Curriculum Vitae Stephen M. Pizer September 1997.doc.doc.doc.doc
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
PhishZoo: Detecting Phishing Websites By Looking at Them Sadia Afroz Rachel Greenstadt.
An Introduction to Issues Regarding Data Integrity & Virtual Machine Security.
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage Hierarchical Clustering
rbacDSL - slides from Code Generation 2014
Deepthi ratnayake
Software Testing: Introduction
Situation based analysis and control for supporting Event-web applications
From Events to Situations: An Event-web perspective
HathiTrust Research Center Data Capsule Overview 09.10.14
Approximating Attack Surfaces with Stack Traces [ICSE 15]