1 - 25 of 191
Number of results to display per page
AuthorTitleSubjectDatePublication Type
1 Baek, Hyun-wookInterparty visibility in a cloud computing platform2018dissertation
2 Shanmugam, Praveen kumarDeidtect - distributed elastic intrusion detection architectureCloud; Distributed Networking; Networking; Orchestration; SDN2016thesis
3 Joseph, JithuCenet-- capability enabled networking: towards least-privileged networkingAccess control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks2015thesis
4 Kunz, JoshuaXNET: capability enabled cloud access control systemComputer science2017thesis
5 Majid, Arslan JavaidSecure communications in filter bank multicarrier spread spectrum systemsDigital Signal Processing; Physical-layer Security; Wireless Communications2017dissertation
6 Zaheer, ZirakEztrust: Network independent perimeterization for microservices2019thesis
7 Zhao, LuA program logic and its application in fully verified software fault isolationSoftware fault isolation; Trusted computing base; TCB; Hoare logic2012-08dissertation
8 Kano, MakitoSeacat: an sdn end-to-end containment architecture2015-08thesis
9 Tripathi, AnandMalware beaconing detection2018thesis
10 Przybyla, Jay J.Enhancing transportation safety and security: a spatial multilevel approachDistracted driving; Nuclear; Planning; Safety; Transportation planning2013-12dissertation
11 Moffitt, Gregory BruceNeutron interaction tool, pyNIC for advanced applications in nuclear power, nuclear medicine, and nuclear securityActivation; Analysis; Neutron2014-12thesis
12 Haralson, David MonkComputation methods for secure energy system operations2020thesis
13 Dimjasevic, MarkoEnhancing automatic software testing for broader applicabilityComputer science; Electrical engineering2018dissertation
14 McKenna, Sean PatrickThe design activity framework: investigating the data visualization design processComputer science; Design2017dissertation
15 Clark, Michael R.Enhancing covert communications with colluding receiversCommunications; Covert; Computer science2010thesis
16 Probst, Matthew JaredDistributed friend-to-friend framework and services using social networksDistributed Systems; Malware Detection; Peer-to-Peer; Social Distance; Social Networks; Social psychology; Computer science2012-12dissertation
17 Jana, SumanOn fast and accurate detection of unauthorized wireless access points using clock skewsWireless LANs; Medium Access Control2009-05-06thesis
18 Du, MinLarge scale system log monitoring and analysis: a data-driven approach2019dissertation
19 Liang, ShuyingStatic analysis of Android applicationsAndroid; Malware; Static analysis2014-08dissertation
20 Balasubramanian, AbhiramTowards a Fast NVMe Layer for a Decomposed KernelComputer science2017thesis
21 Wilson, Anthony JosephDevice-free localization with received signal strength measurements in wireless networksDevice-free; Tag-free; Tracking; Wireless; Electrical engineering2010dissertation
22 Burtsev, AntonDeterministic systems analysisDeterministic replay; Replay debugging; Xen2013-05dissertation
23 Goyal, SachinA collective approach to harness idle resources of end nodesIdle resources; end nodes; collective managers2011-08dissertation
24 Jindal, SonikaMobility management entity function-as-a-service2019dissertation
25 Heffernan, Sean T.Developing signtures in uranium oxides for use in nuclear forensic science2020thesis
1 - 25 of 191