Most Recent Additions*

PDF

A New Distributed Chinese Wall Security Policy Model
Saad Fehis, Omar Nouali, and Mohand-Tahar Kechadi

PDF

A Survey of Social Network Forensics
Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, and Ramazan S. Aygun

PDF

Bloom Filters Optimized Wu-Manber for Intrusion Detection
Monther Aldwairia, Koloud Al-Khamaiseh, Fatima Alharbi, and Babar Shah

Link

Developing Deliberate Practices for PS150 and ES204
Yan Tang Ph.D. and Bereket Berhane Ph.D.

PDF

Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques
J. Bruce Johnson, Susan D. Allen, Jonathan Merten, Lewis Johnson, Daniel Pinkham, and Scott W. Reeve

*Updated as of 05/23/17.