CSC 482/582: Computer Security
CSC 386 Operating Systems Concepts
CS590F Software Reliability
CS5038: The Electronic Society - Homepages | The University of
CS 494/594 Computer and Network Security - UTK-EECS
CS 494/594 Computer and Network Security - UTK-EECS
CS 356 – Lecture 9 Malicious Code
Cryptography and Coding Theory
Crypto in data security
Cryptanalysis of Stream Cipher
CrowdMining Mining association rules from the crowd
Capacity Planning and Modeling Tools for Data Center Design and
Can We Survive the Next Information Security Attack
Campus Network Usage Policy
Call for Papers: HotPlanet 2015 6th International Workshop on Hot
Call for Papers The 4th International Workshop on Security and
Call For Paper
Calhoun: The NPS Institutional Archive
Caldicott - Acute Trusts Knowledge base
Cafe Cracks: Attacks on Unsecured Wireless Networks
C06.InformationSecur.. - SIUE Computer Science