USC Computer Science Technical Reports, no. 941 (2014)
PDF
USC Computer Science Technical Reports, no. 919 (2011)
PDF
USC Computer Science Technical Reports, no. 884 (2006)
PDF
USC Computer Science Technical Reports, no. 605 (1995)
PDF
USC Computer Science Technical Reports, no. 595 (1994)
PDF
USC Computer Science Technical Reports, no. 786 (2003)
PDF
USC Computer Science Technical Reports, no. 930 (2012)
PDF
USC Computer Science Technical Reports, no. 734 (2000)
PDF
USC Computer Science Technical Reports, no. 867 (2005)
PDF
USC Computer Science Technical Reports, no. 853 (2005)
PDF
USC Computer Science Technical Reports, no. 944 (2014)
PDF
USC Computer Science Technical Reports, no. 819 (2004)
PDF
USC Computer Science Technical Reports, no. 811 (2003)
PDF
USC Computer Science Technical Reports, no. 816 (2004)
PDF
Computational model of human behavior in security games with varying number of targets
PDF
Security functional requirements analysis for developing secure software
PDF
Modeling the relative strength of security protocols
PDF
A system for trust evaluation and management leveraging trusted computing technology
PDF
On scheduling, timeliness and security in large scale distributed computing
PDF
The effects of required security on software development effort
PDF
Memorable, secure, and usable authentication secrets
PDF
Towards addressing spatio-temporal aspects in security games
PDF
Hierarchical planning in security games: a game theoretic approach to strategic, tactical and operational decision making
PDF
Dynamic graph analytics for cyber systems security applications
PDF
Improving network security through collaborative sharing
PDF
of 534 
 For more images, please select "images" in the filters.
51 - 100 of 26677
of 534 
Standard Filters