Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Memorable, secure, and usable authentication secrets
PDF
Security functional requirements analysis for developing secure software
PDF
Improving network security through collaborative sharing
PDF
Sacrificing cost, performance and usability for privacy: understanding the value of privacy in a multi‐criteria decision problem
PDF
Hierarchical planning in security games: a game theoretic approach to strategic, tactical and operational decision making
PDF
The implementation of P.L. 93-647: Title XX of the Social Security Act
PDF
A study to determine content of a two-weeks' unit on old age security as part of a course in economic citizenship for secondary school students
PDF
Predicting and planning against real-world adversaries: an end-to-end pipeline to combat illegal wildlife poachers on a global scale
PDF
Reducing inter-component communication vulnerabilities in event-based systems
PDF
Software quality analysis: a value-based approach
PDF
Data-driven aggregated fractal dynamic load modeling for early warning of voltage collapse
PDF
Modeling, searching, and explaining abnormal instances in multi-relational networks
PDF
Toward understanding mobile apps at scale
PDF
The making of a crisis communication plan for a large, public, national professional services company
PDF
USC microgrid development conceptual plan
PDF
A methodology for a real estate blockchain application utilizing geographic information systems (GIS)
PDF
Education based incarceration: educate to change the organizational culture of corrections in the Los Angeles County Sheriff’s Department
PDF
Cartographic design and interaction: An integrated user-centered agile software development framework for Web GIS applications
PDF
The Communication Effectiveness Of Footnotes In Published Corporate Financial Statements
PDF
Projects and hobbies in general science
PDF
The application of finite polynomial rings to number theoretic crypto-systems
PDF
Cooperative guidance records for junior high school classroom teachers
PDF
Problems of hygiene and education for the adolescent deaf in Los Angeles
PDF
Development and study of access control models for semantic networks
PDF
Negotiation from weakness: Concept, model and application to strategic negotiations
PDF
of 11