1. Some Initial Thoughts about Quantum Malware Stolfo, Salvatore J. 2023 Essays Quantum computingComputer securityMalware (Computer software)
2. Multi-Functional Interfaces for Accelerators Piccolboni, Luca 2022 Theses Computer scienceComputer engineeringSystems on a chip--Design and constructionComputer security
3. A Secure and Formally Verified Commodity Multiprocessor Hypervisor Li, Shih-Wei 2021 Theses Computer scienceMultiprocessors--ProgrammingComputer securityVirtual computer systemsLinux
4. Bespoke Security for Resource Constrained Cyber-Physical Systems Arroyo, Miguel Angel 2021 Theses Computer scienceComputer securityCooperating objects (Computer systems)Drone aircraftAutonomous vehicles
5. Predictive Privacy: Modeling Privacy Harms Radway, Sarah 2021 Theses Data protectionComputer securityMachine learningPrivacy, Right of
6. A New Doctrine for Hardware Security Hastings, Adam K.; Sethumadhavan, Simha 2020 Reports ComputersComputer securityComputers--Economic aspects
7. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing
8. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
9. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation Dutta, Preetam Kumar 2019 Theses Computer scienceMachine learningComputer securityBusiness enterprises--Security measuresInternet users
10. Repurposing Software Defenses with Specialized Hardware Sinha, Kanad 2019 Theses Computer scienceComputer engineeringComputer security
11. Symbolic Model Learning: New Algorithms and Applications Argyros, Georgios 2019 Theses Computer scienceAlgorithmsSoftwareMathematical modelsComputer security
12. CLKscrew: Exposing the Perils of Security-Oblivious Energy Management, Usenix 2018 (Distinguished Paper Award) Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2018 Conference Objects Computer scienceComputer networksComputer securityEnergy consumption
13. Combining Programs to Enhance Security Software Kang, Yuan Jochen 2018 Theses Computer scienceComputer securityComputer security--Computer programs
14. Security Engineering of Hardware-Software Interfaces Tang, Beng Chiew 2018 Theses Computer scienceComputer securityHardwareComputer software
15. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
16. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
17. Secure Computation Towards Practical Applications Krell Loy, Fernando 2016 Theses Computer securityData encryption (Computer science)Computer scienceCryptographyInformation technology
18. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
19. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
20. Embedded System Security: A Software-based Approach Cui, Ang 2015 Theses Embedded computer systemsComputer software--Security measuresEmbedded computer systems--ProgrammingEmbedded computer systems--Design and constructionComputer securityComputer science
21. Empirical Measurement of Defense in Depth Boggs, Nathaniel 2015 Theses Firewalls (Computer security)Virus inhibitorsIntrusion detection systems (Computer security)Computer securityComputer science
22. Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Chapters (Layout Features) Malware (Computer software)Computer programmingComputer securityComputer science
23. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
24. On Efficiency and Accuracy of Data Flow Tracking Systems Jee, Kangkook 2015 Theses Data flow computingProgram transformation (Computer programming)Soft errors (Computer science)Computer securityComputer science
25. Societal Computing Sheth, Swapneel 2013 Reports Computer scienceOnline social networks--Social aspectsPrivacy--ResearchPrivacy, Right ofComputer security
26. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
27. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings Johnson, Maritza Lupe 2012 Theses Computer scienceComputer securityComputer security--ManagementFacebook (Electronic resource)
28. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
29. Symbiotes and defensive Mutualism: Moving Target Defense Cui, Ang; Stolfo, Salvatore 2011 Chapters (Layout Features) Computer software--Design and constructionComputer programmingComputer securityComputer science
30. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
31. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
32. Security by Checklist Bellovin, Steven Michael 2008 Articles Computer scienceComputer securityComputers--Access controlUser interfaces (Computer systems)
33. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
34. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography