IS 2150 / TEL 2810 Introduction to Security
Network Protocols Network Systems Security Mort Anvari.
Minseok Kwon Department of Computer Science Rochester Institute of Technology [email protected]
Files and Streams
September 4, 2003
Utility Optimization for Dynamic Peer-to-Peer Networks with Tit-for-Tat Constraints
Secure Operating Systems John Mitchell CS 155May 3, 2005.
Locality-Aware Content Distribution Danny Bickson, Dahlia Malkhi, David Rabinowitz.
Detecting Near Duplicates for Web Crawling
CS5412 : Overlay Networks
BLADE, An Attack-Agnostic Approach for Preventing Drive-By Malware Infections