1. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
2. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
3. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings Johnson, Maritza Lupe 2012 Theses Computer scienceComputer securityComputer security--ManagementFacebook (Electronic resource)
4. Symbolic Model Learning: New Algorithms and Applications Argyros, Georgios 2019 Theses Computer scienceAlgorithmsSoftwareMathematical modelsComputer security
5. Symbiotes and defensive Mutualism: Moving Target Defense Cui, Ang; Stolfo, Salvatore 2011 Chapters (Layout Features) Computer software--Design and constructionComputer programmingComputer securityComputer science
6. Societal Computing Sheth, Swapneel 2013 Reports Computer scienceOnline social networks--Social aspectsPrivacy--ResearchPrivacy, Right ofComputer security
7. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
8. Security Engineering of Hardware-Software Interfaces Tang, Beng Chiew 2018 Theses Computer scienceComputer securityHardwareComputer software
9. Security by Checklist Bellovin, Steven Michael 2008 Articles Computer scienceComputer securityComputers--Access controlUser interfaces (Computer systems)
10. Secure Computation Towards Practical Applications Krell Loy, Fernando 2016 Theses Computer securityData encryption (Computer science)Computer scienceCryptographyInformation technology
11. Repurposing Software Defenses with Specialized Hardware Sinha, Kanad 2019 Theses Computer scienceComputer engineeringComputer security
12. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
13. On Efficiency and Accuracy of Data Flow Tracking Systems Jee, Kangkook 2015 Theses Data flow computingProgram transformation (Computer programming)Soft errors (Computer science)Computer securityComputer science
14. Multi-Functional Interfaces for Accelerators Piccolboni, Luca 2022 Theses Computer scienceComputer engineeringSystems on a chip--Design and constructionComputer security
15. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation Dutta, Preetam Kumar 2019 Theses Computer scienceMachine learningComputer securityBusiness enterprises--Security measuresInternet users
16. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
17. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
18. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
19. Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Chapters (Layout Features) Malware (Computer software)Computer programmingComputer securityComputer science
20. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing