Search

Search Constraints

Start Over You searched for: Graduate Program Computer Science and Engineering Remove constraint Graduate Program: Computer Science and Engineering Committee Member Patrick Drew Mcdaniel Remove constraint Committee Member: Patrick Drew Mcdaniel

Search Results

1. Port Authority: Integrity Verification Through Connection Management

open_access
Open Access

2. RETROFITTING PROGRAMS FOR COMPLETE SECURITY MEDIATION

open_access
Open Access

4. ASYNCHRONOUS ATTESTATION SCHEME FOR PRESERVING THE INTEGRITY OF LONG-TERM DIGITAL ARCHIVES

open_access
Open Access

5. Security and Privacy Aspects in Wireless and Mobile Networks

open_access
Open Access

7. Leveraging Emerging Disk Functionality for New Security Services

open_access
Open Access

10. Securing Mobile Phones in the Evolving Mobile Ecosystem

open_access
Open Access

11. Secure Systems Development Using Security-Typed Languages

open_access
Open Access

12. Characterizing the Impact if Rigidity on the Security of Cellular Telecommunications Networks

open_access
Open Access

14. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS

open_access
Open Access

15. Methods for Specifying and Resolving Security Policy Compliance Problems

open_access
Open Access

16. PROTOCOLS FOR SECURE COMMUNICATION AND TRAITOR TRACING IN ADVANCED METERING INFRASTRUCTURE

open_access
Open Access

19. Analysis Techniques for Mobile Operating System Security

open_access
Open Access

22. Practical System Integrity Verification in Cloud Computing Environments

open_access
Open Access

25. Pitfalls in the Automated Strengthening of Passwords

open_access
Open Access

29. Analysis of Inter-Component Communication in Mobile Applications Through Retargeting

open_access
Open Access

33. THIRD-PARTY LIBRARY SECURITY MANAGEMENT FOR MOBILE APPLICATIONS

open_access
Open Access

34. Stochastic Resource Allocation Strategies With Uncertain Information In Sensor Networks

open_access
Open Access

35. SECURITY IN SOFTWARE DEFINED NETWORKING - AN ANALYSIS OF NEW ATTACK AND DEFENSE VECTORS

open_access
Open Access

37. Regulating Programs’ Access To Privacy-Sensitive Sensors

open_access
Open Access

39. Automated IoT Security and Privacy Analysis

open_access
Open Access

45. Building a Secure and Privacy-Preserving Smart Camera System

open_access
Open Access

46. Attack Resilience of Cache Replacement Policies: Implementation and Experimentation In SDN

open_access
Open Access

47. PHYSICS BASED DETECTION SYSTEM FOR MISREPORTING ATTACKS IN V2X CORE DATA FIELDS

open_access
Open Access

48. Generating Adversarial Network Traffic Flows with GANs

open_access
Open Access