
Theses & Dissertations
191
UScholar Works
134
Filters:
Format:
"application/pdf"
School Or College:
"College of Engineering"
1
-
25
of
335
<
1
2
3
4
5
6
7
8
9
10
>
Gallery view
Number of results to display per page
10
25
50
100
200
Sort by Relevance
Sort by Title A-Z
Sort by Title Z-A
Sort by Date Ascending
Sort by Date Descending
Sort by Last Modified Ascending
Sort by Last Modified Descending
Title
Date
Type
Setname
1
The flask security architecture: system support for diverse security policies
1998
Text
ir_uspace
2
The Fluke Security Project
2000-04
Text
ir_computersa
3
Speculatorum Oculi
2014-01-01
Text
ir_uspace
4
Interparty visibility in a cloud computing platform
2018
Text
ir_etd
5
Deidtect - distributed elastic intrusion detection architecture
2016
Text
ir_etd
6
Isolation of malicious external inputs in a security focused adaptive execution environment
2013-01-01
Text
ir_uspace
7
Cenet-- capability enabled networking: towards least-privileged networking
2015
Text
ir_etd
8
XNET: capability enabled cloud access control system
2017
Text
ir_etd
9
Secure communications in filter bank multicarrier spread spectrum systems
2017
Text
ir_etd
10
Exploiting altruism in social networks for friend-to-friend malware detection
2014-01-01
Text
ir_uspace
11
Microkernels meet recursive virtual machines (draft. May 10, 1996))
1996
Text
ir_uspace
12
Password cracking: a game of wits
1989
Text
ir_uspace
13
A tour of the worm
1989
Text
ir_uspace
14
Eztrust: Network independent perimeterization for microservices
2019
Text
ir_etd
15
A program logic and its application in fully verified software fault isolation
2012-08
Text
ir_etd
16
Seacat: an sdn end-to-end containment architecture
2015-08
Text
ir_etd
17
Malware beaconing detection
2018
Text
ir_etd
18
Low latency workstation cluster communications using sender-based protocols
1996
Text
ir_uspace
19
Graphical man/machine communications: November 1969
1969-11
Text
ir_uspace
20
Enhancing transportation safety and security: a spatial multilevel approach
2013-12
Text
ir_etd
21
On fast and accurate detection of unauthorized wireless access points using clock skews
2010-03
Text
ir_uspace
22
Neutron interaction tool, pyNIC for advanced applications in nuclear power, nuclear medicine, and nuclear security
2014-12
Text
ir_etd
23
Computation methods for secure energy system operations
2020
Text
ir_etd
24
Enhancing automatic software testing for broader applicability
2018
Text
ir_etd
25
The design activity framework: investigating the data visualization design process
2017
Text
ir_etd
1
-
25
of
335
<
1
2
3
4
5
6
7
8
9
10
>