Search Results
4. Damage Management in Database Management Systems
Open Access
6. A STUDY OF SELECTED SECURITY ISSUES IN WIRELESS NETWORKS
Open Access
10. Gaining Big Picture Awareness in Enterprise Cyber Security Defense
Restricted (Penn State Only)
11. Identifying Private Data Leakage Threats in Web Browsers
Open Access
13. Using Bayesian Networks for Enterprise Network Security Analysis
Open Access
15. Pipelined Symbolic Taint Analysis
Open Access
19. TOWARDS ENHANCING ANDROID APPLICATION AND SYSTEM SECURITY
Open Access
20. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS
Open Access