Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Colorado State University" +contributor:("Ray, Indrakshi"). Showing records 1 – 30 of 36 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Colorado State University

1. Manchanda, Saksham. On approximating transitivity and tractability of graphs.

Degree: MS(M.S.), Computer Science, 2016, Colorado State University

 In the general case, in a simple, undirected graph, the problems of finding the largest clique, minimum colouring, maximum independent set and minimum vertex cover… (more)

Subjects/Keywords: beta measure; NP complete; perfect graphs; Graph theory; approximation algorithms; parametrized algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Manchanda, S. (2016). On approximating transitivity and tractability of graphs. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/176622

Chicago Manual of Style (16th Edition):

Manchanda, Saksham. “On approximating transitivity and tractability of graphs.” 2016. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/176622.

MLA Handbook (7th Edition):

Manchanda, Saksham. “On approximating transitivity and tractability of graphs.” 2016. Web. 18 Jan 2020.

Vancouver:

Manchanda S. On approximating transitivity and tractability of graphs. [Internet] [Masters thesis]. Colorado State University; 2016. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/176622.

Council of Science Editors:

Manchanda S. On approximating transitivity and tractability of graphs. [Masters Thesis]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176622


Colorado State University

2. Amarnath, Athith. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 Security is a very serious concern in this era of digital world. Protecting and controlling access to secured data and services has given more emphasis… (more)

Subjects/Keywords: Byzantine fault tolerance; Random Walk; Moving Target Defense; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amarnath, A. (2019). On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/193171

Chicago Manual of Style (16th Edition):

Amarnath, Athith. “On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.” 2019. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/193171.

MLA Handbook (7th Edition):

Amarnath, Athith. “On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.” 2019. Web. 18 Jan 2020.

Vancouver:

Amarnath A. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/193171.

Council of Science Editors:

Amarnath A. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/193171


Colorado State University

3. Mukherjee, Subhojeet. Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Computer users are not safe, be it at home or in public places. Public networks are more often administered by trained individuals who attempt to… (more)

Subjects/Keywords: Cyber-security; Graph; Semantic; Grammar; Concept; NLP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mukherjee, S. (2018). Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/185622

Chicago Manual of Style (16th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A.” 2018. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/185622.

MLA Handbook (7th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A.” 2018. Web. 18 Jan 2020.

Vancouver:

Mukherjee S. Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/185622.

Council of Science Editors:

Mukherjee S. Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/185622


Colorado State University

4. Kar, Diptendu Mohan. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 DNA synthesis has become increasingly common, and many synthetic DNA molecules are licensed intellectual property (IP). DNA samples are shared between academic labs, ordered from… (more)

Subjects/Keywords: DNA; Identity Based Signatures; Reed-Solomon Codes; Elliptic Curve Cryptography; Cyber-Bio Security; Pairing-based Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kar, D. M. (2019). Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/195249

Chicago Manual of Style (16th Edition):

Kar, Diptendu Mohan. “Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.” 2019. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/195249.

MLA Handbook (7th Edition):

Kar, Diptendu Mohan. “Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.” 2019. Web. 18 Jan 2020.

Vancouver:

Kar DM. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/195249.

Council of Science Editors:

Kar DM. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/195249


Colorado State University

5. Zhang, Han. Detecting advanced botnets in enterprise networks.

Degree: PhD, Computer Science, 2017, Colorado State University

 A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive… (more)

Subjects/Keywords: DNS; Network Security; Intrusion Detection System; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2017). Detecting advanced botnets in enterprise networks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181362

Chicago Manual of Style (16th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/181362.

MLA Handbook (7th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Web. 18 Jan 2020.

Vancouver:

Zhang H. Detecting advanced botnets in enterprise networks. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/181362.

Council of Science Editors:

Zhang H. Detecting advanced botnets in enterprise networks. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181362


Colorado State University

6. Shirazi, Hossein. Unbiased phishing detection using domain name based features.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Internet users are coming under a barrage of phishing attacks of increasing frequency and sophistication. While these attacks have been remarkably resilient against the vast… (more)

Subjects/Keywords: Domain name; Phishing; Biased datasets; Phishing detection; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shirazi, H. (2018). Unbiased phishing detection using domain name based features. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/191323

Chicago Manual of Style (16th Edition):

Shirazi, Hossein. “Unbiased phishing detection using domain name based features.” 2018. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/191323.

MLA Handbook (7th Edition):

Shirazi, Hossein. “Unbiased phishing detection using domain name based features.” 2018. Web. 18 Jan 2020.

Vancouver:

Shirazi H. Unbiased phishing detection using domain name based features. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/191323.

Council of Science Editors:

Shirazi H. Unbiased phishing detection using domain name based features. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191323


Colorado State University

7. Basnet, Rejina. Integration of task-attribute based access control model for mobile workflow authorization and management.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 Workflow is the automation of process logistics for managing simple every day to complex multi-user tasks. By defining a workflow with proper constraints, an organization… (more)

Subjects/Keywords: Attribute Based Access Control; TCPN analysis; Workflow Security; Policy Machine; Access Control; Workflow Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basnet, R. (2019). Integration of task-attribute based access control model for mobile workflow authorization and management. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/195323

Chicago Manual of Style (16th Edition):

Basnet, Rejina. “Integration of task-attribute based access control model for mobile workflow authorization and management.” 2019. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/195323.

MLA Handbook (7th Edition):

Basnet, Rejina. “Integration of task-attribute based access control model for mobile workflow authorization and management.” 2019. Web. 18 Jan 2020.

Vancouver:

Basnet R. Integration of task-attribute based access control model for mobile workflow authorization and management. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/195323.

Council of Science Editors:

Basnet R. Integration of task-attribute based access control model for mobile workflow authorization and management. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/195323


Colorado State University

8. Alnnfiai, Majdi Khalid. Scalable large margin pairwise learning algorithms.

Degree: PhD, Computer Science, 2019, Colorado State University

 Classification is a major task in machine learning and data mining applications. Many of these applications involve building a classification model using a large volume… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alnnfiai, M. K. (2019). Scalable large margin pairwise learning algorithms. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197256

Chicago Manual of Style (16th Edition):

Alnnfiai, Majdi Khalid. “Scalable large margin pairwise learning algorithms.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/197256.

MLA Handbook (7th Edition):

Alnnfiai, Majdi Khalid. “Scalable large margin pairwise learning algorithms.” 2019. Web. 18 Jan 2020.

Vancouver:

Alnnfiai MK. Scalable large margin pairwise learning algorithms. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/197256.

Council of Science Editors:

Alnnfiai MK. Scalable large margin pairwise learning algorithms. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197256


Colorado State University

9. Homayouni, Hajar. Approach for testing the Extract-Transform-Load process in data warehouse systems, An.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Enterprises use data warehouses to accumulate data from multiple sources for data analysis and research. Since organizational decisions are often made based on the data… (more)

Subjects/Keywords: ETL; Mutation Analysis; Test Assertion; Extract-Transform-Load; Data Warehouse; Software Testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Homayouni, H. (2018). Approach for testing the Extract-Transform-Load process in data warehouse systems, An. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/189268

Chicago Manual of Style (16th Edition):

Homayouni, Hajar. “Approach for testing the Extract-Transform-Load process in data warehouse systems, An.” 2018. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/189268.

MLA Handbook (7th Edition):

Homayouni, Hajar. “Approach for testing the Extract-Transform-Load process in data warehouse systems, An.” 2018. Web. 18 Jan 2020.

Vancouver:

Homayouni H. Approach for testing the Extract-Transform-Load process in data warehouse systems, An. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/189268.

Council of Science Editors:

Homayouni H. Approach for testing the Extract-Transform-Load process in data warehouse systems, An. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/189268


Colorado State University

10. Algarni, Abdullah Mahdi. Quantitative economics of security: software vulnerabilities and data breaches.

Degree: PhD, Computer Science, 2016, Colorado State University

 Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Algarni, A. M. (2016). Quantitative economics of security: software vulnerabilities and data breaches. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176634

Chicago Manual of Style (16th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/176634.

MLA Handbook (7th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Web. 18 Jan 2020.

Vancouver:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/176634.

Council of Science Editors:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176634


Colorado State University

11. Shannigrahi, Susmit. Future of networking is the future of Big Data, The.

Degree: PhD, Computer Science, 2019, Colorado State University

 Scientific domains such as Climate Science, High Energy Particle Physics (HEP), Genomics, Biology, and many others are increasingly moving towards data-oriented workflows where each of… (more)

Subjects/Keywords: Future Internet Architecture; Large Scientific Data; Networking for big data; Information Centric Networking; Big Science; Named Data Networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shannigrahi, S. (2019). Future of networking is the future of Big Data, The. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197325

Chicago Manual of Style (16th Edition):

Shannigrahi, Susmit. “Future of networking is the future of Big Data, The.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/197325.

MLA Handbook (7th Edition):

Shannigrahi, Susmit. “Future of networking is the future of Big Data, The.” 2019. Web. 18 Jan 2020.

Vancouver:

Shannigrahi S. Future of networking is the future of Big Data, The. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/197325.

Council of Science Editors:

Shannigrahi S. Future of networking is the future of Big Data, The. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197325


Colorado State University

12. Al Lail, Mustafa. Unified Modeling Language framework for specifying and analyzing temporal properties, A.

Degree: PhD, Computer Science, 2018, Colorado State University

 In the context of Model-Driven Engineering (MDE), designers use the Unified Modeling Language (UML) to create models that drive the entire development process. Once UML… (more)

Subjects/Keywords: Properties; Temporal; Verification; Specification; Model Checking; UML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Lail, M. (2018). Unified Modeling Language framework for specifying and analyzing temporal properties, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/191492

Chicago Manual of Style (16th Edition):

Al Lail, Mustafa. “Unified Modeling Language framework for specifying and analyzing temporal properties, A.” 2018. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/191492.

MLA Handbook (7th Edition):

Al Lail, Mustafa. “Unified Modeling Language framework for specifying and analyzing temporal properties, A.” 2018. Web. 18 Jan 2020.

Vancouver:

Al Lail M. Unified Modeling Language framework for specifying and analyzing temporal properties, A. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/191492.

Council of Science Editors:

Al Lail M. Unified Modeling Language framework for specifying and analyzing temporal properties, A. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191492


Colorado State University

13. Strizhov, Mikhail. Towards a secure and efficient search over encrypted cloud data.

Degree: PhD, Computer Science, 2016, Colorado State University

 Cloud computing enables new types of services where the computational and network resources are available online through the Internet. One of the most popular services… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Strizhov, M. (2016). Towards a secure and efficient search over encrypted cloud data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176763

Chicago Manual of Style (16th Edition):

Strizhov, Mikhail. “Towards a secure and efficient search over encrypted cloud data.” 2016. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/176763.

MLA Handbook (7th Edition):

Strizhov, Mikhail. “Towards a secure and efficient search over encrypted cloud data.” 2016. Web. 18 Jan 2020.

Vancouver:

Strizhov M. Towards a secure and efficient search over encrypted cloud data. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/176763.

Council of Science Editors:

Strizhov M. Towards a secure and efficient search over encrypted cloud data. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176763


Colorado State University

14. Al-Refai, Mohammed. Towards model-based regression test selection.

Degree: PhD, Computer Science, 2019, Colorado State University

 Modern software development processes often use UML models to plan and manage the evolution of software systems. Regression testing is important to ensure that the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Refai, M. (2019). Towards model-based regression test selection. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197269

Chicago Manual of Style (16th Edition):

Al-Refai, Mohammed. “Towards model-based regression test selection.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/197269.

MLA Handbook (7th Edition):

Al-Refai, Mohammed. “Towards model-based regression test selection.” 2019. Web. 18 Jan 2020.

Vancouver:

Al-Refai M. Towards model-based regression test selection. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/197269.

Council of Science Editors:

Al-Refai M. Towards model-based regression test selection. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197269


Colorado State University

15. Lazrig, Ibrahim Meftah. Privacy preserving linkage and sharing of sensitive data.

Degree: PhD, Computer Science, 2018, Colorado State University

 Sensitive data, such as personal and business information, is collected by many service providers nowadays. This data is considered as a rich source of information… (more)

Subjects/Keywords: Record-Linkage; Privacy; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lazrig, I. M. (2018). Privacy preserving linkage and sharing of sensitive data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/191341

Chicago Manual of Style (16th Edition):

Lazrig, Ibrahim Meftah. “Privacy preserving linkage and sharing of sensitive data.” 2018. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/191341.

MLA Handbook (7th Edition):

Lazrig, Ibrahim Meftah. “Privacy preserving linkage and sharing of sensitive data.” 2018. Web. 18 Jan 2020.

Vancouver:

Lazrig IM. Privacy preserving linkage and sharing of sensitive data. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/191341.

Council of Science Editors:

Lazrig IM. Privacy preserving linkage and sharing of sensitive data. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191341


Colorado State University

16. Shah, Anant. Systems for characterizing Internet routing.

Degree: PhD, Computer Science, 2018, Colorado State University

 Today the Internet plays a critical role in our lives; we rely on it for communication, business, and more recently, smart home operations. Users expect… (more)

Subjects/Keywords: Border Gateway Protocol; Internet Routing; Routing Anomalies; Detours; Autonomous Systems; Outages

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shah, A. (2018). Systems for characterizing Internet routing. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/189413

Chicago Manual of Style (16th Edition):

Shah, Anant. “Systems for characterizing Internet routing.” 2018. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/189413.

MLA Handbook (7th Edition):

Shah, Anant. “Systems for characterizing Internet routing.” 2018. Web. 18 Jan 2020.

Vancouver:

Shah A. Systems for characterizing Internet routing. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/189413.

Council of Science Editors:

Shah A. Systems for characterizing Internet routing. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/189413

17. Mulamba Kadimbadimba, Dieudonné. On designing large, secure and resilient networked systems.

Degree: PhD, Computer Science, 2019, Colorado State University

 Defending large networked systems against rapidly evolving cyber attacks is challenging. This is because of several factors. First, cyber defenders are always fighting an asymmetric… (more)

Subjects/Keywords: Moving Target Defense; Secure networks; Sybil detection; Online Social Network; Complex networks; Social Network Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulamba Kadimbadimba, D. (2019). On designing large, secure and resilient networked systems. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197321

Chicago Manual of Style (16th Edition):

Mulamba Kadimbadimba, Dieudonné. “On designing large, secure and resilient networked systems.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/197321.

MLA Handbook (7th Edition):

Mulamba Kadimbadimba, Dieudonné. “On designing large, secure and resilient networked systems.” 2019. Web. 18 Jan 2020.

Vancouver:

Mulamba Kadimbadimba D. On designing large, secure and resilient networked systems. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/197321.

Council of Science Editors:

Mulamba Kadimbadimba D. On designing large, secure and resilient networked systems. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197321

18. Mosharraf Ghahfarokhi, Negar. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.

Degree: PhD, Electrical and Computer Engineering, 2016, Colorado State University

To view the abstract, please see the full text of the document. Advisors/Committee Members: Jayasumana, Anura P. (advisor), Ray, Indrakshi (advisor), Pezeshki, Ali (committee member), Malaiya, Yashwant (committee member).

…40 3.4.3 Colorado State University Dataset… …traffic against DDoS attacks by analysis of network traffic collected from Colorado State… …State University [20] and University of Auckland dataset [6]. The… …University, Auckland University, and attack traffic from CAIDA. It is important to minimize the… …evaluated using the DARPA 1998 dataset [19] as well as extensive analysis over Colorado… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mosharraf Ghahfarokhi, N. (2016). Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176690

Chicago Manual of Style (16th Edition):

Mosharraf Ghahfarokhi, Negar. “Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.” 2016. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/176690.

MLA Handbook (7th Edition):

Mosharraf Ghahfarokhi, Negar. “Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.” 2016. Web. 18 Jan 2020.

Vancouver:

Mosharraf Ghahfarokhi N. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/176690.

Council of Science Editors:

Mosharraf Ghahfarokhi N. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176690

19. Belyaev, Kirill. On component-oriented access control in lightweight virtualized server environments.

Degree: PhD, Computer Science, 2018, Colorado State University

 With the advancements in contemporary multi-core CPU architectures and increase in main memory capacity, it is now possible for a server operating system (OS), such… (more)

Subjects/Keywords: Data and application security; Security architectures; Tuple spaces; Denial of service protection; Access control; Service and systems design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belyaev, K. (2018). On component-oriented access control in lightweight virtualized server environments. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/185748

Chicago Manual of Style (16th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2018. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/185748.

MLA Handbook (7th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2018. Web. 18 Jan 2020.

Vancouver:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/185748.

Council of Science Editors:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/185748

20. Sun, Wuliang. Using Slicing Techniques to Support Scalable Rigorous Analysis of Class Models.

Degree: PhD, Computer Science, 2015, Colorado State University

 Slicing is a reduction technique that has been applied to class models to support model comprehension, analysis, and other modeling activities. In particular, slicing techniques… (more)

Subjects/Keywords: Slicing; Class Model; UML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, W. (2015). Using Slicing Techniques to Support Scalable Rigorous Analysis of Class Models. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/166933

Chicago Manual of Style (16th Edition):

Sun, Wuliang. “Using Slicing Techniques to Support Scalable Rigorous Analysis of Class Models.” 2015. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/166933.

MLA Handbook (7th Edition):

Sun, Wuliang. “Using Slicing Techniques to Support Scalable Rigorous Analysis of Class Models.” 2015. Web. 18 Jan 2020.

Vancouver:

Sun W. Using Slicing Techniques to Support Scalable Rigorous Analysis of Class Models. [Internet] [Doctoral dissertation]. Colorado State University; 2015. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/166933.

Council of Science Editors:

Sun W. Using Slicing Techniques to Support Scalable Rigorous Analysis of Class Models. [Doctoral Dissertation]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/166933

21. Alotaibi, Saud Saleh. Sentiment Analysis in the Arabic Language Using Machine Learning.

Degree: PhD, Computer Science, 2015, Colorado State University

 Sentiment analysis has recently become one of the growing areas of research related to natural language processing and machine learning. Much opinion and sentiment about… (more)

Subjects/Keywords: Machine learning; Sentiment analysis; Arabic sentiment; Subjectivity classification; Polarity classificaion

…Translation tOsst jAmς wlAy kwlwrAdw AlHkwmy sn 1870 kkly kwlwrAdw llzrAς Colorado State University… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, S. S. (2015). Sentiment Analysis in the Arabic Language Using Machine Learning. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/167091

Chicago Manual of Style (16th Edition):

Alotaibi, Saud Saleh. “Sentiment Analysis in the Arabic Language Using Machine Learning.” 2015. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/167091.

MLA Handbook (7th Edition):

Alotaibi, Saud Saleh. “Sentiment Analysis in the Arabic Language Using Machine Learning.” 2015. Web. 18 Jan 2020.

Vancouver:

Alotaibi SS. Sentiment Analysis in the Arabic Language Using Machine Learning. [Internet] [Doctoral dissertation]. Colorado State University; 2015. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/167091.

Council of Science Editors:

Alotaibi SS. Sentiment Analysis in the Arabic Language Using Machine Learning. [Doctoral Dissertation]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/167091

22. Moataz, Tarik. Searching over encrypted data.

Degree: PhD, Computer Science, 2017, Colorado State University

 Cloud services offer reduced costs, elasticity and a promised unlimited managed storage space that attract many end-users. File sharing, collaborative platforms, email platforms, back-up servers… (more)

Subjects/Keywords: Oblivious RAM; Structured Encryption; Searchable Encryption; Applied Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moataz, T. (2017). Searching over encrypted data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181313

Chicago Manual of Style (16th Edition):

Moataz, Tarik. “Searching over encrypted data.” 2017. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/181313.

MLA Handbook (7th Edition):

Moataz, Tarik. “Searching over encrypted data.” 2017. Web. 18 Jan 2020.

Vancouver:

Moataz T. Searching over encrypted data. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/181313.

Council of Science Editors:

Moataz T. Searching over encrypted data. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181313


Colorado State University

23. Burnett, Kevin. Modeling and querying uncertain data for activity recognition systems using PostgreSQL.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 Activity Recognition (AR) systems interpret events in video streams by identifying actions and objects and combining these descriptors into events. Relational databases can be used… (more)

Subjects/Keywords: PostgreSQL; Viterbi

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burnett, K. (2007). Modeling and querying uncertain data for activity recognition systems using PostgreSQL. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/67998

Chicago Manual of Style (16th Edition):

Burnett, Kevin. “Modeling and querying uncertain data for activity recognition systems using PostgreSQL.” 2007. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/67998.

MLA Handbook (7th Edition):

Burnett, Kevin. “Modeling and querying uncertain data for activity recognition systems using PostgreSQL.” 2007. Web. 18 Jan 2020.

Vancouver:

Burnett K. Modeling and querying uncertain data for activity recognition systems using PostgreSQL. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/67998.

Council of Science Editors:

Burnett K. Modeling and querying uncertain data for activity recognition systems using PostgreSQL. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/67998


Colorado State University

24. Jiang, Yi. Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks.

Degree: MS(M.S.), Electrical and Computer Engineering, 2007, Colorado State University

 A Virtual Coordinate System (VCS) for Wireless Sensor Networks (WSNs) characterizes each sensor node's location using the minimum number of hops to a specific set… (more)

Subjects/Keywords: 3D sensor networks; wireless sensor networks; virtual coordinate system; tracking and prediction algorithm; rouing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, Y. (2007). Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/81031

Chicago Manual of Style (16th Edition):

Jiang, Yi. “Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks.” 2007. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/81031.

MLA Handbook (7th Edition):

Jiang, Yi. “Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks.” 2007. Web. 18 Jan 2020.

Vancouver:

Jiang Y. Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/81031.

Council of Science Editors:

Jiang Y. Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/81031


Colorado State University

25. Abdunabi, Ramadan. Access control framework for mobile applications, An.

Degree: PhD, Computer Science, 2007, Colorado State University

 With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user in… (more)

Subjects/Keywords: access control; access control protocol; computer security; enforcement; policy model; RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdunabi, R. (2007). Access control framework for mobile applications, An. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78814

Chicago Manual of Style (16th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/78814.

MLA Handbook (7th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2007. Web. 18 Jan 2020.

Vancouver:

Abdunabi R. Access control framework for mobile applications, An. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/78814.

Council of Science Editors:

Abdunabi R. Access control framework for mobile applications, An. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/78814


Colorado State University

26. Xie, Xing. Multilevel secure data stream management system.

Degree: PhD, Computer Science, 2007, Colorado State University

 With the advent of mobile and sensor devices, situation monitoring applications are now feasible. The data processing system should be able to collect large amount… (more)

Subjects/Keywords: distributed MLS; trusted MLS; replicated MLS; multilevel security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, X. (2007). Multilevel secure data stream management system. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/80188

Chicago Manual of Style (16th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/80188.

MLA Handbook (7th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2007. Web. 18 Jan 2020.

Vancouver:

Xie X. Multilevel secure data stream management system. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/80188.

Council of Science Editors:

Xie X. Multilevel secure data stream management system. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/80188


Colorado State University

27. Mulamba Kadimbadimba, Dieudonne. On the design of a secure and anonymous publish-subscribe system.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 The reliability and the high availability of data have made online servers very popular among single users or organizations like hospitals, insurance companies or administrations.… (more)

Subjects/Keywords: anonymous communication; publish-subscribe; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulamba Kadimbadimba, D. (2007). On the design of a secure and anonymous publish-subscribe system. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/68130

Chicago Manual of Style (16th Edition):

Mulamba Kadimbadimba, Dieudonne. “On the design of a secure and anonymous publish-subscribe system.” 2007. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/68130.

MLA Handbook (7th Edition):

Mulamba Kadimbadimba, Dieudonne. “On the design of a secure and anonymous publish-subscribe system.” 2007. Web. 18 Jan 2020.

Vancouver:

Mulamba Kadimbadimba D. On the design of a secure and anonymous publish-subscribe system. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/68130.

Council of Science Editors:

Mulamba Kadimbadimba D. On the design of a secure and anonymous publish-subscribe system. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/68130


Colorado State University

28. Kim, Jin Yoo. Vulnerability discovery in multiple version software systems: open source and commercial software systems.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 The vulnerability discovery process for a program describes the rate at which the vulnerabilities are discovered. A model of the discovery process can be used… (more)

Subjects/Keywords: DBMS; VDM; Apache HTTP Web server; Mysql; database management system; software vulnerability discovery model; Computer viruses; Spyware (Computer software); Computer security  – Methodology; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, J. Y. (2007). Vulnerability discovery in multiple version software systems: open source and commercial software systems. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/26808

Chicago Manual of Style (16th Edition):

Kim, Jin Yoo. “Vulnerability discovery in multiple version software systems: open source and commercial software systems.” 2007. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/26808.

MLA Handbook (7th Edition):

Kim, Jin Yoo. “Vulnerability discovery in multiple version software systems: open source and commercial software systems.” 2007. Web. 18 Jan 2020.

Vancouver:

Kim JY. Vulnerability discovery in multiple version software systems: open source and commercial software systems. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/26808.

Council of Science Editors:

Kim JY. Vulnerability discovery in multiple version software systems: open source and commercial software systems. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/26808


Colorado State University

29. Zaliva, Vadim. Applying static code analysis to firewall policies for the purpose of anomaly detection.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 Treating modern firewall policy languages as imperative, special purpose programming languages, in this thesis we will try to apply static code analysis techniques for the… (more)

Subjects/Keywords: datalog language; firewall policy language; anomaly detection algorithms; static code analysis; Firewalls (Computer security)  – Programming; Anomaly detection (Computer security)  – Programming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaliva, V. (2007). Applying static code analysis to firewall policies for the purpose of anomaly detection. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/28638

Chicago Manual of Style (16th Edition):

Zaliva, Vadim. “Applying static code analysis to firewall policies for the purpose of anomaly detection.” 2007. Masters Thesis, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/28638.

MLA Handbook (7th Edition):

Zaliva, Vadim. “Applying static code analysis to firewall policies for the purpose of anomaly detection.” 2007. Web. 18 Jan 2020.

Vancouver:

Zaliva V. Applying static code analysis to firewall policies for the purpose of anomaly detection. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/28638.

Council of Science Editors:

Zaliva V. Applying static code analysis to firewall policies for the purpose of anomaly detection. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/28638


Colorado State University

30. Dhanapala, Dulanjalie C. Anchor centric virtual coordinate systems in Wireless Sensor Networks: from self-organization to network awareness.

Degree: PhD, Electrical and Computer Engineering, 2007, Colorado State University

 Future Wireless Sensor Networks (WSNs) will be collections of thousands to millions of sensor nodes, automated to self-organize, adapt, and collaborate to facilitate distributed monitoring… (more)

Subjects/Keywords: network awareness; phenomena discovery; routing; sensor networks; topology preserving maps; virtual coordinate systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dhanapala, D. C. (2007). Anchor centric virtual coordinate systems in Wireless Sensor Networks: from self-organization to network awareness. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/71554

Chicago Manual of Style (16th Edition):

Dhanapala, Dulanjalie C. “Anchor centric virtual coordinate systems in Wireless Sensor Networks: from self-organization to network awareness.” 2007. Doctoral Dissertation, Colorado State University. Accessed January 18, 2020. http://hdl.handle.net/10217/71554.

MLA Handbook (7th Edition):

Dhanapala, Dulanjalie C. “Anchor centric virtual coordinate systems in Wireless Sensor Networks: from self-organization to network awareness.” 2007. Web. 18 Jan 2020.

Vancouver:

Dhanapala DC. Anchor centric virtual coordinate systems in Wireless Sensor Networks: from self-organization to network awareness. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2020 Jan 18]. Available from: http://hdl.handle.net/10217/71554.

Council of Science Editors:

Dhanapala DC. Anchor centric virtual coordinate systems in Wireless Sensor Networks: from self-organization to network awareness. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/71554

[1] [2]

.