Author | Title | Subject | Date | Publication Type | ||
---|---|---|---|---|---|---|
1 | Baek, Hyun-wook | Interparty visibility in a cloud computing platform | 2018 | dissertation | ||
2 | Shanmugam, Praveen kumar | Deidtect - distributed elastic intrusion detection architecture | Cloud; Distributed Networking; Networking; Orchestration; SDN | 2016 | thesis | |
3 | Joseph, Jithu | Cenet-- capability enabled networking: towards least-privileged networking | Access control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks | 2015 | thesis | |
4 | Kunz, Joshua | XNET: capability enabled cloud access control system | Computer science | 2017 | thesis | |
5 | Majid, Arslan Javaid | Secure communications in filter bank multicarrier spread spectrum systems | Digital Signal Processing; Physical-layer Security; Wireless Communications | 2017 | dissertation | |
6 | Zaheer, Zirak | Eztrust: Network independent perimeterization for microservices | 2019 | thesis | ||
7 | Zhao, Lu | A program logic and its application in fully verified software fault isolation | Software fault isolation; Trusted computing base; TCB; Hoare logic | 2012-08 | dissertation | |
8 | Kano, Makito | Seacat: an sdn end-to-end containment architecture | 2015-08 | thesis | ||
9 | Tripathi, Anand | Malware beaconing detection | 2018 | thesis | ||
10 | Przybyla, Jay J. | Enhancing transportation safety and security: a spatial multilevel approach | Distracted driving; Nuclear; Planning; Safety; Transportation planning | 2013-12 | dissertation | |
11 | Moffitt, Gregory Bruce | Neutron interaction tool, pyNIC for advanced applications in nuclear power, nuclear medicine, and nuclear security | Activation; Analysis; Neutron | 2014-12 | thesis | |
12 | Haralson, David Monk | Computation methods for secure energy system operations | 2020 | thesis | ||
13 | Dimjasevic, Marko | Enhancing automatic software testing for broader applicability | Computer science; Electrical engineering | 2018 | dissertation | |
14 | McKenna, Sean Patrick | The design activity framework: investigating the data visualization design process | Computer science; Design | 2017 | dissertation | |
15 | Clark, Michael R. | Enhancing covert communications with colluding receivers | Communications; Covert; Computer science | 2010 | thesis | |
16 | Probst, Matthew Jared | Distributed friend-to-friend framework and services using social networks | Distributed Systems; Malware Detection; Peer-to-Peer; Social Distance; Social Networks; Social psychology; Computer science | 2012-12 | dissertation | |
17 | Jana, Suman | On fast and accurate detection of unauthorized wireless access points using clock skews | Wireless LANs; Medium Access Control | 2009-05-06 | thesis | |
18 | Du, Min | Large scale system log monitoring and analysis: a data-driven approach | 2019 | dissertation | ||
19 | Liang, Shuying | Static analysis of Android applications | Android; Malware; Static analysis | 2014-08 | dissertation | |
20 | Balasubramanian, Abhiram | Towards a Fast NVMe Layer for a Decomposed Kernel | Computer science | 2017 | thesis | |
21 | Wilson, Anthony Joseph | Device-free localization with received signal strength measurements in wireless networks | Device-free; Tag-free; Tracking; Wireless; Electrical engineering | 2010 | dissertation | |
22 | Burtsev, Anton | Deterministic systems analysis | Deterministic replay; Replay debugging; Xen | 2013-05 | dissertation | |
23 | Goyal, Sachin | A collective approach to harness idle resources of end nodes | Idle resources; end nodes; collective managers | 2011-08 | dissertation | |
24 | Jindal, Sonika | Mobility management entity function-as-a-service | 2019 | dissertation | ||
25 | Heffernan, Sean T. | Developing signtures in uranium oxides for use in nuclear forensic science | 2020 | thesis |