Indiana University
IUScholarWorks
Home
→
Indiana University Bloomington
→
Office of the Vice President for Information Technology/University Information Technology Services
→
Pervasive Technology Institute
→
Center for Applied Cybersecurity Research
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 3 out of a total of 13 results for collection: Center for Applied Cybersecurity Research.
(0.321 seconds)
Now showing items 11-13 of 13
Previous Page
1
2
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Analysis of authentication events and graphs using Python
Heiland, Randy
;
Welch, Von
(
2015-05
)
The Web's PKI: An Expository Review and Certificate Validation Cost Simulation
Heiland, Randy
;
Garrison, William C. III
;
Qiao, Yechen
;
Lee, Adam J.
;
Welch, Von
(
2016-09-30
)
CTSC Secure Software Engineering Best Practices
Heiland, Randy
;
Sons, Susan
(
2016-08-16
)
Now showing items 11-13 of 13
Previous Page
1
2
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of IUScholarWorks
Communities & Collections
By Issue Date
Authors
Titles
Subjects
By Submit Date
This Collection
By Issue Date
Authors
Titles
Subjects
By Submit Date
My Account
Login
Register
Discover
Author
Heiland, Randy (13)
Welch, Von (9)
Koranda, Scott (3)
Garrison, William C. III (2)
Lee, Adam J. (2)
Marru, Suresh (2)
Pierce, Marlon (2)
Adams, Andrew (1)
Deelman, Ewa (1)
Heymann, Elisa (1)
... View More
Subject
cybersecurity (13)
science gateways (6)
cyberinfrastructure (3)
authentication (2)
PKI (2)
computer science education (1)
cryptography (1)
data integrity (1)
graphs (1)
networking (1)
... View More
Date Issued
2019 (1)
2017 (1)
2016 (6)
2015 (2)
2014 (3)