Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Clemson University" +contributor:("Dr. Richard Brooks"). Showing records 1 – 5 of 5 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Clemson University

1. Bommakanti, Venkata Lakshmi Sudheera. Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks.

Degree: MS, Electrical and Computer Engineering (Holcomb Dept. of), 2017, Clemson University

  Unintended side-channel leaks can be exploited by attackers and achieved quickly, and using relatively inexpensive equipment. Cloud providers aren’t equipped to provide assurances of… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bommakanti, V. L. S. (2017). Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/2751

Chicago Manual of Style (16th Edition):

Bommakanti, Venkata Lakshmi Sudheera. “Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks.” 2017. Masters Thesis, Clemson University. Accessed May 23, 2018. https://tigerprints.clemson.edu/all_theses/2751.

MLA Handbook (7th Edition):

Bommakanti, Venkata Lakshmi Sudheera. “Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks.” 2017. Web. 23 May 2018.

Vancouver:

Bommakanti VLS. Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks. [Internet] [Masters thesis]. Clemson University; 2017. [cited 2018 May 23]. Available from: https://tigerprints.clemson.edu/all_theses/2751.

Council of Science Editors:

Bommakanti VLS. Reusable Garbled Circuit Implementation of AES to Avoid Power Analysis Attacks. [Masters Thesis]. Clemson University; 2017. Available from: https://tigerprints.clemson.edu/all_theses/2751


Clemson University

2. Robinson, Jamar. An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing.

Degree: MS, Computer Engineering, 2017, Clemson University

 As we move towards exascale computing, the efficiency of application performance and energy utilization, must be optimized by redefining architectural features and application performance analysis.… (more)

Subjects/Keywords: Core Variation; Openmp; Performance Study; Xeon Phi KNC; Xeon Phi KNL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Robinson, J. (2017). An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/2668

Chicago Manual of Style (16th Edition):

Robinson, Jamar. “An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing.” 2017. Masters Thesis, Clemson University. Accessed May 23, 2018. https://tigerprints.clemson.edu/all_theses/2668.

MLA Handbook (7th Edition):

Robinson, Jamar. “An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing.” 2017. Web. 23 May 2018.

Vancouver:

Robinson J. An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing. [Internet] [Masters thesis]. Clemson University; 2017. [cited 2018 May 23]. Available from: https://tigerprints.clemson.edu/all_theses/2668.

Council of Science Editors:

Robinson J. An Analysis of Variation Between Cores For Intel Xeon Phi Knights Corner And Xeon Phi Knights Landing. [Masters Thesis]. Clemson University; 2017. Available from: https://tigerprints.clemson.edu/all_theses/2668


Clemson University

3. Abdollahi Biron, Zoleikha. A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles.

Degree: PhD, Automotive Engineering, 2017, Clemson University

 The objective of this dissertation is to develop a resilient control approach to secure Cyber Physical Systems (CPS) against cyber-attacks, network failures and potential physical… (more)

Subjects/Keywords: Connected Vehicles; Control; Cyber Physical System; Estimation and Diagnostics; Observer design; Resiliency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdollahi Biron, Z. (2017). A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles. (Doctoral Dissertation). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_dissertations/1869

Chicago Manual of Style (16th Edition):

Abdollahi Biron, Zoleikha. “A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles.” 2017. Doctoral Dissertation, Clemson University. Accessed May 23, 2018. https://tigerprints.clemson.edu/all_dissertations/1869.

MLA Handbook (7th Edition):

Abdollahi Biron, Zoleikha. “A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles.” 2017. Web. 23 May 2018.

Vancouver:

Abdollahi Biron Z. A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles. [Internet] [Doctoral dissertation]. Clemson University; 2017. [cited 2018 May 23]. Available from: https://tigerprints.clemson.edu/all_dissertations/1869.

Council of Science Editors:

Abdollahi Biron Z. A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles. [Doctoral Dissertation]. Clemson University; 2017. Available from: https://tigerprints.clemson.edu/all_dissertations/1869

4. Izard, Ryan. Data Movement Challenges and Solutions with Software Defined Networking.

Degree: PhD, Computer Engineering, 2017, Clemson University

 With the recent rise in cloud computing, applications are routinely accessing and interacting with data on remote resources. Interaction with such remote resources for the… (more)

Subjects/Keywords: data movement; network; openflow; software defined networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Izard, R. (2017). Data Movement Challenges and Solutions with Software Defined Networking. (Doctoral Dissertation). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_dissertations/1910

Chicago Manual of Style (16th Edition):

Izard, Ryan. “Data Movement Challenges and Solutions with Software Defined Networking.” 2017. Doctoral Dissertation, Clemson University. Accessed May 23, 2018. https://tigerprints.clemson.edu/all_dissertations/1910.

MLA Handbook (7th Edition):

Izard, Ryan. “Data Movement Challenges and Solutions with Software Defined Networking.” 2017. Web. 23 May 2018.

Vancouver:

Izard R. Data Movement Challenges and Solutions with Software Defined Networking. [Internet] [Doctoral dissertation]. Clemson University; 2017. [cited 2018 May 23]. Available from: https://tigerprints.clemson.edu/all_dissertations/1910.

Council of Science Editors:

Izard R. Data Movement Challenges and Solutions with Software Defined Networking. [Doctoral Dissertation]. Clemson University; 2017. Available from: https://tigerprints.clemson.edu/all_dissertations/1910


Clemson University

5. Fu, Yu. Using Botnet Technologies to Counteract Network Traffic Analysis.

Degree: PhD, Electrical and Computer Engineering (Holcomb Dept. of), 2017, Clemson University

 Botnets have been problematic for over a decade. They are used to launch malicious activities including DDoS (Distributed-Denial-of-Service), spamming, identity theft, unauthorized bitcoin mining and… (more)

Subjects/Keywords: botnet; censorship; domain generation algorithms; hidden markov models; network security; user privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fu, Y. (2017). Using Botnet Technologies to Counteract Network Traffic Analysis. (Doctoral Dissertation). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_dissertations/2015

Chicago Manual of Style (16th Edition):

Fu, Yu. “Using Botnet Technologies to Counteract Network Traffic Analysis.” 2017. Doctoral Dissertation, Clemson University. Accessed May 23, 2018. https://tigerprints.clemson.edu/all_dissertations/2015.

MLA Handbook (7th Edition):

Fu, Yu. “Using Botnet Technologies to Counteract Network Traffic Analysis.” 2017. Web. 23 May 2018.

Vancouver:

Fu Y. Using Botnet Technologies to Counteract Network Traffic Analysis. [Internet] [Doctoral dissertation]. Clemson University; 2017. [cited 2018 May 23]. Available from: https://tigerprints.clemson.edu/all_dissertations/2015.

Council of Science Editors:

Fu Y. Using Botnet Technologies to Counteract Network Traffic Analysis. [Doctoral Dissertation]. Clemson University; 2017. Available from: https://tigerprints.clemson.edu/all_dissertations/2015

.