Search Results
2. Enhancing SVATS with Interactivity, Security and Reliability
Open Access
3. Damage Management in Database Management Systems
Open Access
4. Performance Aspects of Security-Aware Database Systems
Open Access
5. SOCIAL NETWORK RISK ANALYSIS AND PRIVACY FRAMEWORK
Open Access
6. Towards Compromise Resilient Wireless Sensor Networks
Open Access
9. Protecting Programs During Resource Access
Open Access
10. Android Market Reconstruction And Analysis
Open Access
13. Enforcing Execution Integrity for Software Systems
Open Access
14. THIRD-PARTY LIBRARY SECURITY MANAGEMENT FOR MOBILE APPLICATIONS
Open Access
15. INFORMED COGNITIVE RADIOS
Open Access
18. Towards Secure Solutions for Cloud Applications
Open Access
19. Control Channel Vulnerability in Software Defined Network
Open Access
20. Assuring Security and Privacy of Emerging Non-Volatile Memories
Open Access
21. Ensuring Service Integrity in Cloud Computing
Open Access
22. Noise Resilient and Secure Quantum Computing
Open Access
23. Service Management: Resource Allocation and Security
Open Access
26. SECURITY PATTERN DETECTION IN SOFTWARE CODE USING MACHINE LEARNING ALGORITHMS
Restricted (Penn State Only)
27. Deviant Behavior Analysis of 5G Core Network Implementations
Restricted (Penn State Only)
28. Analysis of Influential Objects In Smart Home Platforms
Restricted (Penn State Only)
29. Honeymodels: Machine Learning Honeypots
Open Access
31. Studying the Performance and Security Trade-offs in Modern Linux Systems
Restricted (Penn State Only)