Semi-Supervised Self Training to Assess the Credibility of Tweets | 0 | 0.34 | 2021 |
A Study Of Gender Bias In Face Presentation Attack And Its Mitigation | 0 | 0.34 | 2021 |
Identifying Panic Triggers from Disaster-Related Tweets. | 0 | 0.34 | 2020 |
Teaching Flooding Attack to the SDN Data Plane with POGIL | 0 | 0.34 | 2020 |
Identifying Security Concerns Based on a Use Case Ontology Framework. | 0 | 0.34 | 2020 |
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts | 0 | 0.34 | 2020 |
Developing and Assessing an Educational Game for Teaching Access Control | 0 | 0.34 | 2020 |
Security Labs for Software Defined Networks in CloudLab | 0 | 0.34 | 2020 |
Developing And Assessing Educational Games To Enhance Cyber Security Learning In Computer Science | 0 | 0.34 | 2019 |
Mitigating Phishing Attacks: An Overview | 0 | 0.34 | 2019 |
Deep Learning Approach for U.S. Traffic Sign Recognition | 0 | 0.34 | 2019 |
Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net. | 0 | 0.34 | 2019 |
Touch-Based Active Cloud Authentication Using Traditional Machine Learning And Lstm On A Distributed Tensorflow Framework | 1 | 0.35 | 2019 |
Applying Artificial Immune System for Intrusion Detection | 0 | 0.34 | 2018 |
Enhancing Security Education Through Designing SDN Security Labs in CloudLab. | 0 | 0.34 | 2018 |
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection | 0 | 0.34 | 2018 |
Creating Abuse Cases Based on Attack Patterns: A User Study | 0 | 0.34 | 2017 |
Semi-supervised Random Forest for Intrusion Detection Network. | 0 | 0.34 | 2017 |
Demystifying ad fraud. | 0 | 0.34 | 2017 |
Developing Abuse Cases Based on Threat Modeling and Attack Patterns. | 3 | 0.47 | 2015 |
Developing a course module for teaching cryptography programming on Android | 0 | 0.34 | 2015 |
Using a case study to teach students about finding and fixing logic flaws in software | 0 | 0.34 | 2015 |
Integrating Mobile Computing and Security into a Computer Science Curriculum (Abstract Only) | 1 | 0.38 | 2015 |
Cloud Computing Threats and Provider Security Assessment. | 1 | 0.36 | 2015 |
Retrieving relevant CAPEC attack patterns for secure software development | 3 | 0.51 | 2014 |
Techniques for retaining low performing students: high-need student mentoring program (abstract only) | 0 | 0.34 | 2014 |
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences | 3 | 0.55 | 2014 |
New hands-on labs on browser security (abstract only) | 1 | 0.39 | 2014 |
A Survey Of Security Standards Applicable To Health Information Systems | 1 | 0.35 | 2013 |
Cloud computing and security challenges | 12 | 0.75 | 2012 |
A Survey Of U.S. Laws For Health Information Security & Privacy | 1 | 0.51 | 2012 |
Developing an interdisciplinary health informatics security and privacy program (abstract only) | 0 | 0.34 | 2012 |
Observation of recent Microsoft Zero-Day vulnerabilities | 0 | 0.34 | 2011 |
The Design and Implementation of a Cryptographic Education Tool. | 1 | 0.36 | 2011 |
A Visualization based Simulator for SYN Flood Attacks. | 0 | 0.34 | 2011 |
Visualization Tools for Teaching Computer Security | 5 | 0.64 | 2010 |
Case studies for teaching physical security and security policy | 2 | 0.41 | 2010 |
Designing an SOA-Based Earthquake Forewarning System using BPMN | 0 | 0.34 | 2010 |
Laboratory Design For Demonstrating Phishing | 0 | 0.34 | 2009 |
Low Bit Rate ROI-Based SAR Image Compression | 0 | 0.34 | 2009 |
Multiresolution Target Detection in Wavelet Domain for SAR Imagery | 1 | 0.35 | 2009 |
Using a Practice Oriented Approach to Teach Web Security Course | 0 | 0.34 | 2009 |
Using packet sniffer simulator in the class: experience and evaluation | 2 | 0.47 | 2007 |
Trustworthy remote compiling services for grid-based scientific applications | 1 | 0.36 | 2007 |
Securing analysis patterns | 7 | 0.65 | 2007 |
Engine fault diagnosis based on multi-sensor information fusion using Dempster-Shafer evidence theory | 85 | 4.37 | 2007 |
LAN attacker: a visual education tool | 4 | 0.59 | 2006 |
A Personal Software Process Tool for Eclipse Environment | 2 | 0.40 | 2005 |
Secure Remote Compiling Services On The Grid | 0 | 0.34 | 2005 |
An Analysis Pattern for Course Management. | 2 | 0.53 | 2003 |