Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Georgia Tech" +contributor:("Beyah, Raheem A."). Showing records 1 – 13 of 13 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Georgia Tech

1. Myers, Eric Jonathan. A Low-cost and flexible platform for global asset monitoring.

Degree: MS, Electrical and Computer Engineering, 2018, Georgia Tech

 Conventional approaches to asset monitoring involve high-priced sensors paired with a dedicated radio. These implementations work well when dealing with high-valued property but are not… (more)

Subjects/Keywords: Wireless; Sensor networks; Delay tolerant network; Bluetooth low energy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Myers, E. J. (2018). A Low-cost and flexible platform for global asset monitoring. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60278

Chicago Manual of Style (16th Edition):

Myers, Eric Jonathan. “A Low-cost and flexible platform for global asset monitoring.” 2018. Masters Thesis, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/60278.

MLA Handbook (7th Edition):

Myers, Eric Jonathan. “A Low-cost and flexible platform for global asset monitoring.” 2018. Web. 03 Dec 2020.

Vancouver:

Myers EJ. A Low-cost and flexible platform for global asset monitoring. [Internet] [Masters thesis]. Georgia Tech; 2018. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/60278.

Council of Science Editors:

Myers EJ. A Low-cost and flexible platform for global asset monitoring. [Masters Thesis]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/60278

2. Litchfield, Samuel Lewis. HoneyPhy: A physics-aware CPS honeypot framework.

Degree: MS, Electrical and Computer Engineering, 2017, Georgia Tech

 Cyber Physical Systems (CPS) are vulnerable systems, and attacks are currently being carried out against them. Some of these attacks have never been seen before,… (more)

Subjects/Keywords: Cyber-physical systems; CPS; Honeypots; Modeling; Process modeling; Device modeling; Containers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Litchfield, S. L. (2017). HoneyPhy: A physics-aware CPS honeypot framework. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58329

Chicago Manual of Style (16th Edition):

Litchfield, Samuel Lewis. “HoneyPhy: A physics-aware CPS honeypot framework.” 2017. Masters Thesis, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/58329.

MLA Handbook (7th Edition):

Litchfield, Samuel Lewis. “HoneyPhy: A physics-aware CPS honeypot framework.” 2017. Web. 03 Dec 2020.

Vancouver:

Litchfield SL. HoneyPhy: A physics-aware CPS honeypot framework. [Internet] [Masters thesis]. Georgia Tech; 2017. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/58329.

Council of Science Editors:

Litchfield SL. HoneyPhy: A physics-aware CPS honeypot framework. [Masters Thesis]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58329


Georgia Tech

3. Wilson, Paul Lawrence. ModSec: A secure Modbus protocol.

Degree: MS, Electrical and Computer Engineering, 2018, Georgia Tech

 Many of todays most critical infrastructures rely on the successful operation of Supervisory Control and Data Acquisition (SCADA) systems distributed all around the world. Infrastructures… (more)

Subjects/Keywords: Modbus; Authentication; Security; ICS; SCADA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilson, P. L. (2018). ModSec: A secure Modbus protocol. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62615

Chicago Manual of Style (16th Edition):

Wilson, Paul Lawrence. “ModSec: A secure Modbus protocol.” 2018. Masters Thesis, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/62615.

MLA Handbook (7th Edition):

Wilson, Paul Lawrence. “ModSec: A secure Modbus protocol.” 2018. Web. 03 Dec 2020.

Vancouver:

Wilson PL. ModSec: A secure Modbus protocol. [Internet] [Masters thesis]. Georgia Tech; 2018. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/62615.

Council of Science Editors:

Wilson PL. ModSec: A secure Modbus protocol. [Masters Thesis]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/62615


Georgia Tech

4. Hill, Brennan. Malware capability reverse engineering via coordination with symbolic analysis.

Degree: MS, Electrical and Computer Engineering, 2018, Georgia Tech

 A key feature of cyber attack investigations is to quickly understand the capabilities and payloads of malware so proper countermeasures can be adopted. Unfortunately, due… (more)

Subjects/Keywords: Malware analysis; Symbolic execution; Memory forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hill, B. (2018). Malware capability reverse engineering via coordination with symbolic analysis. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62254

Chicago Manual of Style (16th Edition):

Hill, Brennan. “Malware capability reverse engineering via coordination with symbolic analysis.” 2018. Masters Thesis, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/62254.

MLA Handbook (7th Edition):

Hill, Brennan. “Malware capability reverse engineering via coordination with symbolic analysis.” 2018. Web. 03 Dec 2020.

Vancouver:

Hill B. Malware capability reverse engineering via coordination with symbolic analysis. [Internet] [Masters thesis]. Georgia Tech; 2018. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/62254.

Council of Science Editors:

Hill B. Malware capability reverse engineering via coordination with symbolic analysis. [Masters Thesis]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/62254


Georgia Tech

5. Stewart, Allen Joel. Leveraging program slicing to understand network traffic.

Degree: MS, Electrical and Computer Engineering, 2019, Georgia Tech

 This project centers around utilizing the concept of backward slice analysis of a binary to reconstruct the contents of a function call. To that end,… (more)

Subjects/Keywords: Angr; Backward slice; Program slice; Binary analysis; Reverse engineering; Ida; Ghidra; Python

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stewart, A. J. (2019). Leveraging program slicing to understand network traffic. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62359

Chicago Manual of Style (16th Edition):

Stewart, Allen Joel. “Leveraging program slicing to understand network traffic.” 2019. Masters Thesis, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/62359.

MLA Handbook (7th Edition):

Stewart, Allen Joel. “Leveraging program slicing to understand network traffic.” 2019. Web. 03 Dec 2020.

Vancouver:

Stewart AJ. Leveraging program slicing to understand network traffic. [Internet] [Masters thesis]. Georgia Tech; 2019. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/62359.

Council of Science Editors:

Stewart AJ. Leveraging program slicing to understand network traffic. [Masters Thesis]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62359


Georgia Tech

6. Chung Miranda, Joaquin. Architectural approaches to a science network software-defined exchange.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 To interconnect research facilities across wide geographic areas, network operators deploy science networks, also referred to as Research and Education (R&E) networks. These networks allow… (more)

Subjects/Keywords: Software-defined exchanges; Software-defined networking; Research and education networks; Orchestration; Multi-domain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung Miranda, J. (2017). Architectural approaches to a science network software-defined exchange. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59247

Chicago Manual of Style (16th Edition):

Chung Miranda, Joaquin. “Architectural approaches to a science network software-defined exchange.” 2017. Doctoral Dissertation, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/59247.

MLA Handbook (7th Edition):

Chung Miranda, Joaquin. “Architectural approaches to a science network software-defined exchange.” 2017. Web. 03 Dec 2020.

Vancouver:

Chung Miranda J. Architectural approaches to a science network software-defined exchange. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/59247.

Council of Science Editors:

Chung Miranda J. Architectural approaches to a science network software-defined exchange. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/59247


Georgia Tech

7. Lyn, Kevin G. Classification of and resilience to cyber-attacks on cyber-physical systems.

Degree: MS, Electrical and Computer Engineering, 2015, Georgia Tech

 The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures… (more)

Subjects/Keywords: Cyber-physical systems; Autonomic control; Embedded device security; Trust; Resilience

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lyn, K. G. (2015). Classification of and resilience to cyber-attacks on cyber-physical systems. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53926

Chicago Manual of Style (16th Edition):

Lyn, Kevin G. “Classification of and resilience to cyber-attacks on cyber-physical systems.” 2015. Masters Thesis, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/53926.

MLA Handbook (7th Edition):

Lyn, Kevin G. “Classification of and resilience to cyber-attacks on cyber-physical systems.” 2015. Web. 03 Dec 2020.

Vancouver:

Lyn KG. Classification of and resilience to cyber-attacks on cyber-physical systems. [Internet] [Masters thesis]. Georgia Tech; 2015. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/53926.

Council of Science Editors:

Lyn KG. Classification of and resilience to cyber-attacks on cyber-physical systems. [Masters Thesis]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53926

8. Cardoso, Adilson Silva. Design and characterization of BiCMOS mixed-signal circuits and devices for extreme environment applications.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 State-of-the-art SiGe BiCMOS technologies leverage the maturity of deep-submicron silicon CMOS processing with bandgap-engineered SiGe HBTs in a single platform that is suitable for a… (more)

Subjects/Keywords: SiGe; RF switches; BiCMOS; FET-based; SOI; PIN diode; BiCMOS circuits; Radiation hardening by design; Transient response; Transient radiation effects; Extreme environments; Mixed-signal circuits; Silicon-germanium; Single-pole single-throw(SPST); Single-pole four-throw(SP4T); Single-pole double-throw(SPDT); Voltage references; Cryogenic temperatures; Large-signal linearity; Non-linearities; SiGe heterojunction bipolar transistors (HBTs); Small-signal linearity; Large-signal linearity; Radiation; Single event transient (SET); Total ionizing dose (TID); Radiation; Precision voltage reference; Bandgap reference (BGR); Bulk FET

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cardoso, A. S. (2014). Design and characterization of BiCMOS mixed-signal circuits and devices for extreme environment applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53099

Chicago Manual of Style (16th Edition):

Cardoso, Adilson Silva. “Design and characterization of BiCMOS mixed-signal circuits and devices for extreme environment applications.” 2014. Doctoral Dissertation, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/53099.

MLA Handbook (7th Edition):

Cardoso, Adilson Silva. “Design and characterization of BiCMOS mixed-signal circuits and devices for extreme environment applications.” 2014. Web. 03 Dec 2020.

Vancouver:

Cardoso AS. Design and characterization of BiCMOS mixed-signal circuits and devices for extreme environment applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/53099.

Council of Science Editors:

Cardoso AS. Design and characterization of BiCMOS mixed-signal circuits and devices for extreme environment applications. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53099

9. Cox, Jacob Hascal. Enabling modular application development for management and security in software-defined networks.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 This dissertation leverages the capabilities of software-defined networking (SDN) and network functions virtualization (NFV) to enhance network security and management. By first exploring SDN-based security… (more)

Subjects/Keywords: Software-defined networking (SDN); Network functions virtualization (NFV); Domain-specific language (DSL); Network security; Security policy transition framework; Trusted agent; WebRTC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cox, J. H. (2017). Enabling modular application development for management and security in software-defined networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58242

Chicago Manual of Style (16th Edition):

Cox, Jacob Hascal. “Enabling modular application development for management and security in software-defined networks.” 2017. Doctoral Dissertation, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/58242.

MLA Handbook (7th Edition):

Cox, Jacob Hascal. “Enabling modular application development for management and security in software-defined networks.” 2017. Web. 03 Dec 2020.

Vancouver:

Cox JH. Enabling modular application development for management and security in software-defined networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/58242.

Council of Science Editors:

Cox JH. Enabling modular application development for management and security in software-defined networks. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58242


Georgia Tech

10. Nguyen, Ngoc Luong Ngoc. New side-channel and techniques for hardware trojan detection.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 The thesis introduces a new physical side-channel, which we call the backscattering side-channel, and propose novel hardware Trojan (HT) and counterfeit integrated circuit (IC) detection… (more)

Subjects/Keywords: Hardware trojan; Side channel; Hardware security; Backscattering side channel; ASIC security; FPGA; Counterfeit IC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, N. L. N. (2020). New side-channel and techniques for hardware trojan detection. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62821

Chicago Manual of Style (16th Edition):

Nguyen, Ngoc Luong Ngoc. “New side-channel and techniques for hardware trojan detection.” 2020. Doctoral Dissertation, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/62821.

MLA Handbook (7th Edition):

Nguyen, Ngoc Luong Ngoc. “New side-channel and techniques for hardware trojan detection.” 2020. Web. 03 Dec 2020.

Vancouver:

Nguyen NLN. New side-channel and techniques for hardware trojan detection. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/62821.

Council of Science Editors:

Nguyen NLN. New side-channel and techniques for hardware trojan detection. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62821


Georgia Tech

11. Swenson, Brian Paul. Techniques to improve the performance of large-scale discrete-event simulation.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 Discrete-event simulation is a commonly used technique to model changes within a complex physical systems as a series of events that occur at discrete points… (more)

Subjects/Keywords: Simulation; GPU

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Swenson, B. P. (2015). Techniques to improve the performance of large-scale discrete-event simulation. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53887

Chicago Manual of Style (16th Edition):

Swenson, Brian Paul. “Techniques to improve the performance of large-scale discrete-event simulation.” 2015. Doctoral Dissertation, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/53887.

MLA Handbook (7th Edition):

Swenson, Brian Paul. “Techniques to improve the performance of large-scale discrete-event simulation.” 2015. Web. 03 Dec 2020.

Vancouver:

Swenson BP. Techniques to improve the performance of large-scale discrete-event simulation. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/53887.

Council of Science Editors:

Swenson BP. Techniques to improve the performance of large-scale discrete-event simulation. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53887

12. Abbasi, Hamza Ijaz. Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 Over the past few years, the occurrence of enormous human, societal, environmental and economic losses due to traffic accidents has led toward a search for… (more)

Subjects/Keywords: Vehicular networks; Safety message; VANET; ITS; Connected vehicle; Routing; Multi-hop broadcasting; Autonomous vehicles

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abbasi, H. I. (2018). Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/61102

Chicago Manual of Style (16th Edition):

Abbasi, Hamza Ijaz. “Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks.” 2018. Doctoral Dissertation, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/61102.

MLA Handbook (7th Edition):

Abbasi, Hamza Ijaz. “Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks.” 2018. Web. 03 Dec 2020.

Vancouver:

Abbasi HI. Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/61102.

Council of Science Editors:

Abbasi HI. Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/61102

13. Lertpratchya, Daniel. Robust multicast protocols for wireless multihop networks.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 The problem of multicasting in wireless multihop networks was studied in this dissertation. Nodes in the multicast routing structures were classified into different classes based… (more)

Subjects/Keywords: Wireless networks; Multicast routing; Bursty wireless links

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lertpratchya, D. (2014). Robust multicast protocols for wireless multihop networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52221

Chicago Manual of Style (16th Edition):

Lertpratchya, Daniel. “Robust multicast protocols for wireless multihop networks.” 2014. Doctoral Dissertation, Georgia Tech. Accessed December 03, 2020. http://hdl.handle.net/1853/52221.

MLA Handbook (7th Edition):

Lertpratchya, Daniel. “Robust multicast protocols for wireless multihop networks.” 2014. Web. 03 Dec 2020.

Vancouver:

Lertpratchya D. Robust multicast protocols for wireless multihop networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1853/52221.

Council of Science Editors:

Lertpratchya D. Robust multicast protocols for wireless multihop networks. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52221

.