Please use this identifier to cite or link to this community:

http://hdl.handle.net/1903/5

 

The technical reports collections in this community are deposited by the Library of the Computer Science department. If you have questions about these collections, please contact library staff at library@cs.umd.edu

Sub-communities within this community

Recent Submissions

  • Cell Maps on the Human Genome 

    Cherniak, Christopher; Rodriguez-Esteban, Raul (2018-06-01)
    Sub-cellular organization is significantly mapped onto the human genome: Evidence is reported for a "cellunculus" -- on the model of a homunculus, on the H. sapiens genome. We have previously described a statistically ...
  • Digital Words: Moving Forward with Measuring the Readability of Online Texts 

    Redmiles, Elissa M.; Maszkiewicz, Lisa; Hwang, Emily; Kuchhal, Dhruv; Liu, Everest; Morales, Miraida; Peskov, Denis; Rao, Sudha; Stevens, Rock; Gligoric, Kristina; Kross, Sean; Mazurek, Michelle L.; Daumé, Hal III (2018-10-26)
    The readability of a digital text can influence people’s information acquisition (Wikipedia articles), online security (how-to articles), and even health (WebMD). Readability metrics can also alter search rankings and are ...
  • A Comparison of Header and Deep Packet Features when Detecting Network Intrusions 

    Watson, Gavin (2018-07-07)
    A classical multilayer perceptron algorithm and novel convolutional neural network payload classifying algorithm are presented for use on a realistic network intrusion detection dataset. The payload classifying algorithm ...
  • Ethics Emerging: The Story of Privacy and Security Perceptions in Virtual Reality 

    Adams, Devon; Bah, Alseny; Barwulor, Catherine; Musabay, Nureli; Pitkin, Kadeem; Redmiles, Elissa M. (2018-02-20)
    Virtual reality (VR) technology aims to transport the user to a virtual world, fully immersing them in an experience entirely separate from the real world. VR devices can use sensor data to draw deeply personal inferences ...
  • An Application of Jeeves for Honeypot Sanitization 

    Webster, Ashton (2018-02-15)
    Being able to quickly create realistic honeypots is very useful for obtaining accurate information about attacker behavior. However, creating realistic honeypots requires sanitization of the original system from which the ...

View more