Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Georgia Tech" +contributor:("Ahamad, Mustaque"). Showing records 1 – 30 of 70 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters

1. Lawrence, Nigel Rhea. Vulnerabilities in SNMPv3.

Degree: MS, Computing, 2012, Georgia Tech

 Network monitoring is a necessity for both reducing downtime and ensuring rapid response in the case of software or hardware failure. Unfortunately, one of the… (more)

Subjects/Keywords: Vulnerability; Man-in-the-middle; MITM; Exploit; Weakness; Authoritative; Non-authoritative; USM; TSM; Rfc1443; 1443; Auth; Authentication; NMS; Manager; Management; Embedded; Computer networks Monitoring; Computer networks Management; Simple Network Management Protocol (Computer network protocol)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lawrence, N. R. (2012). Vulnerabilities in SNMPv3. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/44881

Chicago Manual of Style (16th Edition):

Lawrence, Nigel Rhea. “Vulnerabilities in SNMPv3.” 2012. Masters Thesis, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/44881.

MLA Handbook (7th Edition):

Lawrence, Nigel Rhea. “Vulnerabilities in SNMPv3.” 2012. Web. 18 Jun 2019.

Vancouver:

Lawrence NR. Vulnerabilities in SNMPv3. [Internet] [Masters thesis]. Georgia Tech; 2012. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/44881.

Council of Science Editors:

Lawrence NR. Vulnerabilities in SNMPv3. [Masters Thesis]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/44881


Georgia Tech

2. Nelms, Terry Lee. Improving detection and annotation of malware downloads and infections through deep packet inspection.

Degree: PhD, Computer Science, 2016, Georgia Tech

 Malware continues to be one of the primary tools employed by attackers. It is used in attacks ranging from click fraud to nation state espionage.… (more)

Subjects/Keywords: Malware; Botnets; Drive-by; Social engineering; Deep packet inspection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nelms, T. L. (2016). Improving detection and annotation of malware downloads and infections through deep packet inspection. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54941

Chicago Manual of Style (16th Edition):

Nelms, Terry Lee. “Improving detection and annotation of malware downloads and infections through deep packet inspection.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/54941.

MLA Handbook (7th Edition):

Nelms, Terry Lee. “Improving detection and annotation of malware downloads and infections through deep packet inspection.” 2016. Web. 18 Jun 2019.

Vancouver:

Nelms TL. Improving detection and annotation of malware downloads and infections through deep packet inspection. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/54941.

Council of Science Editors:

Nelms TL. Improving detection and annotation of malware downloads and infections through deep packet inspection. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/54941


Georgia Tech

3. Tang, Yuzhe. Secure and high-performance big-data systems in the cloud.

Degree: PhD, Computer Science, 2014, Georgia Tech

 Cloud computing and big data technology continue to revolutionize how computing and data analysis are delivered today and in the future. To store and process… (more)

Subjects/Keywords: Cloud; Big-data; Security; Efficiency; Performance; Streaming; Multi-core; Index; Key-value stores; Privacy preserving; Performance optimization; Log-structured systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tang, Y. (2014). Secure and high-performance big-data systems in the cloud. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53995

Chicago Manual of Style (16th Edition):

Tang, Yuzhe. “Secure and high-performance big-data systems in the cloud.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/53995.

MLA Handbook (7th Edition):

Tang, Yuzhe. “Secure and high-performance big-data systems in the cloud.” 2014. Web. 18 Jun 2019.

Vancouver:

Tang Y. Secure and high-performance big-data systems in the cloud. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/53995.

Council of Science Editors:

Tang Y. Secure and high-performance big-data systems in the cloud. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53995


Georgia Tech

4. Wang, Qingyang. A study of transient bottlenecks: understanding and reducing latency long-tail problem in n-tier web applications.

Degree: PhD, Computer Science, 2014, Georgia Tech

 An essential requirement of cloud computing or data centers is to simultaneously achieve good performance and high utilization for cost efficiency. High utilization through virtualization… (more)

Subjects/Keywords: Performance; Distributed systems; Long-tail; Multi-tier; Web applications; Scalability; Cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Q. (2014). A study of transient bottlenecks: understanding and reducing latency long-tail problem in n-tier web applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54002

Chicago Manual of Style (16th Edition):

Wang, Qingyang. “A study of transient bottlenecks: understanding and reducing latency long-tail problem in n-tier web applications.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/54002.

MLA Handbook (7th Edition):

Wang, Qingyang. “A study of transient bottlenecks: understanding and reducing latency long-tail problem in n-tier web applications.” 2014. Web. 18 Jun 2019.

Vancouver:

Wang Q. A study of transient bottlenecks: understanding and reducing latency long-tail problem in n-tier web applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/54002.

Council of Science Editors:

Wang Q. A study of transient bottlenecks: understanding and reducing latency long-tail problem in n-tier web applications. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/54002


Georgia Tech

5. Nadji, Yacin Ibrahim. Understanding DNS-based criminal infrastructure for informing takedowns.

Degree: PhD, Computer Science, 2015, Georgia Tech

 Botnets are a pervasive threat to the Internet and its inhabitants. A botnet is a collection of infected machines that receive commands from the botmaster,… (more)

Subjects/Keywords: Botnet takedown; Advanced persistent threat; Network security; DNS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nadji, Y. I. (2015). Understanding DNS-based criminal infrastructure for informing takedowns. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54335

Chicago Manual of Style (16th Edition):

Nadji, Yacin Ibrahim. “Understanding DNS-based criminal infrastructure for informing takedowns.” 2015. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/54335.

MLA Handbook (7th Edition):

Nadji, Yacin Ibrahim. “Understanding DNS-based criminal infrastructure for informing takedowns.” 2015. Web. 18 Jun 2019.

Vancouver:

Nadji YI. Understanding DNS-based criminal infrastructure for informing takedowns. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/54335.

Council of Science Editors:

Nadji YI. Understanding DNS-based criminal infrastructure for informing takedowns. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54335


Georgia Tech

6. Song, Chengyu. Preventing exploits against memory corruption vulnerabilities.

Degree: PhD, Computer Science, 2016, Georgia Tech

 The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely… (more)

Subjects/Keywords: Memory corruption; Exploit prevention; Code injection; Privilege escalation; Data-flow integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, C. (2016). Preventing exploits against memory corruption vulnerabilities. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55651

Chicago Manual of Style (16th Edition):

Song, Chengyu. “Preventing exploits against memory corruption vulnerabilities.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/55651.

MLA Handbook (7th Edition):

Song, Chengyu. “Preventing exploits against memory corruption vulnerabilities.” 2016. Web. 18 Jun 2019.

Vancouver:

Song C. Preventing exploits against memory corruption vulnerabilities. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/55651.

Council of Science Editors:

Song C. Preventing exploits against memory corruption vulnerabilities. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/55651


Georgia Tech

7. Koh, Younggyun. Kernel service outsourcing: an approach to improve performance and reliability of virtualized systems.

Degree: PhD, Computing, 2010, Georgia Tech

 Virtualization environments have become basic building blocks in consolidated data centers and cloud computing infrastructures. By running multiple virtual machines (VMs) in a shared physical… (more)

Subjects/Keywords: Computer systems; Virualization technology; Network performance; Virtual computer systems; Operating systems (Computers); Virtual reality

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koh, Y. (2010). Kernel service outsourcing: an approach to improve performance and reliability of virtualized systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/34700

Chicago Manual of Style (16th Edition):

Koh, Younggyun. “Kernel service outsourcing: an approach to improve performance and reliability of virtualized systems.” 2010. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/34700.

MLA Handbook (7th Edition):

Koh, Younggyun. “Kernel service outsourcing: an approach to improve performance and reliability of virtualized systems.” 2010. Web. 18 Jun 2019.

Vancouver:

Koh Y. Kernel service outsourcing: an approach to improve performance and reliability of virtualized systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/34700.

Council of Science Editors:

Koh Y. Kernel service outsourcing: an approach to improve performance and reliability of virtualized systems. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/34700


Georgia Tech

8. Cash, Charles David. On the security and efficiency of encryption.

Degree: PhD, Computing, 2009, Georgia Tech

 This thesis is concerned with the design and analysis of practical provably-secure encryption schemes. We give several results that include new schemes with attractive tradeoffs… (more)

Subjects/Keywords: Provable security; Encryption; Cryptography; Data encryption (Computer science); Hashing (Computer science); Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cash, C. D. (2009). On the security and efficiency of encryption. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/31733

Chicago Manual of Style (16th Edition):

Cash, Charles David. “On the security and efficiency of encryption.” 2009. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/31733.

MLA Handbook (7th Edition):

Cash, Charles David. “On the security and efficiency of encryption.” 2009. Web. 18 Jun 2019.

Vancouver:

Cash CD. On the security and efficiency of encryption. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/31733.

Council of Science Editors:

Cash CD. On the security and efficiency of encryption. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/31733


Georgia Tech

9. Moss, Mark Bomi. Assessing operational impact in enterprise systems with dependency discovery and usage mining.

Degree: PhD, Computing, 2009, Georgia Tech

 A framework for monitoring the dependencies between users, applications, and other system components, combined with the actual access times and frequencies, was proposed. Operating system… (more)

Subjects/Keywords: Impact analysis; Enterprise application integration (Computer systems); Management information systems; Computer system failures; Communication of technical information

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moss, M. B. (2009). Assessing operational impact in enterprise systems with dependency discovery and usage mining. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/31795

Chicago Manual of Style (16th Edition):

Moss, Mark Bomi. “Assessing operational impact in enterprise systems with dependency discovery and usage mining.” 2009. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/31795.

MLA Handbook (7th Edition):

Moss, Mark Bomi. “Assessing operational impact in enterprise systems with dependency discovery and usage mining.” 2009. Web. 18 Jun 2019.

Vancouver:

Moss MB. Assessing operational impact in enterprise systems with dependency discovery and usage mining. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/31795.

Council of Science Editors:

Moss MB. Assessing operational impact in enterprise systems with dependency discovery and usage mining. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/31795


Georgia Tech

10. Wei, Jinpeng. Improving operating systems security: two case studies.

Degree: PhD, Computing, 2009, Georgia Tech

 Malicious attacks on computer systems attempt to obtain and maintain illicit control over the victim system. To obtain unauthorized access, they often exploit vulnerabilities in… (more)

Subjects/Keywords: Control flow integrity; Security and protection; Reliability; File systems management; Operating systems (Computers) Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wei, J. (2009). Improving operating systems security: two case studies. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/31849

Chicago Manual of Style (16th Edition):

Wei, Jinpeng. “Improving operating systems security: two case studies.” 2009. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/31849.

MLA Handbook (7th Edition):

Wei, Jinpeng. “Improving operating systems security: two case studies.” 2009. Web. 18 Jun 2019.

Vancouver:

Wei J. Improving operating systems security: two case studies. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/31849.

Council of Science Editors:

Wei J. Improving operating systems security: two case studies. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/31849


Georgia Tech

11. Ahmed, Nova. Reliable middleware framework for RFID system.

Degree: PhD, Computing, 2010, Georgia Tech

 The reliability of RFID systems depends on a number of factors including: RF interference, deployment environment, configuration of the readers, and placement of readers and… (more)

Subjects/Keywords: Middleware; RFID middleware; Path based system; Data oriented middleware; RFID system; Radio frequency identification systems; Radio waves; Operating systems (Computers)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmed, N. (2010). Reliable middleware framework for RFID system. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/39516

Chicago Manual of Style (16th Edition):

Ahmed, Nova. “Reliable middleware framework for RFID system.” 2010. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/39516.

MLA Handbook (7th Edition):

Ahmed, Nova. “Reliable middleware framework for RFID system.” 2010. Web. 18 Jun 2019.

Vancouver:

Ahmed N. Reliable middleware framework for RFID system. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/39516.

Council of Science Editors:

Ahmed N. Reliable middleware framework for RFID system. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/39516


Georgia Tech

12. Singh, Kapil. Designing security policies and frameworks for web applications.

Degree: PhD, Computing, 2011, Georgia Tech

 The new developments behind Web 2.0 have increased the complexity of web systems making the task of securing these systems a challenging problem. As a… (more)

Subjects/Keywords: Security policies; Web security; Web applications; Web 2.0; User-generated content; Social media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singh, K. (2011). Designing security policies and frameworks for web applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/41122

Chicago Manual of Style (16th Edition):

Singh, Kapil. “Designing security policies and frameworks for web applications.” 2011. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/41122.

MLA Handbook (7th Edition):

Singh, Kapil. “Designing security policies and frameworks for web applications.” 2011. Web. 18 Jun 2019.

Vancouver:

Singh K. Designing security policies and frameworks for web applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/41122.

Council of Science Editors:

Singh K. Designing security policies and frameworks for web applications. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/41122


Georgia Tech

13. Srinivasan, Bharat Ramakrishnan. Exposing and mitigating cross-channel abuse that exploits the converged communications infrastructure.

Degree: PhD, Computer Science, 2017, Georgia Tech

 Recently we have witnessed rapid consolidation of traditional and emerging communications infrastructures, leading to the convergence of telephony and the Internet. While this convergence has… (more)

Subjects/Keywords: Networks; Communications; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Srinivasan, B. R. (2017). Exposing and mitigating cross-channel abuse that exploits the converged communications infrastructure. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59241

Chicago Manual of Style (16th Edition):

Srinivasan, Bharat Ramakrishnan. “Exposing and mitigating cross-channel abuse that exploits the converged communications infrastructure.” 2017. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/59241.

MLA Handbook (7th Edition):

Srinivasan, Bharat Ramakrishnan. “Exposing and mitigating cross-channel abuse that exploits the converged communications infrastructure.” 2017. Web. 18 Jun 2019.

Vancouver:

Srinivasan BR. Exposing and mitigating cross-channel abuse that exploits the converged communications infrastructure. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/59241.

Council of Science Editors:

Srinivasan BR. Exposing and mitigating cross-channel abuse that exploits the converged communications infrastructure. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/59241


Georgia Tech

14. Chung Miranda, Joaquin. Architectural approaches to a science network software-defined exchange.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 To interconnect research facilities across wide geographic areas, network operators deploy science networks, also referred to as Research and Education (R&E) networks. These networks allow… (more)

Subjects/Keywords: Software-defined exchanges; Software-defined networking; Research and education networks; Orchestration; Multi-domain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung Miranda, J. (2017). Architectural approaches to a science network software-defined exchange. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59247

Chicago Manual of Style (16th Edition):

Chung Miranda, Joaquin. “Architectural approaches to a science network software-defined exchange.” 2017. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/59247.

MLA Handbook (7th Edition):

Chung Miranda, Joaquin. “Architectural approaches to a science network software-defined exchange.” 2017. Web. 18 Jun 2019.

Vancouver:

Chung Miranda J. Architectural approaches to a science network software-defined exchange. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/59247.

Council of Science Editors:

Chung Miranda J. Architectural approaches to a science network software-defined exchange. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/59247


Georgia Tech

15. Chen, Yizheng. Improving robustness of DNS graph clustering against noise.

Degree: PhD, Computer Science, 2017, Georgia Tech

 Clustering is often the first step performed to assist us in finding structure within unlabeled datasets. Given a small set of labels, clustering also enables… (more)

Subjects/Keywords: DNS security; Unsupervised learning; Adversarial llustering; Botnet; Advertising fraud; Ad abuse

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2017). Improving robustness of DNS graph clustering against noise. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59269

Chicago Manual of Style (16th Edition):

Chen, Yizheng. “Improving robustness of DNS graph clustering against noise.” 2017. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/59269.

MLA Handbook (7th Edition):

Chen, Yizheng. “Improving robustness of DNS graph clustering against noise.” 2017. Web. 18 Jun 2019.

Vancouver:

Chen Y. Improving robustness of DNS graph clustering against noise. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/59269.

Council of Science Editors:

Chen Y. Improving robustness of DNS graph clustering against noise. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/59269


Georgia Tech

16. Ahmed, Musheer. Augmenting accountability, security and fraud detection in health data sharing systems.

Degree: PhD, Computer Science, 2016, Georgia Tech

 The U.S. government has introduced federal incentive programs to accelerate the adoption of meaningful use of electronic health records. These electronic records are expected to… (more)

Subjects/Keywords: Healthcare; Security; Auditing; Billing fraud; Devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmed, M. (2016). Augmenting accountability, security and fraud detection in health data sharing systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59738

Chicago Manual of Style (16th Edition):

Ahmed, Musheer. “Augmenting accountability, security and fraud detection in health data sharing systems.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/59738.

MLA Handbook (7th Edition):

Ahmed, Musheer. “Augmenting accountability, security and fraud detection in health data sharing systems.” 2016. Web. 18 Jun 2019.

Vancouver:

Ahmed M. Augmenting accountability, security and fraud detection in health data sharing systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/59738.

Council of Science Editors:

Ahmed M. Augmenting accountability, security and fraud detection in health data sharing systems. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/59738


Georgia Tech

17. Zhang, Qi. Dynamic shared memory architecture, systems, and optimizations for high performance and secure virtualized cloud.

Degree: PhD, Computer Science, 2017, Georgia Tech

 Dynamic memory consolidation is an important enabler for high performance virtual machine (VM) execution in virtualized Cloud. Efficient just-in-time memory balancing requires three core capabilities:… (more)

Subjects/Keywords: Virtualization; Memory management; Shared memory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Q. (2017). Dynamic shared memory architecture, systems, and optimizations for high performance and secure virtualized cloud. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59793

Chicago Manual of Style (16th Edition):

Zhang, Qi. “Dynamic shared memory architecture, systems, and optimizations for high performance and secure virtualized cloud.” 2017. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/59793.

MLA Handbook (7th Edition):

Zhang, Qi. “Dynamic shared memory architecture, systems, and optimizations for high performance and secure virtualized cloud.” 2017. Web. 18 Jun 2019.

Vancouver:

Zhang Q. Dynamic shared memory architecture, systems, and optimizations for high performance and secure virtualized cloud. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/59793.

Council of Science Editors:

Zhang Q. Dynamic shared memory architecture, systems, and optimizations for high performance and secure virtualized cloud. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/59793


Georgia Tech

18. Lever, Charles C. Empirical analysis of existing and emerging threats at scale using DNS.

Degree: PhD, Computer Science, 2018, Georgia Tech

 The security landscape is constantly evolving. Therefore, in order to build better defenses, it is critical to evaluate emerging and existing threats to better understand… (more)

Subjects/Keywords: Security; Malware; Networking; DNS; Mobile; Blacklists

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lever, C. C. (2018). Empirical analysis of existing and emerging threats at scale using DNS. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59895

Chicago Manual of Style (16th Edition):

Lever, Charles C. “Empirical analysis of existing and emerging threats at scale using DNS.” 2018. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/59895.

MLA Handbook (7th Edition):

Lever, Charles C. “Empirical analysis of existing and emerging threats at scale using DNS.” 2018. Web. 18 Jun 2019.

Vancouver:

Lever CC. Empirical analysis of existing and emerging threats at scale using DNS. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/59895.

Council of Science Editors:

Lever CC. Empirical analysis of existing and emerging threats at scale using DNS. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/59895

19. Mohapatra, Dushmanta. Coordinated memory management in virtualized environments.

Degree: PhD, Computer Science, 2015, Georgia Tech

 Two recent advances are the primary motivating factors for the research in my dissertation. First, virtualization is no longer confined to the powerful server class… (more)

Subjects/Keywords: Memory management; Virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohapatra, D. (2015). Coordinated memory management in virtualized environments. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54454

Chicago Manual of Style (16th Edition):

Mohapatra, Dushmanta. “Coordinated memory management in virtualized environments.” 2015. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/54454.

MLA Handbook (7th Edition):

Mohapatra, Dushmanta. “Coordinated memory management in virtualized environments.” 2015. Web. 18 Jun 2019.

Vancouver:

Mohapatra D. Coordinated memory management in virtualized environments. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/54454.

Council of Science Editors:

Mohapatra D. Coordinated memory management in virtualized environments. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54454

20. Ji, Shouling. Evaluating the security of anonymized big graph/structural data.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymization (DA) attacks, comprehensive anonymity, utility, and de-anonymizability quantifications, and a… (more)

Subjects/Keywords: Security and privacy; Graph data; Structural data; De-anonymization; Anonymization; Quantification; Evaluation; Utility; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ji, S. (2016). Evaluating the security of anonymized big graph/structural data. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54913

Chicago Manual of Style (16th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/54913.

MLA Handbook (7th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Web. 18 Jun 2019.

Vancouver:

Ji S. Evaluating the security of anonymized big graph/structural data. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/54913.

Council of Science Editors:

Ji S. Evaluating the security of anonymized big graph/structural data. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/54913

21. Carter, Henry Lee. Efficient techniques for secure multiparty computation on mobile devices.

Degree: PhD, Computer Science, 2015, Georgia Tech

 Smartphones are rapidly becoming a widespread computation platform, with many users relying on their mobile devices as their primary computing device. This popularity has brought… (more)

Subjects/Keywords: Server-assisted cryptography; Garbled circuits; Cloud computing; Secure multiparty computation; Mobile privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carter, H. L. (2015). Efficient techniques for secure multiparty computation on mobile devices. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54318

Chicago Manual of Style (16th Edition):

Carter, Henry Lee. “Efficient techniques for secure multiparty computation on mobile devices.” 2015. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/54318.

MLA Handbook (7th Edition):

Carter, Henry Lee. “Efficient techniques for secure multiparty computation on mobile devices.” 2015. Web. 18 Jun 2019.

Vancouver:

Carter HL. Efficient techniques for secure multiparty computation on mobile devices. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/54318.

Council of Science Editors:

Carter HL. Efficient techniques for secure multiparty computation on mobile devices. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54318

22. Lillethun, David. ssIoTa: A system software framework for the internet of things.

Degree: PhD, Computer Science, 2015, Georgia Tech

 Sensors are widely deployed in our environment, and their number is increasing rapidly. In the near future, billions of devices will all be connected to… (more)

Subjects/Keywords: Complex event processing; Situation awareness; Cyberphysical systems; Live streaming analysis; Internet of things; Distributed systems; Distributed scheduling; Fog computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lillethun, D. (2015). ssIoTa: A system software framework for the internet of things. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53531

Chicago Manual of Style (16th Edition):

Lillethun, David. “ssIoTa: A system software framework for the internet of things.” 2015. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/53531.

MLA Handbook (7th Edition):

Lillethun, David. “ssIoTa: A system software framework for the internet of things.” 2015. Web. 18 Jun 2019.

Vancouver:

Lillethun D. ssIoTa: A system software framework for the internet of things. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/53531.

Council of Science Editors:

Lillethun D. ssIoTa: A system software framework for the internet of things. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53531

23. Jang, Yeong Jin. Building trust in the user I/O in computer systems.

Degree: PhD, Computer Science, 2017, Georgia Tech

 User input plays an essential role in computer security because it can control system behavior and make security decisions in the system. System output to… (more)

Subjects/Keywords: Security; I/O

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jang, Y. J. (2017). Building trust in the user I/O in computer systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58732

Chicago Manual of Style (16th Edition):

Jang, Yeong Jin. “Building trust in the user I/O in computer systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/58732.

MLA Handbook (7th Edition):

Jang, Yeong Jin. “Building trust in the user I/O in computer systems.” 2017. Web. 18 Jun 2019.

Vancouver:

Jang YJ. Building trust in the user I/O in computer systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/58732.

Council of Science Editors:

Jang YJ. Building trust in the user I/O in computer systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58732

24. Chenette, Nathan Lee. Symmetric schemes for efficient range and error-tolerant search on encrypted data.

Degree: PhD, Mathematics, 2012, Georgia Tech

 Large-scale data management systems rely more and more on cloud storage, where the need for efficient search capabilities clashes with the need for data confidentiality.… (more)

Subjects/Keywords: Fuzzy searchable encryption; Symmetric encryption; Searchable encryption; Hypergeometric distribution; Database security; Order-preserving encryption; Data encryption (Computer science); Cloud computing; Data protection; Database searching

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chenette, N. L. (2012). Symmetric schemes for efficient range and error-tolerant search on encrypted data. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/48976

Chicago Manual of Style (16th Edition):

Chenette, Nathan Lee. “Symmetric schemes for efficient range and error-tolerant search on encrypted data.” 2012. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/48976.

MLA Handbook (7th Edition):

Chenette, Nathan Lee. “Symmetric schemes for efficient range and error-tolerant search on encrypted data.” 2012. Web. 18 Jun 2019.

Vancouver:

Chenette NL. Symmetric schemes for efficient range and error-tolerant search on encrypted data. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/48976.

Council of Science Editors:

Chenette NL. Symmetric schemes for efficient range and error-tolerant search on encrypted data. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/48976

25. Burnett, Samuel Read. Empowering bystanders to facilitate Internet censorship measurement and circumvention.

Degree: PhD, Computer Science, 2014, Georgia Tech

 Free and open exchange of information on the Internet is at risk: more than 60 countries practice some form of Internet censorship, and both the… (more)

Subjects/Keywords: Computer networking; Network security; Internet censorship; Security and privacy; Internet measurement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burnett, S. R. (2014). Empowering bystanders to facilitate Internet censorship measurement and circumvention. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52199

Chicago Manual of Style (16th Edition):

Burnett, Samuel Read. “Empowering bystanders to facilitate Internet censorship measurement and circumvention.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/52199.

MLA Handbook (7th Edition):

Burnett, Samuel Read. “Empowering bystanders to facilitate Internet censorship measurement and circumvention.” 2014. Web. 18 Jun 2019.

Vancouver:

Burnett SR. Empowering bystanders to facilitate Internet censorship measurement and circumvention. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/52199.

Council of Science Editors:

Burnett SR. Empowering bystanders to facilitate Internet censorship measurement and circumvention. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52199

26. Dolan-Gavitt, Brendan. Understanding and protecting closed-source systems through dynamic analysis.

Degree: PhD, Computer Science, 2014, Georgia Tech

 In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints… (more)

Subjects/Keywords: Virtualization; Security; Reverse engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dolan-Gavitt, B. (2014). Understanding and protecting closed-source systems through dynamic analysis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53012

Chicago Manual of Style (16th Edition):

Dolan-Gavitt, Brendan. “Understanding and protecting closed-source systems through dynamic analysis.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/53012.

MLA Handbook (7th Edition):

Dolan-Gavitt, Brendan. “Understanding and protecting closed-source systems through dynamic analysis.” 2014. Web. 18 Jun 2019.

Vancouver:

Dolan-Gavitt B. Understanding and protecting closed-source systems through dynamic analysis. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/53012.

Council of Science Editors:

Dolan-Gavitt B. Understanding and protecting closed-source systems through dynamic analysis. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53012

27. Meng, Wei. Identifying and mitigating threats from embedding third-party content.

Degree: PhD, Computer Science, 2017, Georgia Tech

 Embedding content from third parties to enrich features is a common practice in the development of modern web applications and mobile applications. Such practices can… (more)

Subjects/Keywords: Permission; Third-party content

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meng, W. (2017). Identifying and mitigating threats from embedding third-party content. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58766

Chicago Manual of Style (16th Edition):

Meng, Wei. “Identifying and mitigating threats from embedding third-party content.” 2017. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/58766.

MLA Handbook (7th Edition):

Meng, Wei. “Identifying and mitigating threats from embedding third-party content.” 2017. Web. 18 Jun 2019.

Vancouver:

Meng W. Identifying and mitigating threats from embedding third-party content. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/58766.

Council of Science Editors:

Meng W. Identifying and mitigating threats from embedding third-party content. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58766

28. Amrutkar, Chaitrali Vijay. Towards secure web browsing on mobile devices.

Degree: PhD, Computer Science, 2014, Georgia Tech

 The Web is increasingly being accessed by portable, multi-touch wireless devices. Despite the popularity of platform-specific (native) mobile apps, a recent study of smartphone usage… (more)

Subjects/Keywords: Mobile; SSL indicators; Web; Security; Browsers; Webpages; Smartphones

…Computing research day at Georgia Tech. The second piece of this thesis (Chapter 4) was… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amrutkar, C. V. (2014). Towards secure web browsing on mobile devices. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53400

Chicago Manual of Style (16th Edition):

Amrutkar, Chaitrali Vijay. “Towards secure web browsing on mobile devices.” 2014. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/53400.

MLA Handbook (7th Edition):

Amrutkar, Chaitrali Vijay. “Towards secure web browsing on mobile devices.” 2014. Web. 18 Jun 2019.

Vancouver:

Amrutkar CV. Towards secure web browsing on mobile devices. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/53400.

Council of Science Editors:

Amrutkar CV. Towards secure web browsing on mobile devices. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53400

29. Mundada, Yogesh. Building data-centric security mechanisms for web applications.

Degree: PhD, Computer Science, 2016, Georgia Tech

 Data loss from web applications at different points of compromise has become a major liability in recent years. Existing security guidelines, policies, and tools fail… (more)

Subjects/Keywords: Web security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mundada, Y. (2016). Building data-centric security mechanisms for web applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55013

Chicago Manual of Style (16th Edition):

Mundada, Yogesh. “Building data-centric security mechanisms for web applications.” 2016. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/55013.

MLA Handbook (7th Edition):

Mundada, Yogesh. “Building data-centric security mechanisms for web applications.” 2016. Web. 18 Jun 2019.

Vancouver:

Mundada Y. Building data-centric security mechanisms for web applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/55013.

Council of Science Editors:

Mundada Y. Building data-centric security mechanisms for web applications. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/55013

30. Wang, Ting. Data analytics for networked and possibly private sources.

Degree: PhD, Computing, 2011, Georgia Tech

 This thesis focuses on two grand challenges facing data analytical system designers and operators nowadays. First, how to fuse information from multiple autonomous, yet correlated… (more)

Subjects/Keywords: Privacy; Network; Data Analytics; Data mining; Computer networks Monitoring

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, T. (2011). Data analytics for networked and possibly private sources. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/39598

Chicago Manual of Style (16th Edition):

Wang, Ting. “Data analytics for networked and possibly private sources.” 2011. Doctoral Dissertation, Georgia Tech. Accessed June 18, 2019. http://hdl.handle.net/1853/39598.

MLA Handbook (7th Edition):

Wang, Ting. “Data analytics for networked and possibly private sources.” 2011. Web. 18 Jun 2019.

Vancouver:

Wang T. Data analytics for networked and possibly private sources. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Jun 18]. Available from: http://hdl.handle.net/1853/39598.

Council of Science Editors:

Wang T. Data analytics for networked and possibly private sources. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/39598

[1] [2] [3]

.