Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Clemson University" +contributor:("Dr. Richard Brooks"). Showing records 1 – 5 of 5 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Clemson University

1. Bommakanti, Venkata Lakshmi Sudheera. Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks.

Degree: MS, Electrical and Computer Engineering (Holcomb Dept. of), 2017, Clemson University

  Unintended side-channel leaks can be exploited by attackers and achieved quickly, and using relatively inexpensive equipment. Cloud providers aren’t equipped to provide assurances of… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bommakanti, V. L. S. (2017). Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks. (Masters Thesis). Clemson University. Retrieved from http://tigerprints.clemson.edu/all_theses/2751

Chicago Manual of Style (16th Edition):

Bommakanti, Venkata Lakshmi Sudheera. “Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks.” 2017. Masters Thesis, Clemson University. Accessed November 19, 2017. http://tigerprints.clemson.edu/all_theses/2751.

MLA Handbook (7th Edition):

Bommakanti, Venkata Lakshmi Sudheera. “Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks.” 2017. Web. 19 Nov 2017.

Vancouver:

Bommakanti VLS. Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks. [Internet] [Masters thesis]. Clemson University; 2017. [cited 2017 Nov 19]. Available from: http://tigerprints.clemson.edu/all_theses/2751.

Council of Science Editors:

Bommakanti VLS. Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks. [Masters Thesis]. Clemson University; 2017. Available from: http://tigerprints.clemson.edu/all_theses/2751


Clemson University

2. Robinson, Jamar. An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing.

Degree: MS, Computer Engineering, 2017, Clemson University

 As we move towards exascale computing, the efficiency of application performance and energy utilization, must be optimized by redefining architectural features and application performance analysis.… (more)

Subjects/Keywords: Core Variation; Openmp; Performance Study; Xeon Phi KNC; Xeon Phi KNL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Robinson, J. (2017). An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing. (Masters Thesis). Clemson University. Retrieved from http://tigerprints.clemson.edu/all_theses/2668

Chicago Manual of Style (16th Edition):

Robinson, Jamar. “An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing.” 2017. Masters Thesis, Clemson University. Accessed November 19, 2017. http://tigerprints.clemson.edu/all_theses/2668.

MLA Handbook (7th Edition):

Robinson, Jamar. “An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing.” 2017. Web. 19 Nov 2017.

Vancouver:

Robinson J. An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing. [Internet] [Masters thesis]. Clemson University; 2017. [cited 2017 Nov 19]. Available from: http://tigerprints.clemson.edu/all_theses/2668.

Council of Science Editors:

Robinson J. An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing. [Masters Thesis]. Clemson University; 2017. Available from: http://tigerprints.clemson.edu/all_theses/2668


Clemson University

3. Abdollahi Biron, Zoleikha. A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles.

Degree: PhD, Automotive Engineering, 2017, Clemson University

 The objective of this dissertation is to develop a resilient control approach to secure Cyber Physical Systems (CPS) against cyber-attacks, network failures and potential physical… (more)

Subjects/Keywords: Connected Vehicles; Control; Cyber Physical System; Estimation and Diagnostics; Observer design; Resiliency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdollahi Biron, Z. (2017). A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles. (Doctoral Dissertation). Clemson University. Retrieved from http://tigerprints.clemson.edu/all_dissertations/1869

Chicago Manual of Style (16th Edition):

Abdollahi Biron, Zoleikha. “A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles.” 2017. Doctoral Dissertation, Clemson University. Accessed November 19, 2017. http://tigerprints.clemson.edu/all_dissertations/1869.

MLA Handbook (7th Edition):

Abdollahi Biron, Zoleikha. “A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles.” 2017. Web. 19 Nov 2017.

Vancouver:

Abdollahi Biron Z. A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles. [Internet] [Doctoral dissertation]. Clemson University; 2017. [cited 2017 Nov 19]. Available from: http://tigerprints.clemson.edu/all_dissertations/1869.

Council of Science Editors:

Abdollahi Biron Z. A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles. [Doctoral Dissertation]. Clemson University; 2017. Available from: http://tigerprints.clemson.edu/all_dissertations/1869

4. Izard, Ryan. Data Movement Challenges and Solutions with Software Defined Networking.

Degree: PhD, Computer Engineering, 2017, Clemson University

 With the recent rise in cloud computing, applications are routinely accessing and interacting with data on remote resources. Interaction with such remote resources for the… (more)

Subjects/Keywords: data movement; network; openflow; software defined networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Izard, R. (2017). Data Movement Challenges and Solutions with Software Defined Networking. (Doctoral Dissertation). Clemson University. Retrieved from http://tigerprints.clemson.edu/all_dissertations/1910

Chicago Manual of Style (16th Edition):

Izard, Ryan. “Data Movement Challenges and Solutions with Software Defined Networking.” 2017. Doctoral Dissertation, Clemson University. Accessed November 19, 2017. http://tigerprints.clemson.edu/all_dissertations/1910.

MLA Handbook (7th Edition):

Izard, Ryan. “Data Movement Challenges and Solutions with Software Defined Networking.” 2017. Web. 19 Nov 2017.

Vancouver:

Izard R. Data Movement Challenges and Solutions with Software Defined Networking. [Internet] [Doctoral dissertation]. Clemson University; 2017. [cited 2017 Nov 19]. Available from: http://tigerprints.clemson.edu/all_dissertations/1910.

Council of Science Editors:

Izard R. Data Movement Challenges and Solutions with Software Defined Networking. [Doctoral Dissertation]. Clemson University; 2017. Available from: http://tigerprints.clemson.edu/all_dissertations/1910


Clemson University

5. Fu, Yu. Using Botnet Technologies to Counteract Network Traffic Analysis.

Degree: PhD, Electrical and Computer Engineering (Holcomb Dept. of), 2017, Clemson University

 Botnets have been problematic for over a decade. They are used to launch malicious activities including DDoS (Distributed-Denial-of-Service), spamming, identity theft, unauthorized bitcoin mining and… (more)

Subjects/Keywords: botnet; censorship; domain generation algorithms; hidden markov models; network security; user privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fu, Y. (2017). Using Botnet Technologies to Counteract Network Traffic Analysis. (Doctoral Dissertation). Clemson University. Retrieved from http://tigerprints.clemson.edu/all_dissertations/2015

Chicago Manual of Style (16th Edition):

Fu, Yu. “Using Botnet Technologies to Counteract Network Traffic Analysis.” 2017. Doctoral Dissertation, Clemson University. Accessed November 19, 2017. http://tigerprints.clemson.edu/all_dissertations/2015.

MLA Handbook (7th Edition):

Fu, Yu. “Using Botnet Technologies to Counteract Network Traffic Analysis.” 2017. Web. 19 Nov 2017.

Vancouver:

Fu Y. Using Botnet Technologies to Counteract Network Traffic Analysis. [Internet] [Doctoral dissertation]. Clemson University; 2017. [cited 2017 Nov 19]. Available from: http://tigerprints.clemson.edu/all_dissertations/2015.

Council of Science Editors:

Fu Y. Using Botnet Technologies to Counteract Network Traffic Analysis. [Doctoral Dissertation]. Clemson University; 2017. Available from: http://tigerprints.clemson.edu/all_dissertations/2015

.