Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Georgia Tech" +contributor:("Copeland, John"). Showing records 1 – 30 of 61 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Georgia Tech

1. Yang, Shukun. A diversity-based framework for dynamic password policy generation.

Degree: MS, Electrical and Computer Engineering, 2016, Georgia Tech

 To keep password users from creating simple and common passwords, major websites and applications provide a password-strength measure, namely a password checker that displays instant… (more)

Subjects/Keywords: Password; Authentication; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, S. (2016). A diversity-based framework for dynamic password policy generation. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58192

Chicago Manual of Style (16th Edition):

Yang, Shukun. “A diversity-based framework for dynamic password policy generation.” 2016. Masters Thesis, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/58192.

MLA Handbook (7th Edition):

Yang, Shukun. “A diversity-based framework for dynamic password policy generation.” 2016. Web. 22 Sep 2019.

Vancouver:

Yang S. A diversity-based framework for dynamic password policy generation. [Internet] [Masters thesis]. Georgia Tech; 2016. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/58192.

Council of Science Editors:

Yang S. A diversity-based framework for dynamic password policy generation. [Masters Thesis]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/58192


Georgia Tech

2. Young, Vinson. Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking.

Degree: MS, Electrical and Computer Engineering, 2014, Georgia Tech

 Computers were not built with security in mind. As such, security has and still often takes a back seat to performance. However, in an era… (more)

Subjects/Keywords: Security; Bloom filter; Control flow hijacking; Memory; Control flow integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Young, V. (2014). Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53994

Chicago Manual of Style (16th Edition):

Young, Vinson. “Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking.” 2014. Masters Thesis, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/53994.

MLA Handbook (7th Edition):

Young, Vinson. “Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking.” 2014. Web. 22 Sep 2019.

Vancouver:

Young V. Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking. [Internet] [Masters thesis]. Georgia Tech; 2014. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/53994.

Council of Science Editors:

Young V. Hardware-assisted security: bloom cache – scalable low-overhead control flow integrity checking. [Masters Thesis]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53994


Georgia Tech

3. Wampler, Christopher. Information leakage in encrypted IP video traffic.

Degree: MS, Electrical and Computer Engineering, 2014, Georgia Tech

 We show that information leakage occurs in video over IP traffic, including for encrypted payloads. It is possible to detect events occurring in the field… (more)

Subjects/Keywords: Information leakage; Video; Encoding

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wampler, C. (2014). Information leakage in encrypted IP video traffic. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54287

Chicago Manual of Style (16th Edition):

Wampler, Christopher. “Information leakage in encrypted IP video traffic.” 2014. Masters Thesis, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/54287.

MLA Handbook (7th Edition):

Wampler, Christopher. “Information leakage in encrypted IP video traffic.” 2014. Web. 22 Sep 2019.

Vancouver:

Wampler C. Information leakage in encrypted IP video traffic. [Internet] [Masters thesis]. Georgia Tech; 2014. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/54287.

Council of Science Editors:

Wampler C. Information leakage in encrypted IP video traffic. [Masters Thesis]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/54287


Georgia Tech

4. Srinivasan, Preethi. Fingerprinting cyber physical systems: A physics-based approach.

Degree: MS, Electrical and Computer Engineering, 2015, Georgia Tech

 Industrial Control System (ICS) networks used in critical infrastructure networks like the power grid represent a different set of security challenges when compared to traditional… (more)

Subjects/Keywords: ICS; SCADA; Security; Fingerprinting; CPS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Srinivasan, P. (2015). Fingerprinting cyber physical systems: A physics-based approach. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55542

Chicago Manual of Style (16th Edition):

Srinivasan, Preethi. “Fingerprinting cyber physical systems: A physics-based approach.” 2015. Masters Thesis, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/55542.

MLA Handbook (7th Edition):

Srinivasan, Preethi. “Fingerprinting cyber physical systems: A physics-based approach.” 2015. Web. 22 Sep 2019.

Vancouver:

Srinivasan P. Fingerprinting cyber physical systems: A physics-based approach. [Internet] [Masters thesis]. Georgia Tech; 2015. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/55542.

Council of Science Editors:

Srinivasan P. Fingerprinting cyber physical systems: A physics-based approach. [Masters Thesis]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/55542


Georgia Tech

5. Li, Weiqing. De-anonymizing social networks and mobility traces.

Degree: MS, Electrical and Computer Engineering, 2016, Georgia Tech

 When people utilize social applications and services, their privacy suffers potential serious threats. In this work, we present a novel, robust, and effective de-anonymization attack… (more)

Subjects/Keywords: De-anonymization; Social networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, W. (2016). De-anonymizing social networks and mobility traces. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58160

Chicago Manual of Style (16th Edition):

Li, Weiqing. “De-anonymizing social networks and mobility traces.” 2016. Masters Thesis, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/58160.

MLA Handbook (7th Edition):

Li, Weiqing. “De-anonymizing social networks and mobility traces.” 2016. Web. 22 Sep 2019.

Vancouver:

Li W. De-anonymizing social networks and mobility traces. [Internet] [Masters thesis]. Georgia Tech; 2016. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/58160.

Council of Science Editors:

Li W. De-anonymizing social networks and mobility traces. [Masters Thesis]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/58160


Georgia Tech

6. Dong, Zhenjiang. Optimizing parallel simulation of multi-core system.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 Multi-core design for CPU is the recent trend and we believe the trend will continue in near future. Researchers and industry architects utilize simulation to… (more)

Subjects/Keywords: Parallel simulation; Multicore-system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dong, Z. (2015). Optimizing parallel simulation of multi-core system. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54920

Chicago Manual of Style (16th Edition):

Dong, Zhenjiang. “Optimizing parallel simulation of multi-core system.” 2015. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/54920.

MLA Handbook (7th Edition):

Dong, Zhenjiang. “Optimizing parallel simulation of multi-core system.” 2015. Web. 22 Sep 2019.

Vancouver:

Dong Z. Optimizing parallel simulation of multi-core system. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/54920.

Council of Science Editors:

Dong Z. Optimizing parallel simulation of multi-core system. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54920


Georgia Tech

7. Fairbanks, Kevin D. Forensic framework for honeypot analysis.

Degree: PhD, Electrical and Computer Engineering, 2010, Georgia Tech

 The objective of this research is to evaluate and develop new forensic techniques for use in honeynet environments, in an effort to address areas where… (more)

Subjects/Keywords: Dentry; TimeKeeper; Ext4; File system forensics; Ext3; Honeypot; Computer crimes Investigation; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fairbanks, K. D. (2010). Forensic framework for honeypot analysis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33977

Chicago Manual of Style (16th Edition):

Fairbanks, Kevin D. “Forensic framework for honeypot analysis.” 2010. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/33977.

MLA Handbook (7th Edition):

Fairbanks, Kevin D. “Forensic framework for honeypot analysis.” 2010. Web. 22 Sep 2019.

Vancouver:

Fairbanks KD. Forensic framework for honeypot analysis. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/33977.

Council of Science Editors:

Fairbanks KD. Forensic framework for honeypot analysis. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33977


Georgia Tech

8. Erjongmanee, Supaporn. Study of network-service disruptions using heterogeneous data and statistical learning.

Degree: PhD, Electrical and Computer Engineering, 2011, Georgia Tech

 The study of network-service disruptions caused by large-scale disturbances has mainly focused on assessing network damage; however, network-disruption responses, i.e., how the disruptions occur depending… (more)

Subjects/Keywords: Statistical learning; Heterogeneous data; Network availability; Large-scale disturbances; Network dependence; Network disruptions; Network performance (Telecommunication); Telecommunication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Erjongmanee, S. (2011). Study of network-service disruptions using heterogeneous data and statistical learning. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/43601

Chicago Manual of Style (16th Edition):

Erjongmanee, Supaporn. “Study of network-service disruptions using heterogeneous data and statistical learning.” 2011. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/43601.

MLA Handbook (7th Edition):

Erjongmanee, Supaporn. “Study of network-service disruptions using heterogeneous data and statistical learning.” 2011. Web. 22 Sep 2019.

Vancouver:

Erjongmanee S. Study of network-service disruptions using heterogeneous data and statistical learning. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/43601.

Council of Science Editors:

Erjongmanee S. Study of network-service disruptions using heterogeneous data and statistical learning. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/43601


Georgia Tech

9. Formby, David. Network based fingerprinting techniques for industrial control systems.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 Fingerprinting techniques operating over the network are proposed to identify various aspects of industrial control systems (ICSs) including software, hardware, and physical devices. First, a… (more)

Subjects/Keywords: Network security; Industrial control systems; Network characterization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Formby, D. (2017). Network based fingerprinting techniques for industrial control systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60668

Chicago Manual of Style (16th Edition):

Formby, David. “Network based fingerprinting techniques for industrial control systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/60668.

MLA Handbook (7th Edition):

Formby, David. “Network based fingerprinting techniques for industrial control systems.” 2017. Web. 22 Sep 2019.

Vancouver:

Formby D. Network based fingerprinting techniques for industrial control systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/60668.

Council of Science Editors:

Formby D. Network based fingerprinting techniques for industrial control systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/60668


Georgia Tech

10. Chen, Gong. Improved security for digital advertising ecosystems.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 Digital advertising is the de facto primary way to monetize the entire Internet. For example, over 85% of annual revenue for two prestigious tech companies,… (more)

Subjects/Keywords: Digital advertising; Mobile security; User privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, G. (2018). Improved security for digital advertising ecosystems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60752

Chicago Manual of Style (16th Edition):

Chen, Gong. “Improved security for digital advertising ecosystems.” 2018. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/60752.

MLA Handbook (7th Edition):

Chen, Gong. “Improved security for digital advertising ecosystems.” 2018. Web. 22 Sep 2019.

Vancouver:

Chen G. Improved security for digital advertising ecosystems. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/60752.

Council of Science Editors:

Chen G. Improved security for digital advertising ecosystems. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/60752


Georgia Tech

11. Hayes, Brian D'Angelo. Efficient delivery of multimedia content over multipath networks.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 The objective of the proposed research is to develop a unique approach to efficiently deliver high-quality multimedia data by leveraging concepts from various multipath networking… (more)

Subjects/Keywords: MPTCP; QUIC; SDN; Streaming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hayes, B. D. (2018). Efficient delivery of multimedia content over multipath networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60272

Chicago Manual of Style (16th Edition):

Hayes, Brian D'Angelo. “Efficient delivery of multimedia content over multipath networks.” 2018. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/60272.

MLA Handbook (7th Edition):

Hayes, Brian D'Angelo. “Efficient delivery of multimedia content over multipath networks.” 2018. Web. 22 Sep 2019.

Vancouver:

Hayes BD. Efficient delivery of multimedia content over multipath networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/60272.

Council of Science Editors:

Hayes BD. Efficient delivery of multimedia content over multipath networks. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/60272


Georgia Tech

12. Uluagac, Arif Selcuk. A secure communication framework for wireless sensor networks.

Degree: PhD, Electrical and Computer Engineering, 2010, Georgia Tech

 Today, wireless sensor networks (WSNs) are no longer a nascent technology and future networks, especially Cyber-Physical Systems (CPS) will integrate more sensor-based systems into a… (more)

Subjects/Keywords: Virtual energy-based dynamic keying; Time-based dynamic keying; Security; Wireless sensor networks security; Wireless sensor networks; Wireless communication systems; Sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Uluagac, A. S. (2010). A secure communication framework for wireless sensor networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/34713

Chicago Manual of Style (16th Edition):

Uluagac, Arif Selcuk. “A secure communication framework for wireless sensor networks.” 2010. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/34713.

MLA Handbook (7th Edition):

Uluagac, Arif Selcuk. “A secure communication framework for wireless sensor networks.” 2010. Web. 22 Sep 2019.

Vancouver:

Uluagac AS. A secure communication framework for wireless sensor networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/34713.

Council of Science Editors:

Uluagac AS. A secure communication framework for wireless sensor networks. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/34713


Georgia Tech

13. Kihei, Billy. Predicting vehicular collisions in vehicle-to-vehicle networks using physical layer techniques.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 The wireless communication technology known as Vehicle-to-Vehicle (V2V) operating at the 5.9GHz Dedicated Short Range Communications (DSRC) band is set to enter the world stage.… (more)

Subjects/Keywords: DSRC; V2V; V2X; Doppler shift; RSSI; DOA; Physical layer; OFDM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kihei, B. (2017). Predicting vehicular collisions in vehicle-to-vehicle networks using physical layer techniques. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60661

Chicago Manual of Style (16th Edition):

Kihei, Billy. “Predicting vehicular collisions in vehicle-to-vehicle networks using physical layer techniques.” 2017. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/60661.

MLA Handbook (7th Edition):

Kihei, Billy. “Predicting vehicular collisions in vehicle-to-vehicle networks using physical layer techniques.” 2017. Web. 22 Sep 2019.

Vancouver:

Kihei B. Predicting vehicular collisions in vehicle-to-vehicle networks using physical layer techniques. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/60661.

Council of Science Editors:

Kihei B. Predicting vehicular collisions in vehicle-to-vehicle networks using physical layer techniques. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/60661


Georgia Tech

14. Lee, Deuk K. Efficient service channel utilization in multichannel vehicular ad hoc networks.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 The current IEEE 1609.4 standard defines multichannel operations to alternate control and service channel intervals during a period of 100ms. However, there is no mention… (more)

Subjects/Keywords: IEEE 1609.4; VANETs; Service channel; Basic safety message; Concurrent transmissions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, D. K. (2018). Efficient service channel utilization in multichannel vehicular ad hoc networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/59815

Chicago Manual of Style (16th Edition):

Lee, Deuk K. “Efficient service channel utilization in multichannel vehicular ad hoc networks.” 2018. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/59815.

MLA Handbook (7th Edition):

Lee, Deuk K. “Efficient service channel utilization in multichannel vehicular ad hoc networks.” 2018. Web. 22 Sep 2019.

Vancouver:

Lee DK. Efficient service channel utilization in multichannel vehicular ad hoc networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/59815.

Council of Science Editors:

Lee DK. Efficient service channel utilization in multichannel vehicular ad hoc networks. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/59815


Georgia Tech

15. Abbasi, Hamza Ijaz. Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks.

Degree: PhD, Electrical and Computer Engineering, 2018, Georgia Tech

 Over the past few years, the occurrence of enormous human, societal, environmental and economic losses due to traffic accidents has led toward a search for… (more)

Subjects/Keywords: Vehicular Networks; Safety Message; VANET; ITS, Connected Vehicle; Routing; Multi-Hop Broadcasting; Autonomous Vehicles

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abbasi, H. I. (2018). Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/61102

Chicago Manual of Style (16th Edition):

Abbasi, Hamza Ijaz. “Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks.” 2018. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/61102.

MLA Handbook (7th Edition):

Abbasi, Hamza Ijaz. “Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks.” 2018. Web. 22 Sep 2019.

Vancouver:

Abbasi HI. Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2018. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/61102.

Council of Science Editors:

Abbasi HI. Efficient Safety Message Dissemination in Vehicular Ad Hoc Networks. [Doctoral Dissertation]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/61102

16. Formby, David. A physical overlay framework for insider threat mitigation of power system devices.

Degree: MS, Electrical and Computer Engineering, 2014, Georgia Tech

 Nearly every aspect of modern life today, from businesses, transportation, and healthcare, depends on the power grid operating safely and reliably. While the recent push… (more)

Subjects/Keywords: SCADA security; Power grid security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Formby, D. (2014). A physical overlay framework for insider threat mitigation of power system devices. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53107

Chicago Manual of Style (16th Edition):

Formby, David. “A physical overlay framework for insider threat mitigation of power system devices.” 2014. Masters Thesis, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/53107.

MLA Handbook (7th Edition):

Formby, David. “A physical overlay framework for insider threat mitigation of power system devices.” 2014. Web. 22 Sep 2019.

Vancouver:

Formby D. A physical overlay framework for insider threat mitigation of power system devices. [Internet] [Masters thesis]. Georgia Tech; 2014. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/53107.

Council of Science Editors:

Formby D. A physical overlay framework for insider threat mitigation of power system devices. [Masters Thesis]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53107

17. Sridharan, Venkatraman. Cyber security in power systems.

Degree: MS, Electrical and Computer Engineering, 2012, Georgia Tech

 Many automation and power control systems are integrated into the 'Smart Grid' concept for efficiently managing and delivering electric power. This integrated approach created several… (more)

Subjects/Keywords: Cyber security; SCADA; NERC; PLA; Electric power distribution; Cyberterrorism; Computer security; Computer networks Security measures

…and aid the development of a SCADA test bed, to be constructed on the Georgia Tech Campus… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sridharan, V. (2012). Cyber security in power systems. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/43692

Chicago Manual of Style (16th Edition):

Sridharan, Venkatraman. “Cyber security in power systems.” 2012. Masters Thesis, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/43692.

MLA Handbook (7th Edition):

Sridharan, Venkatraman. “Cyber security in power systems.” 2012. Web. 22 Sep 2019.

Vancouver:

Sridharan V. Cyber security in power systems. [Internet] [Masters thesis]. Georgia Tech; 2012. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/43692.

Council of Science Editors:

Sridharan V. Cyber security in power systems. [Masters Thesis]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/43692

18. Goldman, Aaron David. CCFS cryptographically curated file system.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 The Internet was originally designed to be a next-generation phone system that could withstand a Soviet attack. Today, we ask the Internet to perform tasks… (more)

Subjects/Keywords: CCFS; Content centric networking; Hash; Signature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Goldman, A. D. (2015). CCFS cryptographically curated file system. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54394

Chicago Manual of Style (16th Edition):

Goldman, Aaron David. “CCFS cryptographically curated file system.” 2015. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/54394.

MLA Handbook (7th Edition):

Goldman, Aaron David. “CCFS cryptographically curated file system.” 2015. Web. 22 Sep 2019.

Vancouver:

Goldman AD. CCFS cryptographically curated file system. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/54394.

Council of Science Editors:

Goldman AD. CCFS cryptographically curated file system. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54394

19. Ji, Shouling. Evaluating the security of anonymized big graph/structural data.

Degree: PhD, Electrical and Computer Engineering, 2016, Georgia Tech

 We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymization (DA) attacks, comprehensive anonymity, utility, and de-anonymizability quantifications, and a… (more)

Subjects/Keywords: Security and privacy; Graph data; Structural data; De-anonymization; Anonymization; Quantification; Evaluation; Utility; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ji, S. (2016). Evaluating the security of anonymized big graph/structural data. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54913

Chicago Manual of Style (16th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/54913.

MLA Handbook (7th Edition):

Ji, Shouling. “Evaluating the security of anonymized big graph/structural data.” 2016. Web. 22 Sep 2019.

Vancouver:

Ji S. Evaluating the security of anonymized big graph/structural data. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/54913.

Council of Science Editors:

Ji S. Evaluating the security of anonymized big graph/structural data. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/54913

20. Nunnally, Troy J. Advanced visualizations for network security.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of… (more)

Subjects/Keywords: Natural user interface; Human computer interaction; Security visualization; 3D visualization; Vulnerability assessment; Stereoscopic visualization; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nunnally, T. J. (2014). Advanced visualizations for network security. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52993

Chicago Manual of Style (16th Edition):

Nunnally, Troy J. “Advanced visualizations for network security.” 2014. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/52993.

MLA Handbook (7th Edition):

Nunnally, Troy J. “Advanced visualizations for network security.” 2014. Web. 22 Sep 2019.

Vancouver:

Nunnally TJ. Advanced visualizations for network security. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/52993.

Council of Science Editors:

Nunnally TJ. Advanced visualizations for network security. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/52993

21. Brzeczko, Albert Walter. Scalable framework for turn-key honeynet deployment.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 Enterprise networks present very high value targets in the eyes of malicious actors who seek to exfiltrate sensitive proprietary data, disrupt the operations of a… (more)

Subjects/Keywords: Honeynet; Cloud computing; Information security; Intrusion detection systems (Computer security); Computer networks Security measures

Georgia Tech. The contributions shown by our 1 Indeed, these attacks were only discovered in… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brzeczko, A. W. (2014). Scalable framework for turn-key honeynet deployment. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/51842

Chicago Manual of Style (16th Edition):

Brzeczko, Albert Walter. “Scalable framework for turn-key honeynet deployment.” 2014. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/51842.

MLA Handbook (7th Edition):

Brzeczko, Albert Walter. “Scalable framework for turn-key honeynet deployment.” 2014. Web. 22 Sep 2019.

Vancouver:

Brzeczko AW. Scalable framework for turn-key honeynet deployment. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/51842.

Council of Science Editors:

Brzeczko AW. Scalable framework for turn-key honeynet deployment. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/51842

22. Lee, Christopher Patrick. Framework for botnet emulation and analysis.

Degree: PhD, Electrical and Computer Engineering, 2009, Georgia Tech

 Criminals use the anonymity and pervasiveness of the Internet to commit fraud, extortion, and theft. Botnets are used as the primary tool for this criminal… (more)

Subjects/Keywords: Simulation; Simulators; Emulation; Spam; DDoS; Information security; Botnets; Network security; Computer networks Security measures; Computer crimes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, C. P. (2009). Framework for botnet emulation and analysis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/28191

Chicago Manual of Style (16th Edition):

Lee, Christopher Patrick. “Framework for botnet emulation and analysis.” 2009. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/28191.

MLA Handbook (7th Edition):

Lee, Christopher Patrick. “Framework for botnet emulation and analysis.” 2009. Web. 22 Sep 2019.

Vancouver:

Lee CP. Framework for botnet emulation and analysis. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/28191.

Council of Science Editors:

Lee CP. Framework for botnet emulation and analysis. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/28191

23. Lim, Yu-Xi. Efficient wireless location estimation through simultaneous localization and mapping.

Degree: PhD, Electrical and Computer Engineering, 2009, Georgia Tech

 Conventional Wi-Fi location estimation techniques using radio fingerprinting typically require a lengthy initial site survey. It is suggested that the lengthy site survey is a… (more)

Subjects/Keywords: Wi-fi; Wireless networks; IEEE 802.11; Location estimation; Positioning; Wireless LANs; Location-based services; Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lim, Y. (2009). Efficient wireless location estimation through simultaneous localization and mapping. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/28219

Chicago Manual of Style (16th Edition):

Lim, Yu-Xi. “Efficient wireless location estimation through simultaneous localization and mapping.” 2009. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/28219.

MLA Handbook (7th Edition):

Lim, Yu-Xi. “Efficient wireless location estimation through simultaneous localization and mapping.” 2009. Web. 22 Sep 2019.

Vancouver:

Lim Y. Efficient wireless location estimation through simultaneous localization and mapping. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/28219.

Council of Science Editors:

Lim Y. Efficient wireless location estimation through simultaneous localization and mapping. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/28219

24. Nowatkowski, Michael E. Certificate revocation list distribution in vehicular ad hoc networks.

Degree: PhD, Electrical and Computer Engineering, 2010, Georgia Tech

 The objective of this research is to investigate improved methods for distributing certificate revocation lists (CRLs) in vehicular ad hoc networks (VANETs). VANETs are a… (more)

Subjects/Keywords: Network security; Vehicular ad hoc network; Simulation; IEEE 1609; Certificate revocation list; ns-3; Vehicular ad hoc networks (Computer networks); Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nowatkowski, M. E. (2010). Certificate revocation list distribution in vehicular ad hoc networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33971

Chicago Manual of Style (16th Edition):

Nowatkowski, Michael E. “Certificate revocation list distribution in vehicular ad hoc networks.” 2010. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/33971.

MLA Handbook (7th Edition):

Nowatkowski, Michael E. “Certificate revocation list distribution in vehicular ad hoc networks.” 2010. Web. 22 Sep 2019.

Vancouver:

Nowatkowski ME. Certificate revocation list distribution in vehicular ad hoc networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/33971.

Council of Science Editors:

Nowatkowski ME. Certificate revocation list distribution in vehicular ad hoc networks. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33971

25. Lee, Junghee. Many-core architecture for programmable hardware accelerator.

Degree: PhD, Electrical and Computer Engineering, 2013, Georgia Tech

 As the further development of single-core architectures faces seemingly insurmountable physical and technological limitations, computer designers have turned their attention to alternative approaches. One such… (more)

Subjects/Keywords: Hardware accelerator; Load-balancing; Networks-on-chip; Execution model; Graphics processing units; Computers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, J. (2013). Many-core architecture for programmable hardware accelerator. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/50319

Chicago Manual of Style (16th Edition):

Lee, Junghee. “Many-core architecture for programmable hardware accelerator.” 2013. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/50319.

MLA Handbook (7th Edition):

Lee, Junghee. “Many-core architecture for programmable hardware accelerator.” 2013. Web. 22 Sep 2019.

Vancouver:

Lee J. Many-core architecture for programmable hardware accelerator. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/50319.

Council of Science Editors:

Lee J. Many-core architecture for programmable hardware accelerator. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/50319

26. Zhang, Junjie. Effective and scalable botnet detection in network traffic.

Degree: PhD, Computing, 2012, Georgia Tech

 Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-scale… (more)

Subjects/Keywords: Intrusion detection; Network security; Botnet; Computer networks Security measures; Internet; Internet governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, J. (2012). Effective and scalable botnet detection in network traffic. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/44837

Chicago Manual of Style (16th Edition):

Zhang, Junjie. “Effective and scalable botnet detection in network traffic.” 2012. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/44837.

MLA Handbook (7th Edition):

Zhang, Junjie. “Effective and scalable botnet detection in network traffic.” 2012. Web. 22 Sep 2019.

Vancouver:

Zhang J. Effective and scalable botnet detection in network traffic. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/44837.

Council of Science Editors:

Zhang J. Effective and scalable botnet detection in network traffic. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/44837

27. Benin, Joseph Thomas. Unified distribution of pseudonyms in hybrid ephemeral vehicular networks.

Degree: PhD, Electrical and Computer Engineering, 2012, Georgia Tech

 This research devises a unified method for the distribution of pseudonyms in hybrid ephemeral vehicular networks (VNs), which are often referred to as vehicular ad… (more)

Subjects/Keywords: VANET; VPKI; Pseudonym; 1609; Vehicular ad hoc networks (Computer networks); Ad hoc networks (Computer networks); Mobile computing; Wireless communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Benin, J. T. (2012). Unified distribution of pseudonyms in hybrid ephemeral vehicular networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/45910

Chicago Manual of Style (16th Edition):

Benin, Joseph Thomas. “Unified distribution of pseudonyms in hybrid ephemeral vehicular networks.” 2012. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/45910.

MLA Handbook (7th Edition):

Benin, Joseph Thomas. “Unified distribution of pseudonyms in hybrid ephemeral vehicular networks.” 2012. Web. 22 Sep 2019.

Vancouver:

Benin JT. Unified distribution of pseudonyms in hybrid ephemeral vehicular networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/45910.

Council of Science Editors:

Benin JT. Unified distribution of pseudonyms in hybrid ephemeral vehicular networks. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/45910

28. Liao, Xiaojing. Towards automatically evaluating security risks and providing cyber intelligence.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 The cyber threat landscape is quickly changing, and it is of vital importance to stay abreast of emerging threats and to proactively work to improve… (more)

Subjects/Keywords: Security; Cyber threat; Threat intelligence; Natural language processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liao, X. (2017). Towards automatically evaluating security risks and providing cyber intelligence. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58679

Chicago Manual of Style (16th Edition):

Liao, Xiaojing. “Towards automatically evaluating security risks and providing cyber intelligence.” 2017. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/58679.

MLA Handbook (7th Edition):

Liao, Xiaojing. “Towards automatically evaluating security risks and providing cyber intelligence.” 2017. Web. 22 Sep 2019.

Vancouver:

Liao X. Towards automatically evaluating security risks and providing cyber intelligence. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/58679.

Council of Science Editors:

Liao X. Towards automatically evaluating security risks and providing cyber intelligence. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58679

29. Heath, Laura. Toward an internet protocol (version 6) deployable information-centric framework.

Degree: PhD, Electrical and Computer Engineering, 2014, Georgia Tech

 This research defines a new information-centric networking (ICN) framework and associated protocol that is implementable in the existing internet with feasible minimal changes to the… (more)

Subjects/Keywords: Information-centric; Network architecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Heath, L. (2014). Toward an internet protocol (version 6) deployable information-centric framework. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53077

Chicago Manual of Style (16th Edition):

Heath, Laura. “Toward an internet protocol (version 6) deployable information-centric framework.” 2014. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/53077.

MLA Handbook (7th Edition):

Heath, Laura. “Toward an internet protocol (version 6) deployable information-centric framework.” 2014. Web. 22 Sep 2019.

Vancouver:

Heath L. Toward an internet protocol (version 6) deployable information-centric framework. [Internet] [Doctoral dissertation]. Georgia Tech; 2014. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/53077.

Council of Science Editors:

Heath L. Toward an internet protocol (version 6) deployable information-centric framework. [Doctoral Dissertation]. Georgia Tech; 2014. Available from: http://hdl.handle.net/1853/53077

30. Cho, Jinyoun. Efficient safety message dissemination methods in vehicular adhoc networks.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 The methods for efficient safety message dissemination in VANETs were proposed. First, the method for using multi-channel was proposed. Using the proposed multi-channel method (divide-and-deliver… (more)

Subjects/Keywords: Vehicular adhoc network; Connected vehicle; Multi-channel; Multi-hop; Safety message

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, J. (2015). Efficient safety message dissemination methods in vehicular adhoc networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53390

Chicago Manual of Style (16th Edition):

Cho, Jinyoun. “Efficient safety message dissemination methods in vehicular adhoc networks.” 2015. Doctoral Dissertation, Georgia Tech. Accessed September 22, 2019. http://hdl.handle.net/1853/53390.

MLA Handbook (7th Edition):

Cho, Jinyoun. “Efficient safety message dissemination methods in vehicular adhoc networks.” 2015. Web. 22 Sep 2019.

Vancouver:

Cho J. Efficient safety message dissemination methods in vehicular adhoc networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2019 Sep 22]. Available from: http://hdl.handle.net/1853/53390.

Council of Science Editors:

Cho J. Efficient safety message dissemination methods in vehicular adhoc networks. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53390

[1] [2] [3]

.