41. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
42. A learning algorithm for visual pose estimation of continuum robots Reiter, Austin David; Goldman, Roger Eric; Bajo, Andrea; Iliopoulos, Konstantinos; Simaan, Nabil; Allen, Peter K. 2011 Articles Robotics
43. Algorithms for Solvents of Matrix Polynomials Dennis Jr., J.E.; Traub, Joseph F.; Weber, R.P. 1978 Articles Computer science--MathematicsComputer algorithmsPolynomials--Mathematical modelsBernoulli polynomialsMatrices
44. Alignment using an uncalibrated camera system Yoshimi, Billibon; Allen, Peter K. 1995 Articles Robotics
46. A Look Back at "Security Problems in the TCP/IP Protocol Suite" Bellovin, Steven Michael 2004 Articles Computer science
47. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
48. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
49. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
50. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
51. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
52. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
53. Analysis of strain and regional variation in gene expression in mouse brain Pavlidis, Paul; Noble, William 2001 Articles Analysis of varianceGene expression--ResearchDNA microarrays--Data processingGeneticsNeurosciencesComputer science
54. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
55. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
56. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
57. An Efficient Algorithm for the Analysis of Cyclic Circuits Neiroukh, Osama; Edwards, Stephen A.; Song, Xiaoyu 2006 Articles Computer science
58. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
59. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
60. A Network Worm Vaccine Architecture Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Articles Computer science