Tech Reports in Computer Science and Engineering: Recent submissions

Now showing items 6-10 of 1220

    • Digital Words: Moving Forward with Measuring the Readability of Online Texts 

      Redmiles, Elissa M.; Maszkiewicz, Lisa; Hwang, Emily; Kuchhal, Dhruv; Liu, Everest; Morales, Miraida; Peskov, Denis; Rao, Sudha; Stevens, Rock; Gligoric, Kristina; Kross, Sean; Mazurek, Michelle L.; Daumé, Hal III (2018-10-26)
      The readability of a digital text can influence people’s information acquisition (Wikipedia articles), online security (how-to articles), and even health (WebMD). Readability metrics can also alter search rankings and are ...
    • A Comparison of Header and Deep Packet Features when Detecting Network Intrusions 

      Watson, Gavin (2018-07-07)
      A classical multilayer perceptron algorithm and novel convolutional neural network payload classifying algorithm are presented for use on a realistic network intrusion detection dataset. The payload classifying algorithm ...
    • Ethics Emerging: The Story of Privacy and Security Perceptions in Virtual Reality 

      Adams, Devon; Bah, Alseny; Barwulor, Catherine; Musabay, Nureli; Pitkin, Kadeem; Redmiles, Elissa M. (2018-02-20)
      Virtual reality (VR) technology aims to transport the user to a virtual world, fully immersing them in an experience entirely separate from the real world. VR devices can use sensor data to draw deeply personal inferences ...
    • An Application of Jeeves for Honeypot Sanitization 

      Webster, Ashton (2018-02-15)
      Being able to quickly create realistic honeypots is very useful for obtaining accurate information about attacker behavior. However, creating realistic honeypots requires sanitization of the original system from which the ...
    • Fast and Service-preserving Recovery from Malware Infections using CRIU 

      Webster, Ashton; Eckenrod, Ryan; Purtilo, James (2018-02-15)
      Once a computer system has been infected with malware, restoring it to an uninfected state often requires costly service-interrupting actions such as rolling back to a stable snapshot or reimaging the system entirely. We ...