Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Colorado State University" +contributor:("Ray, Indrakshi"). Showing records 1 – 30 of 39 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Colorado State University

1. Mulamba Kadimbadimba, Dieudonne. On the design of a secure and anonymous publish-subscribe system.

Degree: MS(M.S.), Computer Science, 2012, Colorado State University

 The reliability and the high availability of data have made online servers very popular among single users or organizations like hospitals, insurance companies or administrations.… (more)

Subjects/Keywords: anonymous communication; publish-subscribe; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulamba Kadimbadimba, D. (2012). On the design of a secure and anonymous publish-subscribe system. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/68130

Chicago Manual of Style (16th Edition):

Mulamba Kadimbadimba, Dieudonne. “On the design of a secure and anonymous publish-subscribe system.” 2012. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/68130.

MLA Handbook (7th Edition):

Mulamba Kadimbadimba, Dieudonne. “On the design of a secure and anonymous publish-subscribe system.” 2012. Web. 23 Jan 2021.

Vancouver:

Mulamba Kadimbadimba D. On the design of a secure and anonymous publish-subscribe system. [Internet] [Masters thesis]. Colorado State University; 2012. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/68130.

Council of Science Editors:

Mulamba Kadimbadimba D. On the design of a secure and anonymous publish-subscribe system. [Masters Thesis]. Colorado State University; 2012. Available from: http://hdl.handle.net/10217/68130


Colorado State University

2. Burnett, Kevin. Modeling and querying uncertain data for activity recognition systems using PostgreSQL.

Degree: MS(M.S.), Computer Science, 2012, Colorado State University

 Activity Recognition (AR) systems interpret events in video streams by identifying actions and objects and combining these descriptors into events. Relational databases can be used… (more)

Subjects/Keywords: PostgreSQL; Viterbi

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burnett, K. (2012). Modeling and querying uncertain data for activity recognition systems using PostgreSQL. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/67998

Chicago Manual of Style (16th Edition):

Burnett, Kevin. “Modeling and querying uncertain data for activity recognition systems using PostgreSQL.” 2012. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/67998.

MLA Handbook (7th Edition):

Burnett, Kevin. “Modeling and querying uncertain data for activity recognition systems using PostgreSQL.” 2012. Web. 23 Jan 2021.

Vancouver:

Burnett K. Modeling and querying uncertain data for activity recognition systems using PostgreSQL. [Internet] [Masters thesis]. Colorado State University; 2012. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/67998.

Council of Science Editors:

Burnett K. Modeling and querying uncertain data for activity recognition systems using PostgreSQL. [Masters Thesis]. Colorado State University; 2012. Available from: http://hdl.handle.net/10217/67998


Colorado State University

3. Manchanda, Saksham. On approximating transitivity and tractability of graphs.

Degree: MS(M.S.), Computer Science, 2016, Colorado State University

 In the general case, in a simple, undirected graph, the problems of finding the largest clique, minimum colouring, maximum independent set and minimum vertex cover… (more)

Subjects/Keywords: beta measure; NP complete; perfect graphs; graph theory; approximation algorithms; parametrized algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Manchanda, S. (2016). On approximating transitivity and tractability of graphs. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/176622

Chicago Manual of Style (16th Edition):

Manchanda, Saksham. “On approximating transitivity and tractability of graphs.” 2016. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/176622.

MLA Handbook (7th Edition):

Manchanda, Saksham. “On approximating transitivity and tractability of graphs.” 2016. Web. 23 Jan 2021.

Vancouver:

Manchanda S. On approximating transitivity and tractability of graphs. [Internet] [Masters thesis]. Colorado State University; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/176622.

Council of Science Editors:

Manchanda S. On approximating transitivity and tractability of graphs. [Masters Thesis]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176622


Colorado State University

4. Reutimann, Brandt R. Applications of simulation in the evaluation of SCADA and ICS security.

Degree: MS(M.S.), Computer Science, 2020, Colorado State University

 Power grids, gas pipelines, and manufacturing centers provide an interesting challenge for cybersecurity research. Known as supervisory control and data acquisition systems (SCADA), they can… (more)

Subjects/Keywords: gas pipelines; SCADA; cybersecurity; simulation; industrial control systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reutimann, B. R. (2020). Applications of simulation in the evaluation of SCADA and ICS security. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/212013

Chicago Manual of Style (16th Edition):

Reutimann, Brandt R. “Applications of simulation in the evaluation of SCADA and ICS security.” 2020. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/212013.

MLA Handbook (7th Edition):

Reutimann, Brandt R. “Applications of simulation in the evaluation of SCADA and ICS security.” 2020. Web. 23 Jan 2021.

Vancouver:

Reutimann BR. Applications of simulation in the evaluation of SCADA and ICS security. [Internet] [Masters thesis]. Colorado State University; 2020. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/212013.

Council of Science Editors:

Reutimann BR. Applications of simulation in the evaluation of SCADA and ICS security. [Masters Thesis]. Colorado State University; 2020. Available from: http://hdl.handle.net/10217/212013


Colorado State University

5. Amarnath, Athith. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Security is a very serious concern in this era of digital world. Protecting and controlling access to secured data and services has given more emphasis… (more)

Subjects/Keywords: Byzantine fault tolerance; random walk; moving target defense; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amarnath, A. (2018). On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/193171

Chicago Manual of Style (16th Edition):

Amarnath, Athith. “On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.” 2018. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/193171.

MLA Handbook (7th Edition):

Amarnath, Athith. “On the design of a moving target defense framework for the resiliency of critical services in large distributed networks.” 2018. Web. 23 Jan 2021.

Vancouver:

Amarnath A. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/193171.

Council of Science Editors:

Amarnath A. On the design of a moving target defense framework for the resiliency of critical services in large distributed networks. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/193171


Colorado State University

6. Mukherjee, Subhojeet. Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A.

Degree: MS(M.S.), Computer Science, 2017, Colorado State University

 Computer users are not safe, be it at home or in public places. Public networks are more often administered by trained individuals who attempt to… (more)

Subjects/Keywords: cyber-security; graph; semantic; grammar; concept; NLP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mukherjee, S. (2017). Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/185622

Chicago Manual of Style (16th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A.” 2017. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/185622.

MLA Handbook (7th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A.” 2017. Web. 23 Jan 2021.

Vancouver:

Mukherjee S. Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A. [Internet] [Masters thesis]. Colorado State University; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/185622.

Council of Science Editors:

Mukherjee S. Heuristic-based approach to automatically extract personalized attack graph related concepts from vulnerability descriptions, A. [Masters Thesis]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/185622


Colorado State University

7. Algarni, Abdullah Mahdi. Quantitative economics of security: software vulnerabilities and data breaches.

Degree: PhD, Computer Science, 2016, Colorado State University

 Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Algarni, A. M. (2016). Quantitative economics of security: software vulnerabilities and data breaches. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176634

Chicago Manual of Style (16th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/176634.

MLA Handbook (7th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Web. 23 Jan 2021.

Vancouver:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/176634.

Council of Science Editors:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176634


Colorado State University

8. Xie, Xing. Multilevel secure data stream management system.

Degree: PhD, Computer Science, 2013, Colorado State University

 With the advent of mobile and sensor devices, situation monitoring applications are now feasible. The data processing system should be able to collect large amount… (more)

Subjects/Keywords: distributed MLS; trusted MLS; replicated MLS; multilevel security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, X. (2013). Multilevel secure data stream management system. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/80188

Chicago Manual of Style (16th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2013. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/80188.

MLA Handbook (7th Edition):

Xie, Xing. “Multilevel secure data stream management system.” 2013. Web. 23 Jan 2021.

Vancouver:

Xie X. Multilevel secure data stream management system. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/80188.

Council of Science Editors:

Xie X. Multilevel secure data stream management system. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/80188


Colorado State University

9. Alnnfiai, Majdi Khalid. Scalable large margin pairwise learning algorithms.

Degree: PhD, Computer Science, 2019, Colorado State University

 Classification is a major task in machine learning and data mining applications. Many of these applications involve building a classification model using a large volume… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alnnfiai, M. K. (2019). Scalable large margin pairwise learning algorithms. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197256

Chicago Manual of Style (16th Edition):

Alnnfiai, Majdi Khalid. “Scalable large margin pairwise learning algorithms.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/197256.

MLA Handbook (7th Edition):

Alnnfiai, Majdi Khalid. “Scalable large margin pairwise learning algorithms.” 2019. Web. 23 Jan 2021.

Vancouver:

Alnnfiai MK. Scalable large margin pairwise learning algorithms. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/197256.

Council of Science Editors:

Alnnfiai MK. Scalable large margin pairwise learning algorithms. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197256


Colorado State University

10. Dhanapala, Dulanjalie C. Anchor centric virtual coordinate systems in wireless sensor networks: from self-organization to network awareness.

Degree: PhD, Electrical and Computer Engineering, 2012, Colorado State University

 Future Wireless Sensor Networks (WSNs) will be collections of thousands to millions of sensor nodes, automated to self-organize, adapt, and collaborate to facilitate distributed monitoring… (more)

Subjects/Keywords: network awareness; phenomena discovery; routing; sensor networks; topology preserving maps; virtual coordinate systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dhanapala, D. C. (2012). Anchor centric virtual coordinate systems in wireless sensor networks: from self-organization to network awareness. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/71554

Chicago Manual of Style (16th Edition):

Dhanapala, Dulanjalie C. “Anchor centric virtual coordinate systems in wireless sensor networks: from self-organization to network awareness.” 2012. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/71554.

MLA Handbook (7th Edition):

Dhanapala, Dulanjalie C. “Anchor centric virtual coordinate systems in wireless sensor networks: from self-organization to network awareness.” 2012. Web. 23 Jan 2021.

Vancouver:

Dhanapala DC. Anchor centric virtual coordinate systems in wireless sensor networks: from self-organization to network awareness. [Internet] [Doctoral dissertation]. Colorado State University; 2012. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/71554.

Council of Science Editors:

Dhanapala DC. Anchor centric virtual coordinate systems in wireless sensor networks: from self-organization to network awareness. [Doctoral Dissertation]. Colorado State University; 2012. Available from: http://hdl.handle.net/10217/71554


Colorado State University

11. Abdunabi, Ramadan. Access control framework for mobile applications, An.

Degree: PhD, Computer Science, 2013, Colorado State University

 With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user in… (more)

Subjects/Keywords: access control; access control protocol; computer security; enforcement; policy model; RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdunabi, R. (2013). Access control framework for mobile applications, An. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78814

Chicago Manual of Style (16th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/78814.

MLA Handbook (7th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Web. 23 Jan 2021.

Vancouver:

Abdunabi R. Access control framework for mobile applications, An. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/78814.

Council of Science Editors:

Abdunabi R. Access control framework for mobile applications, An. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/78814


Colorado State University

12. Basnet, Rejina. Integration of task-attribute based access control model for mobile workflow authorization and management.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 Workflow is the automation of process logistics for managing simple every day to complex multi-user tasks. By defining a workflow with proper constraints, an organization… (more)

Subjects/Keywords: attribute based access control; TCPN analysis; workflow security; policy machine; access control; workflow management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basnet, R. (2019). Integration of task-attribute based access control model for mobile workflow authorization and management. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/195323

Chicago Manual of Style (16th Edition):

Basnet, Rejina. “Integration of task-attribute based access control model for mobile workflow authorization and management.” 2019. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/195323.

MLA Handbook (7th Edition):

Basnet, Rejina. “Integration of task-attribute based access control model for mobile workflow authorization and management.” 2019. Web. 23 Jan 2021.

Vancouver:

Basnet R. Integration of task-attribute based access control model for mobile workflow authorization and management. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/195323.

Council of Science Editors:

Basnet R. Integration of task-attribute based access control model for mobile workflow authorization and management. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/195323


Colorado State University

13. Homayouni, Hajar. Approach for testing the extract-transform-load process in data warehouse systems, An.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Enterprises use data warehouses to accumulate data from multiple sources for data analysis and research. Since organizational decisions are often made based on the data… (more)

Subjects/Keywords: ETL; mutation analysis; test assertion; extract-transform-load; data warehouse; software testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Homayouni, H. (2018). Approach for testing the extract-transform-load process in data warehouse systems, An. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/189268

Chicago Manual of Style (16th Edition):

Homayouni, Hajar. “Approach for testing the extract-transform-load process in data warehouse systems, An.” 2018. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/189268.

MLA Handbook (7th Edition):

Homayouni, Hajar. “Approach for testing the extract-transform-load process in data warehouse systems, An.” 2018. Web. 23 Jan 2021.

Vancouver:

Homayouni H. Approach for testing the extract-transform-load process in data warehouse systems, An. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/189268.

Council of Science Editors:

Homayouni H. Approach for testing the extract-transform-load process in data warehouse systems, An. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/189268


Colorado State University

14. Dolan, Andrew. Proactive extraction of IoT device capabilities for security applications.

Degree: MS(M.S.), Computer Science, 2020, Colorado State University

 Internet of Things (IoT) device adoption is on the rise. Such devices are mostly self-operated and require minimum user interventions. This is achieved by abstracting… (more)

Subjects/Keywords: IoT; security; functionality; smart home; proactive

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dolan, A. (2020). Proactive extraction of IoT device capabilities for security applications. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/208513

Chicago Manual of Style (16th Edition):

Dolan, Andrew. “Proactive extraction of IoT device capabilities for security applications.” 2020. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/208513.

MLA Handbook (7th Edition):

Dolan, Andrew. “Proactive extraction of IoT device capabilities for security applications.” 2020. Web. 23 Jan 2021.

Vancouver:

Dolan A. Proactive extraction of IoT device capabilities for security applications. [Internet] [Masters thesis]. Colorado State University; 2020. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/208513.

Council of Science Editors:

Dolan A. Proactive extraction of IoT device capabilities for security applications. [Masters Thesis]. Colorado State University; 2020. Available from: http://hdl.handle.net/10217/208513


Colorado State University

15. Zhang, Han. Detecting advanced botnets in enterprise networks.

Degree: PhD, Computer Science, 2017, Colorado State University

 A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive… (more)

Subjects/Keywords: DNS; network security; intrusion detection system; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2017). Detecting advanced botnets in enterprise networks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181362

Chicago Manual of Style (16th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/181362.

MLA Handbook (7th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Web. 23 Jan 2021.

Vancouver:

Zhang H. Detecting advanced botnets in enterprise networks. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/181362.

Council of Science Editors:

Zhang H. Detecting advanced botnets in enterprise networks. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181362


Colorado State University

16. Kar, Diptendu Mohan. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.

Degree: MS(M.S.), Computer Science, 2019, Colorado State University

 DNA synthesis has become increasingly common, and many synthetic DNA molecules are licensed intellectual property (IP). DNA samples are shared between academic labs, ordered from… (more)

Subjects/Keywords: identity based signatures; elliptic curve cryptography; cyber-bio security; pairing-based cryptography; DNA; Reed-Solomon codes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kar, D. M. (2019). Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/195249

Chicago Manual of Style (16th Edition):

Kar, Diptendu Mohan. “Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.” 2019. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/195249.

MLA Handbook (7th Edition):

Kar, Diptendu Mohan. “Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules.” 2019. Web. 23 Jan 2021.

Vancouver:

Kar DM. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. [Internet] [Masters thesis]. Colorado State University; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/195249.

Council of Science Editors:

Kar DM. Digital signatures to ensure the authenticity and integrity of synthetic DNA molecules. [Masters Thesis]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/195249


Colorado State University

17. Jiang, Yi. Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks.

Degree: MS(M.S.), Electrical and Computer Engineering, 2013, Colorado State University

 A Virtual Coordinate System (VCS) for Wireless Sensor Networks (WSNs) characterizes each sensor node's location using the minimum number of hops to a specific set… (more)

Subjects/Keywords: 3D sensor networks; wireless sensor networks; virtual coordinate system; tracking and prediction algorithm; routing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, Y. (2013). Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/81031

Chicago Manual of Style (16th Edition):

Jiang, Yi. “Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks.” 2013. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/81031.

MLA Handbook (7th Edition):

Jiang, Yi. “Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks.” 2013. Web. 23 Jan 2021.

Vancouver:

Jiang Y. Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks. [Internet] [Masters thesis]. Colorado State University; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/81031.

Council of Science Editors:

Jiang Y. Virtual and topological coordinate based routing, mobility tracking and prediction in 2D and 3D wireless sensor networks. [Masters Thesis]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/81031


Colorado State University

18. Joh, HyunChul. Quantitative analyses of software vulnerabilities.

Degree: PhD, Computer Science, 2011, Colorado State University

 There have been numerous studies addressing computer security and software vulnerability management. Most of the time, they have taken a qualitative perspective. In many other… (more)

Subjects/Keywords: modeling; quantitative analysis; risk; security; software; vulnerability discovery process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joh, H. (2011). Quantitative analyses of software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/70444

Chicago Manual of Style (16th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/70444.

MLA Handbook (7th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Web. 23 Jan 2021.

Vancouver:

Joh H. Quantitative analyses of software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2011. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/70444.

Council of Science Editors:

Joh H. Quantitative analyses of software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/70444


Colorado State University

19. Strizhov, Mikhail. Towards a secure and efficient search over encrypted cloud data.

Degree: PhD, Computer Science, 2016, Colorado State University

 Cloud computing enables new types of services where the computational and network resources are available online through the Internet. One of the most popular services… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Strizhov, M. (2016). Towards a secure and efficient search over encrypted cloud data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176763

Chicago Manual of Style (16th Edition):

Strizhov, Mikhail. “Towards a secure and efficient search over encrypted cloud data.” 2016. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/176763.

MLA Handbook (7th Edition):

Strizhov, Mikhail. “Towards a secure and efficient search over encrypted cloud data.” 2016. Web. 23 Jan 2021.

Vancouver:

Strizhov M. Towards a secure and efficient search over encrypted cloud data. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/176763.

Council of Science Editors:

Strizhov M. Towards a secure and efficient search over encrypted cloud data. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176763


Colorado State University

20. Al-Refai, Mohammed. Towards model-based regression test selection.

Degree: PhD, Computer Science, 2019, Colorado State University

 Modern software development processes often use UML models to plan and manage the evolution of software systems. Regression testing is important to ensure that the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Refai, M. (2019). Towards model-based regression test selection. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197269

Chicago Manual of Style (16th Edition):

Al-Refai, Mohammed. “Towards model-based regression test selection.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/197269.

MLA Handbook (7th Edition):

Al-Refai, Mohammed. “Towards model-based regression test selection.” 2019. Web. 23 Jan 2021.

Vancouver:

Al-Refai M. Towards model-based regression test selection. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/197269.

Council of Science Editors:

Al-Refai M. Towards model-based regression test selection. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197269


Colorado State University

21. Yu, Lijun. Scenario-based technique to analyze UML design class models, A.

Degree: PhD, Computer Science, 2014, Colorado State University

 Identifying and resolving design problems in the early design phases can help reduce the number of design errors in implementations. In this dissertation a tool-supported… (more)

Subjects/Keywords: unified modeling language; consistency check; software engineering experiment; scenario; formal verification; formal analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, L. (2014). Scenario-based technique to analyze UML design class models, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/82485

Chicago Manual of Style (16th Edition):

Yu, Lijun. “Scenario-based technique to analyze UML design class models, A.” 2014. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/82485.

MLA Handbook (7th Edition):

Yu, Lijun. “Scenario-based technique to analyze UML design class models, A.” 2014. Web. 23 Jan 2021.

Vancouver:

Yu L. Scenario-based technique to analyze UML design class models, A. [Internet] [Doctoral dissertation]. Colorado State University; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/82485.

Council of Science Editors:

Yu L. Scenario-based technique to analyze UML design class models, A. [Doctoral Dissertation]. Colorado State University; 2014. Available from: http://hdl.handle.net/10217/82485


Colorado State University

22. Shannigrahi, Susmit. Future of networking is the future of Big Data, The.

Degree: PhD, Computer Science, 2019, Colorado State University

 Scientific domains such as Climate Science, High Energy Particle Physics (HEP), Genomics, Biology, and many others are increasingly moving towards data-oriented workflows where each of… (more)

Subjects/Keywords: future internet architecture; large scientific data; networking for big data; information centric networking; big science; named data networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shannigrahi, S. (2019). Future of networking is the future of Big Data, The. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197325

Chicago Manual of Style (16th Edition):

Shannigrahi, Susmit. “Future of networking is the future of Big Data, The.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/197325.

MLA Handbook (7th Edition):

Shannigrahi, Susmit. “Future of networking is the future of Big Data, The.” 2019. Web. 23 Jan 2021.

Vancouver:

Shannigrahi S. Future of networking is the future of Big Data, The. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/197325.

Council of Science Editors:

Shannigrahi S. Future of networking is the future of Big Data, The. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197325


Colorado State University

23. Al Lail, Mustafa. Unified modeling language framework for specifying and analyzing temporal properties, A.

Degree: PhD, Computer Science, 2018, Colorado State University

 In the context of Model-Driven Engineering (MDE), designers use the Unified Modeling Language (UML) to create models that drive the entire development process. Once UML… (more)

Subjects/Keywords: properties; temporal; verification; specification; model checking; UML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Lail, M. (2018). Unified modeling language framework for specifying and analyzing temporal properties, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/191492

Chicago Manual of Style (16th Edition):

Al Lail, Mustafa. “Unified modeling language framework for specifying and analyzing temporal properties, A.” 2018. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/191492.

MLA Handbook (7th Edition):

Al Lail, Mustafa. “Unified modeling language framework for specifying and analyzing temporal properties, A.” 2018. Web. 23 Jan 2021.

Vancouver:

Al Lail M. Unified modeling language framework for specifying and analyzing temporal properties, A. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/191492.

Council of Science Editors:

Al Lail M. Unified modeling language framework for specifying and analyzing temporal properties, A. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191492


Colorado State University

24. Gharaibeh, Manaf. Characterizing the visible address space to enable efficient continuous IP geolocation.

Degree: PhD, Computer Science, 2020, Colorado State University

 Internet Protocol (IP) geolocation is vital for location-dependent applications and many network research problems. The benefits to applications include enabling content customization, proximal server selection,… (more)

Subjects/Keywords: co-locality; IP geolocation; → network measurement; Internet measurement; active data analysis; mobile networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gharaibeh, M. (2020). Characterizing the visible address space to enable efficient continuous IP geolocation. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/208540

Chicago Manual of Style (16th Edition):

Gharaibeh, Manaf. “Characterizing the visible address space to enable efficient continuous IP geolocation.” 2020. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/208540.

MLA Handbook (7th Edition):

Gharaibeh, Manaf. “Characterizing the visible address space to enable efficient continuous IP geolocation.” 2020. Web. 23 Jan 2021.

Vancouver:

Gharaibeh M. Characterizing the visible address space to enable efficient continuous IP geolocation. [Internet] [Doctoral dissertation]. Colorado State University; 2020. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/208540.

Council of Science Editors:

Gharaibeh M. Characterizing the visible address space to enable efficient continuous IP geolocation. [Doctoral Dissertation]. Colorado State University; 2020. Available from: http://hdl.handle.net/10217/208540

25. Mosharraf Ghahfarokhi, Negar. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.

Degree: PhD, Electrical and Computer Engineering, 2016, Colorado State University

To view the abstract, please see the full text of the document. Advisors/Committee Members: Jayasumana, Anura P. (advisor), Ray, Indrakshi (advisor), Pezeshki, Ali (committee member), Malaiya, Yashwant (committee member).

…40 3.4.3 Colorado State University Dataset… …traffic against DDoS attacks by analysis of network traffic collected from Colorado State… …State University [20] and University of Auckland dataset [6]. The… …University, Auckland University, and attack traffic from CAIDA. It is important to minimize the… …evaluated using the DARPA 1998 dataset [19] as well as extensive analysis over Colorado… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mosharraf Ghahfarokhi, N. (2016). Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176690

Chicago Manual of Style (16th Edition):

Mosharraf Ghahfarokhi, Negar. “Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.” 2016. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/176690.

MLA Handbook (7th Edition):

Mosharraf Ghahfarokhi, Negar. “Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.” 2016. Web. 23 Jan 2021.

Vancouver:

Mosharraf Ghahfarokhi N. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/176690.

Council of Science Editors:

Mosharraf Ghahfarokhi N. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176690

26. Shirazi, Hossein. Unbiased phishing detection using domain name based features.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Internet users are coming under a barrage of phishing attacks of increasing frequency and sophistication. While these attacks have been remarkably resilient against the vast… (more)

Subjects/Keywords: domain name; phishing; biased datasets; phishing detection; machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shirazi, H. (2018). Unbiased phishing detection using domain name based features. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/191323

Chicago Manual of Style (16th Edition):

Shirazi, Hossein. “Unbiased phishing detection using domain name based features.” 2018. Masters Thesis, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/191323.

MLA Handbook (7th Edition):

Shirazi, Hossein. “Unbiased phishing detection using domain name based features.” 2018. Web. 23 Jan 2021.

Vancouver:

Shirazi H. Unbiased phishing detection using domain name based features. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/191323.

Council of Science Editors:

Shirazi H. Unbiased phishing detection using domain name based features. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191323

27. Mulamba Kadimbadimba, Dieudonné. On designing large, secure and resilient networked systems.

Degree: PhD, Computer Science, 2019, Colorado State University

 Defending large networked systems against rapidly evolving cyber attacks is challenging. This is because of several factors. First, cyber defenders are always fighting an asymmetric… (more)

Subjects/Keywords: moving target defense; secure networks; Sybil detection; online social network; complex networks; social network analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulamba Kadimbadimba, D. (2019). On designing large, secure and resilient networked systems. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/197321

Chicago Manual of Style (16th Edition):

Mulamba Kadimbadimba, Dieudonné. “On designing large, secure and resilient networked systems.” 2019. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/197321.

MLA Handbook (7th Edition):

Mulamba Kadimbadimba, Dieudonné. “On designing large, secure and resilient networked systems.” 2019. Web. 23 Jan 2021.

Vancouver:

Mulamba Kadimbadimba D. On designing large, secure and resilient networked systems. [Internet] [Doctoral dissertation]. Colorado State University; 2019. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/197321.

Council of Science Editors:

Mulamba Kadimbadimba D. On designing large, secure and resilient networked systems. [Doctoral Dissertation]. Colorado State University; 2019. Available from: http://hdl.handle.net/10217/197321

28. Belyaev, Kirill. On component-oriented access control in lightweight virtualized server environments.

Degree: PhD, Computer Science, 2017, Colorado State University

 With the advancements in contemporary multi-core CPU architectures and increase in main memory capacity, it is now possible for a server operating system (OS), such… (more)

Subjects/Keywords: data and application security; security architectures; tuple spaces; denial of service protection; access control; service and systems design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belyaev, K. (2017). On component-oriented access control in lightweight virtualized server environments. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/185748

Chicago Manual of Style (16th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2017. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/185748.

MLA Handbook (7th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2017. Web. 23 Jan 2021.

Vancouver:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/185748.

Council of Science Editors:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/185748

29. Sun, Wuliang. Using slicing techniques to support scalable rigorous analysis of class models.

Degree: PhD, Computer Science, 2015, Colorado State University

 Slicing is a reduction technique that has been applied to class models to support model comprehension, analysis, and other modeling activities. In particular, slicing techniques… (more)

Subjects/Keywords: slicing; class model; UML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, W. (2015). Using slicing techniques to support scalable rigorous analysis of class models. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/166933

Chicago Manual of Style (16th Edition):

Sun, Wuliang. “Using slicing techniques to support scalable rigorous analysis of class models.” 2015. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/166933.

MLA Handbook (7th Edition):

Sun, Wuliang. “Using slicing techniques to support scalable rigorous analysis of class models.” 2015. Web. 23 Jan 2021.

Vancouver:

Sun W. Using slicing techniques to support scalable rigorous analysis of class models. [Internet] [Doctoral dissertation]. Colorado State University; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/166933.

Council of Science Editors:

Sun W. Using slicing techniques to support scalable rigorous analysis of class models. [Doctoral Dissertation]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/166933

30. Alotaibi, Saud Saleh. Sentiment analysis in the Arabic language using machine learning.

Degree: PhD, Computer Science, 2015, Colorado State University

 Sentiment analysis has recently become one of the growing areas of research related to natural language processing and machine learning. Much opinion and sentiment about… (more)

Subjects/Keywords: machine learning; sentiment analysis; Arabic sentiment; subjectivity classification; polarity classification

…Translation tOsst jAmς wlAy kwlwrAdw AlHkwmy sn 1870 kkly kwlwrAdw llzrAς Colorado State University… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, S. S. (2015). Sentiment analysis in the Arabic language using machine learning. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/167091

Chicago Manual of Style (16th Edition):

Alotaibi, Saud Saleh. “Sentiment analysis in the Arabic language using machine learning.” 2015. Doctoral Dissertation, Colorado State University. Accessed January 23, 2021. http://hdl.handle.net/10217/167091.

MLA Handbook (7th Edition):

Alotaibi, Saud Saleh. “Sentiment analysis in the Arabic language using machine learning.” 2015. Web. 23 Jan 2021.

Vancouver:

Alotaibi SS. Sentiment analysis in the Arabic language using machine learning. [Internet] [Doctoral dissertation]. Colorado State University; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10217/167091.

Council of Science Editors:

Alotaibi SS. Sentiment analysis in the Arabic language using machine learning. [Doctoral Dissertation]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/167091

[1] [2]

.