CMU

biblio

Visible to the public Extracting configuration knowledge from build files with symbolic analysis

biblio

Visible to the public An empirical study of global malware encounters

biblio

Visible to the public Assessing the Global Cyber and Biological Threat

biblio

Visible to the public Assessment of Risk Perception in Security Requirements Composition

biblio

Visible to the public Inferring Software Component Interaction Dependencies for Adaptation Support

biblio

Visible to the public A systematic analysis of the science of sandboxing