1. Detection, Triage, and Attribution of PII Phishing Sites Roellke, Dennis 2022 Theses Computer scienceIdentity theftMachine learningPhishingInternet--Security measuresJavaScript (Computer program language)
2. Virtually Defenseless: Americaʼs Struggle to Defend Itself in Cyberspace and What Can Be Done About It Prieto, Daniel B. 2022 Articles Computer securityCyber intelligence (Computer security)Internet--Security measuresComputer networks--Security measuresSocial mediaCyberspace--Political aspectsInternational relationsSecurity, International
3. Columbia World Projects Cybersecurity Forum Report Columbia World Projects 2018 Reports Computer securityInternetInternet--Security measuresElections--Data processingSocial media
4. Understanding Flaws in the Deployment and Implementation of Web Encryption Sivakorn, Suphannee 2018 Theses Computer scienceData encryption (Computer science)Web serversInternet--Security measures
5. Cyber Power and the International System Lonergan, Shawn William 2017 Theses Political scienceSecurity, InternationalCyberspace--Political aspectsInternet--Security measures
6. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
7. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science