1. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography
2. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
3. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
4. Security by Checklist Bellovin, Steven Michael 2008 Articles Computer scienceComputer securityComputers--Access controlUser interfaces (Computer systems)
5. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
6. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
7. Symbiotes and defensive Mutualism: Moving Target Defense Cui, Ang; Stolfo, Salvatore 2011 Chapters (Layout Features) Computer software--Design and constructionComputer programmingComputer securityComputer science
8. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings Johnson, Maritza Lupe 2012 Theses Computer scienceComputer securityComputer security--ManagementFacebook (Electronic resource)
9. Societal Computing Sheth, Swapneel 2013 Reports Computer scienceOnline social networks--Social aspectsPrivacy--ResearchPrivacy, Right ofComputer security
10. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
11. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
12. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
13. Embedded System Security: A Software-based Approach Cui, Ang 2015 Theses Embedded computer systemsComputer software--Security measuresEmbedded computer systems--ProgrammingEmbedded computer systems--Design and constructionComputer securityComputer science
14. Empirical Measurement of Defense in Depth Boggs, Nathaniel 2015 Theses Firewalls (Computer security)Virus inhibitorsIntrusion detection systems (Computer security)Computer securityComputer science
15. Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Chapters (Layout Features) Malware (Computer software)Computer programmingComputer securityComputer science
16. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
17. On Efficiency and Accuracy of Data Flow Tracking Systems Jee, Kangkook 2015 Theses Data flow computingProgram transformation (Computer programming)Soft errors (Computer science)Computer securityComputer science
18. Secure Computation Towards Practical Applications Krell Loy, Fernando 2016 Theses Computer securityData encryption (Computer science)Computer scienceCryptographyInformation technology
19. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
20. CLKscrew: Exposing the Perils of Security-Oblivious Energy Management, Usenix 2018 (Distinguished Paper Award) Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2018 Conference Objects Computer scienceComputer networksComputer securityEnergy consumption
21. Combining Programs to Enhance Security Software Kang, Yuan Jochen 2018 Theses Computer scienceComputer securityComputer security--Computer programs
22. Security Engineering of Hardware-Software Interfaces Tang, Beng Chiew 2018 Theses Computer scienceComputer securityHardwareComputer software
23. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
24. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing
25. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
26. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation Dutta, Preetam Kumar 2019 Theses Computer scienceMachine learningComputer securityBusiness enterprises--Security measuresInternet users
27. Repurposing Software Defenses with Specialized Hardware Sinha, Kanad 2019 Theses Computer scienceComputer engineeringComputer security
28. Symbolic Model Learning: New Algorithms and Applications Argyros, Georgios 2019 Theses Computer scienceAlgorithmsSoftwareMathematical modelsComputer security
29. A Secure and Formally Verified Commodity Multiprocessor Hypervisor Li, Shih-Wei 2021 Theses Computer scienceMultiprocessors--ProgrammingComputer securityVirtual computer systemsLinux
30. Bespoke Security for Resource Constrained Cyber-Physical Systems Arroyo, Miguel Angel 2021 Theses Computer scienceComputer securityCooperating objects (Computer systems)Drone aircraftAutonomous vehicles
31. Multi-Functional Interfaces for Accelerators Piccolboni, Luca 2022 Theses Computer scienceComputer engineeringSystems on a chip--Design and constructionComputer security