1. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
2. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
3. Automatic Detection of Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
4. Automatic Detection of Previously-Unseen Application States for Deployment Environment Testing and Analysis Murphy, Christian; Vaughan, Moses; Ilahi, Waseem; Kaiser, Gail E. 2010 Reports Computer science
5. Baseline: Metrics for setting a baseline for web vulnerability scanners Dai, Huning; Glass, Michael; Kaiser, Gail E. 2010 Reports Computer science
6. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
7. Comparing Speed of Provider Data Entry: Electronic Versus Paper Methods Jackson, Kevin M.; Kaiser, Gail E.; Wong, Lyndon; Rabinowitz, Daniel; Chiang, Michael F. 2010 Reports Computer science
8. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
9. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning 2010 Reports Computer science
10. Empirical Evaluation of Approaches to Testing Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
11. Empirical Study of Concurrency Mutation Operators for Java Wu, Leon Li; Kaiser, Gail E. 2010 Reports Computer science
12. Infinite-Dimensional Integration on Weighted Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
13. Metamorphic Testing Techniques to Detect Defects in Applications without Test Oracles Murphy, Christian 2010 Reports Computer science
14. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2010 Reports Computer science
15. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
16. NetServ: Early Prototype Experiences Kester, Michael S.; Liu, Eric; Lee, Jae Woo; Schulzrinne, Henning G. 2010 Reports Computer science
17. ONEChat: Enabling Group Chat and Messaging in Opportunistic Networks Cui, Heming; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2010 Reports Computer science
18. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
19. Quasi-Polynomial Tractability Gnewuch, Michael; Wozniakowski, Henryk 2010 Reports Computer science
21. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
22. Testing and Validating Machine Learning Classifiers by Metamorphic Testing Xie, Xiaoyuan; Ho, Joshua W. K.; Murphy, Christian; Kaiser, Gail E.; Xu, Baowen; Chen, Tsong Yueh 2010 Reports Computer science
23. The Tradeoffs of Societal Computing Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2010 Reports Computer science
24. The weHelp Reference Architecture for Community-Driven Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
25. Towards Using Cached Data Mining for Large Scale Recommender Systems Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2010 Reports Computer science
26. Tractability of the Fredholm problem of the second kind Werschulz, Arthur G.; Wozniakowski, Henryk 2010 Reports Computer science
27. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
28. Weighted Geometric Discrepancies and Numerical Integration on Reproducing Kernel Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science