Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Penn State University" +contributor:("Sencun Zhu, Thesis Advisor/Co-Advisor"). Showing records 1 – 28 of 28 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Penn State University

1. Song, Yang. A Machine Learning Based Approach To App Rating Manipulation Detection.

Degree: 2014, Penn State University

 In order to promote apps in mobile app stores, for malicious developers and users, manipulating average rating is a popular and feasible way. In this… (more)

Subjects/Keywords: machine learning; app rating manipulation; app store

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, Y. (2014). A Machine Learning Based Approach To App Rating Manipulation Detection. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/21327

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Song, Yang. “A Machine Learning Based Approach To App Rating Manipulation Detection.” 2014. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/21327.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Song, Yang. “A Machine Learning Based Approach To App Rating Manipulation Detection.” 2014. Web. 05 Dec 2020.

Vancouver:

Song Y. A Machine Learning Based Approach To App Rating Manipulation Detection. [Internet] [Thesis]. Penn State University; 2014. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/21327.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Song Y. A Machine Learning Based Approach To App Rating Manipulation Detection. [Thesis]. Penn State University; 2014. Available from: https://submit-etda.libraries.psu.edu/catalog/21327

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

2. Zeng, Ke. measurement study of user feedback in mobile app stores.

Degree: 2014, Penn State University

 User feedback is an important component for mobile app markets such as Apple App Store, because it is a crucial factor in determining popularity as… (more)

Subjects/Keywords: mobile app stores; user rating and comments; review spam detection; user feedback analysis; topic model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zeng, K. (2014). measurement study of user feedback in mobile app stores. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/23691

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zeng, Ke. “measurement study of user feedback in mobile app stores.” 2014. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/23691.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zeng, Ke. “measurement study of user feedback in mobile app stores.” 2014. Web. 05 Dec 2020.

Vancouver:

Zeng K. measurement study of user feedback in mobile app stores. [Internet] [Thesis]. Penn State University; 2014. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/23691.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zeng K. measurement study of user feedback in mobile app stores. [Thesis]. Penn State University; 2014. Available from: https://submit-etda.libraries.psu.edu/catalog/23691

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

3. Li, Xi. APPGRADER: AN APP QUALITY GRADING SYSTEM BASED ON CODE-LEVEL FEATURES.

Degree: 2018, Penn State University

 The current app ranking systems applied by app markets are mainly based on app rating and downloads. However, these systems have drawbacks in handling: (i)… (more)

Subjects/Keywords: Mobile App Ranking; App Quality Evaluation; App View; Graph Convolutional Network; Deep Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, X. (2018). APPGRADER: AN APP QUALITY GRADING SYSTEM BASED ON CODE-LEVEL FEATURES. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15271xzl45

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Xi. “APPGRADER: AN APP QUALITY GRADING SYSTEM BASED ON CODE-LEVEL FEATURES.” 2018. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/15271xzl45.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Xi. “APPGRADER: AN APP QUALITY GRADING SYSTEM BASED ON CODE-LEVEL FEATURES.” 2018. Web. 05 Dec 2020.

Vancouver:

Li X. APPGRADER: AN APP QUALITY GRADING SYSTEM BASED ON CODE-LEVEL FEATURES. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/15271xzl45.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li X. APPGRADER: AN APP QUALITY GRADING SYSTEM BASED ON CODE-LEVEL FEATURES. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15271xzl45

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

4. Zhao, Yu. QoSn-Based Management for Participatory Sensing.

Degree: 2013, Penn State University

 To enhance user experience, vendors have equipped mobile phones with various kinds of sensors in recent years. Though small, these embedded sensors have greatly improved… (more)

Subjects/Keywords: QoSn-Based; Participatory Sensing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhao, Y. (2013). QoSn-Based Management for Participatory Sensing. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhao, Yu. “QoSn-Based Management for Participatory Sensing.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/17601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhao, Yu. “QoSn-Based Management for Participatory Sensing.” 2013. Web. 05 Dec 2020.

Vancouver:

Zhao Y. QoSn-Based Management for Participatory Sensing. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/17601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhao Y. QoSn-Based Management for Participatory Sensing. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/17601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

5. Frederick, Tyler James. A High-Performance System for Anonymity in Peer-to-Peer File Transfer Networks.

Degree: 2017, Penn State University

 In peer-to-peer file transfer, the properties of privacy and performance are often mutually exclusive. Although there are a wide variety of peer-to-peer applications and networks… (more)

Subjects/Keywords: BitTorrent; Tor; P2P; Peer-to-Peer; Entanglement; DC Net; Dining Cryptographers; Bandwidth; File Sharing; File Transfer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frederick, T. J. (2017). A High-Performance System for Anonymity in Peer-to-Peer File Transfer Networks. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12633tjf223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frederick, Tyler James. “A High-Performance System for Anonymity in Peer-to-Peer File Transfer Networks.” 2017. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/12633tjf223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frederick, Tyler James. “A High-Performance System for Anonymity in Peer-to-Peer File Transfer Networks.” 2017. Web. 05 Dec 2020.

Vancouver:

Frederick TJ. A High-Performance System for Anonymity in Peer-to-Peer File Transfer Networks. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/12633tjf223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frederick TJ. A High-Performance System for Anonymity in Peer-to-Peer File Transfer Networks. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/12633tjf223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

6. Karamchandani, Neeraj. MUTATION BASED PROTOCOL FUZZER FOR IOT.

Degree: 2017, Penn State University

 Internet of Things (IoT) is changing the way we live. Now everyday objects are being connected to the Internet from thermostats to CCTV cameras, from… (more)

Subjects/Keywords: Fuzzer; Android Things; HomeKit; IoT; Internet of Things; Security of Internet of Things

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karamchandani, N. (2017). MUTATION BASED PROTOCOL FUZZER FOR IOT. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14890njk5270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Karamchandani, Neeraj. “MUTATION BASED PROTOCOL FUZZER FOR IOT.” 2017. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/14890njk5270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Karamchandani, Neeraj. “MUTATION BASED PROTOCOL FUZZER FOR IOT.” 2017. Web. 05 Dec 2020.

Vancouver:

Karamchandani N. MUTATION BASED PROTOCOL FUZZER FOR IOT. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/14890njk5270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Karamchandani N. MUTATION BASED PROTOCOL FUZZER FOR IOT. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/14890njk5270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

7. Huang, Chu. Towards Trusted Computational Services: Result Verification Schemes for MapReduce .

Degree: 2011, Penn State University

 Recent development in Internet-scale data applications and services, combined with the proliferation of cloud computing, has created a new computing model for data intensive computing… (more)

Subjects/Keywords: watermark; verification; MapReduce

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, C. (2011). Towards Trusted Computational Services: Result Verification Schemes for MapReduce . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Chu. “Towards Trusted Computational Services: Result Verification Schemes for MapReduce .” 2011. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/12326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Chu. “Towards Trusted Computational Services: Result Verification Schemes for MapReduce .” 2011. Web. 05 Dec 2020.

Vancouver:

Huang C. Towards Trusted Computational Services: Result Verification Schemes for MapReduce . [Internet] [Thesis]. Penn State University; 2011. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/12326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang C. Towards Trusted Computational Services: Result Verification Schemes for MapReduce . [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/12326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

8. Chen, Ying. DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY .

Degree: 2011, Penn State University

 Currently adolescents highly rely on social media to interact with other people. Given the complicated environment of social media, it has become very difficult for… (more)

Subjects/Keywords: offensive language; children online safety; social media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2011). DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Ying. “DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY .” 2011. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/12609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Ying. “DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY .” 2011. Web. 05 Dec 2020.

Vancouver:

Chen Y. DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY . [Internet] [Thesis]. Penn State University; 2011. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/12609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY . [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/12609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

9. Sridhar, Srikumar. Testbed Design For Evaluation Of Active Cyber Defense Systems.

Degree: 2018, Penn State University

 As with any system, often times, an attacker only needs to know a single vulnerability to compromise the entire system. To ensure a system is… (more)

Subjects/Keywords: Moving Target Defense; Container Migration; Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sridhar, S. (2018). Testbed Design For Evaluation Of Active Cyber Defense Systems. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15730sus511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sridhar, Srikumar. “Testbed Design For Evaluation Of Active Cyber Defense Systems.” 2018. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/15730sus511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sridhar, Srikumar. “Testbed Design For Evaluation Of Active Cyber Defense Systems.” 2018. Web. 05 Dec 2020.

Vancouver:

Sridhar S. Testbed Design For Evaluation Of Active Cyber Defense Systems. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/15730sus511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sridhar S. Testbed Design For Evaluation Of Active Cyber Defense Systems. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15730sus511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

10. Liu, Sha. A PRIVACY-RESPECTING SYSTEM FOR MOBILE CAMERAS.

Degree: 2017, Penn State University

 With the growing popularity of mobile devices with built-in cameras, especially wearable devices such as Google glasses, capturing images has become a trivial job for… (more)

Subjects/Keywords: mobile cameras; privacy protection; Bluetooth; BLE broadcast; face matching

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, S. (2017). A PRIVACY-RESPECTING SYSTEM FOR MOBILE CAMERAS. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14817sxl81

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Sha. “A PRIVACY-RESPECTING SYSTEM FOR MOBILE CAMERAS.” 2017. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/14817sxl81.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Sha. “A PRIVACY-RESPECTING SYSTEM FOR MOBILE CAMERAS.” 2017. Web. 05 Dec 2020.

Vancouver:

Liu S. A PRIVACY-RESPECTING SYSTEM FOR MOBILE CAMERAS. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/14817sxl81.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu S. A PRIVACY-RESPECTING SYSTEM FOR MOBILE CAMERAS. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/14817sxl81

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

11. Wu, Xuan. design and implementation of over-the-air parental control for smartphones.

Degree: 2014, Penn State University

 Prevalence of smartphones is growing among children. It presents threats to children. Children’s unlimited access to smartphones may become study distraction. Even worse, children are… (more)

Subjects/Keywords: parental control; Android; context-based

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, X. (2014). design and implementation of over-the-air parental control for smartphones. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/21407

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Xuan. “design and implementation of over-the-air parental control for smartphones.” 2014. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/21407.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Xuan. “design and implementation of over-the-air parental control for smartphones.” 2014. Web. 05 Dec 2020.

Vancouver:

Wu X. design and implementation of over-the-air parental control for smartphones. [Internet] [Thesis]. Penn State University; 2014. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/21407.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu X. design and implementation of over-the-air parental control for smartphones. [Thesis]. Penn State University; 2014. Available from: https://submit-etda.libraries.psu.edu/catalog/21407

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

12. Noureldeen, Ali. Security Study of Ranking Algorithms.

Degree: 2019, Penn State University

 Rankings, ratings, and reviews are properties that play an important role in social media networks and platforms. Many users base their decision solely on such… (more)

Subjects/Keywords: Ranking Algorthims; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Noureldeen, A. (2019). Security Study of Ranking Algorithms. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15249awn5175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Noureldeen, Ali. “Security Study of Ranking Algorithms.” 2019. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/15249awn5175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Noureldeen, Ali. “Security Study of Ranking Algorithms.” 2019. Web. 05 Dec 2020.

Vancouver:

Noureldeen A. Security Study of Ranking Algorithms. [Internet] [Thesis]. Penn State University; 2019. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/15249awn5175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Noureldeen A. Security Study of Ranking Algorithms. [Thesis]. Penn State University; 2019. Available from: https://submit-etda.libraries.psu.edu/catalog/15249awn5175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

13. Koshy, Diana. An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic.

Degree: 2013, Penn State University

 Over the last 4 years, Bitcoin, a decentralized P2P crypto-currency, has gained widespread attention. The ability to create pseudo-anonymous financial transactions using bitcoins has made… (more)

Subjects/Keywords: Bitcoin; CoinSeer; anonymity; deanonymization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koshy, D. (2013). An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/19859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koshy, Diana. “An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/19859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koshy, Diana. “An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic.” 2013. Web. 05 Dec 2020.

Vancouver:

Koshy D. An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/19859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koshy D. An Analysis Of Anonymity In Bitcoin Using P2P Network Traffic. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/19859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

14. Koshy, Philip. CoinSeer: A Telescope Into Bitcoin.

Degree: 2013, Penn State University

 Bitcoin is a decentralized cryptographic currency that has gained popularity since it was created by Satoshi Nakamoto in 2009. The currency has garnered the interest… (more)

Subjects/Keywords: Bitcoin; security; CoinSeer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koshy, P. (2013). CoinSeer: A Telescope Into Bitcoin. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/19857

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koshy, Philip. “CoinSeer: A Telescope Into Bitcoin.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/19857.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koshy, Philip. “CoinSeer: A Telescope Into Bitcoin.” 2013. Web. 05 Dec 2020.

Vancouver:

Koshy P. CoinSeer: A Telescope Into Bitcoin. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/19857.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koshy P. CoinSeer: A Telescope Into Bitcoin. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/19857

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

15. Tack, Jonsimon. Protect My Child, A New Paradigm in Parental Control.

Degree: 2016, Penn State University

 Parental control systems have existed for years and enjoy a sizable market. Recent advances in computing provide opportunities to apply new ideas to the parental… (more)

Subjects/Keywords: Parental Control; Mobile Devices; Child Safety

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tack, J. (2016). Protect My Child, A New Paradigm in Parental Control. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/13455jxt958

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tack, Jonsimon. “Protect My Child, A New Paradigm in Parental Control.” 2016. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/13455jxt958.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tack, Jonsimon. “Protect My Child, A New Paradigm in Parental Control.” 2016. Web. 05 Dec 2020.

Vancouver:

Tack J. Protect My Child, A New Paradigm in Parental Control. [Internet] [Thesis]. Penn State University; 2016. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/13455jxt958.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tack J. Protect My Child, A New Paradigm in Parental Control. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/13455jxt958

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

16. Jiang, Rui. A Customized Real Time Restaurant Recommendation System.

Degree: 2015, Penn State University

 According to a Search Engine Land survey conducted in 2014, 88% of consumers have read online reviews to determine the quality of a local business… (more)

Subjects/Keywords: machine learning; natural language process; real-time recommendation; customized

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, R. (2015). A Customized Real Time Restaurant Recommendation System. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/27099

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jiang, Rui. “A Customized Real Time Restaurant Recommendation System.” 2015. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/27099.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jiang, Rui. “A Customized Real Time Restaurant Recommendation System.” 2015. Web. 05 Dec 2020.

Vancouver:

Jiang R. A Customized Real Time Restaurant Recommendation System. [Internet] [Thesis]. Penn State University; 2015. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/27099.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jiang R. A Customized Real Time Restaurant Recommendation System. [Thesis]. Penn State University; 2015. Available from: https://submit-etda.libraries.psu.edu/catalog/27099

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

17. Zhong, Wei. DICE: A NONDETERMINISTIC MEMORY ALIGNMENT DEFENSE AGAINST HEAP TAICHI.

Degree: 2011, Penn State University

 Heap spraying is a security attack that mostly accounts for the popularity of exploits targeting web browsers and Adobe family products over the last few… (more)

Subjects/Keywords: heap spraying; allocation granularity; shellcode injection; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, W. (2011). DICE: A NONDETERMINISTIC MEMORY ALIGNMENT DEFENSE AGAINST HEAP TAICHI. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12329

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Wei. “DICE: A NONDETERMINISTIC MEMORY ALIGNMENT DEFENSE AGAINST HEAP TAICHI.” 2011. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/12329.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Wei. “DICE: A NONDETERMINISTIC MEMORY ALIGNMENT DEFENSE AGAINST HEAP TAICHI.” 2011. Web. 05 Dec 2020.

Vancouver:

Zhong W. DICE: A NONDETERMINISTIC MEMORY ALIGNMENT DEFENSE AGAINST HEAP TAICHI. [Internet] [Thesis]. Penn State University; 2011. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/12329.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong W. DICE: A NONDETERMINISTIC MEMORY ALIGNMENT DEFENSE AGAINST HEAP TAICHI. [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/12329

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

18. Balakavi, Rahul Mv. ANALYZING IMAGE PRIVACY FOR THE MODERN WEB.

Degree: 2014, Penn State University

 Images are now one of the most common forms of digital content shared online in social network and other web 2.0 applications. With the availability… (more)

Subjects/Keywords: privacy images learning models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Balakavi, R. M. (2014). ANALYZING IMAGE PRIVACY FOR THE MODERN WEB. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/22064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Balakavi, Rahul Mv. “ANALYZING IMAGE PRIVACY FOR THE MODERN WEB.” 2014. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/22064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Balakavi, Rahul Mv. “ANALYZING IMAGE PRIVACY FOR THE MODERN WEB.” 2014. Web. 05 Dec 2020.

Vancouver:

Balakavi RM. ANALYZING IMAGE PRIVACY FOR THE MODERN WEB. [Internet] [Thesis]. Penn State University; 2014. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/22064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Balakavi RM. ANALYZING IMAGE PRIVACY FOR THE MODERN WEB. [Thesis]. Penn State University; 2014. Available from: https://submit-etda.libraries.psu.edu/catalog/22064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

19. Li, Longquan. Self-healing Wireless Networks under Insider Jamming Attacks.

Degree: 2013, Penn State University

 As jamming is a very serious threat to the normal operation of wireless networks, recently much research work has been done to deal with it.… (more)

Subjects/Keywords: Self-healing; Insider Jamming Attacks; Jammer Identification; Wireless Networks; Node Revocation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, L. (2013). Self-healing Wireless Networks under Insider Jamming Attacks. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/19715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Longquan. “Self-healing Wireless Networks under Insider Jamming Attacks.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/19715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Longquan. “Self-healing Wireless Networks under Insider Jamming Attacks.” 2013. Web. 05 Dec 2020.

Vancouver:

Li L. Self-healing Wireless Networks under Insider Jamming Attacks. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/19715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li L. Self-healing Wireless Networks under Insider Jamming Attacks. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/19715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

20. Tian, Yuan. Advanced Path Queries in Road Networks.

Degree: 2013, Penn State University

 On a road network, the minimum cost path (or min-cost path for short) from a source location to a destination is a path with the… (more)

Subjects/Keywords: Road networks; path query; algorithm; location-based service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tian, Y. (2013). Advanced Path Queries in Road Networks. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/19663

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tian, Yuan. “Advanced Path Queries in Road Networks.” 2013. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/19663.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tian, Yuan. “Advanced Path Queries in Road Networks.” 2013. Web. 05 Dec 2020.

Vancouver:

Tian Y. Advanced Path Queries in Road Networks. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/19663.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tian Y. Advanced Path Queries in Road Networks. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/19663

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

21. Patankar, Harshal D. PARTIAL-REVOCATION BASED TRUST MANAGEMENT IN AD HOC NETWORKS .

Degree: 2011, Penn State University

 Although it has been well understood that trust is a fuzzy value, traditional trust revocation has always been a binary operation. When studying how to… (more)

Subjects/Keywords: IDS; Trusted Authority; TA; Trust Management; Ad Hoc Networks; Partial Revocation; Mutual Revocation; Intrusion Detection System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patankar, H. D. (2011). PARTIAL-REVOCATION BASED TRUST MANAGEMENT IN AD HOC NETWORKS . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12619

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Patankar, Harshal D. “PARTIAL-REVOCATION BASED TRUST MANAGEMENT IN AD HOC NETWORKS .” 2011. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/12619.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Patankar, Harshal D. “PARTIAL-REVOCATION BASED TRUST MANAGEMENT IN AD HOC NETWORKS .” 2011. Web. 05 Dec 2020.

Vancouver:

Patankar HD. PARTIAL-REVOCATION BASED TRUST MANAGEMENT IN AD HOC NETWORKS . [Internet] [Thesis]. Penn State University; 2011. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/12619.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Patankar HD. PARTIAL-REVOCATION BASED TRUST MANAGEMENT IN AD HOC NETWORKS . [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/12619

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

22. Huang, Shuo. Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach .

Degree: 2012, Penn State University

 In this thesis, I have implemented solution for detecting policy violators in online social communities. Given the increasing number of users and traffic in online… (more)

Subjects/Keywords: Social Network; Spam; Page Rank; Bayesian Network; Mutual Information

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, S. (2012). Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15346

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Shuo. “Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach .” 2012. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/15346.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Shuo. “Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach .” 2012. Web. 05 Dec 2020.

Vancouver:

Huang S. Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach . [Internet] [Thesis]. Penn State University; 2012. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/15346.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang S. Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach . [Thesis]. Penn State University; 2012. Available from: https://submit-etda.libraries.psu.edu/catalog/15346

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

23. Jiang, Xuan. Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks .

Degree: 2011, Penn State University

 Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes.… (more)

Subjects/Keywords: Jamming; Compromise-Resilient; Sensor Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, X. (2011). Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jiang, Xuan. “Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks .” 2011. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/12267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jiang, Xuan. “Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks .” 2011. Web. 05 Dec 2020.

Vancouver:

Jiang X. Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks . [Internet] [Thesis]. Penn State University; 2011. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/12267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jiang X. Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks . [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/12267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

24. Ruan, Ge. SensorEar: A Sensor Network Base Voice Eavesdropping System .

Degree: 2008, Penn State University

 In recent years, the research and application on sensor network became a very hot topic. People use sensors to collect information from environment, which is… (more)

Subjects/Keywords: sensor network; privacy; audio; compression

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ruan, G. (2008). SensorEar: A Sensor Network Base Voice Eavesdropping System . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9002

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ruan, Ge. “SensorEar: A Sensor Network Base Voice Eavesdropping System .” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/9002.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ruan, Ge. “SensorEar: A Sensor Network Base Voice Eavesdropping System .” 2008. Web. 05 Dec 2020.

Vancouver:

Ruan G. SensorEar: A Sensor Network Base Voice Eavesdropping System . [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/9002.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ruan G. SensorEar: A Sensor Network Base Voice Eavesdropping System . [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/9002

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

25. Chaugule, Ashwin. Interrupt And IPC Driven Kernel Framework For Prevention Against Smartphone Malware .

Degree: 2009, Penn State University

 Smartphones have several network interfaces like WiFi, Bluetooth and GSM. Since today's telephony infrastructure supports 3G and various other protocols of data transfer like WAP,… (more)

Subjects/Keywords: ipc; interrupts; kernel; smartphones; malware; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chaugule, A. (2009). Interrupt And IPC Driven Kernel Framework For Prevention Against Smartphone Malware . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9374

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chaugule, Ashwin. “Interrupt And IPC Driven Kernel Framework For Prevention Against Smartphone Malware .” 2009. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/9374.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chaugule, Ashwin. “Interrupt And IPC Driven Kernel Framework For Prevention Against Smartphone Malware .” 2009. Web. 05 Dec 2020.

Vancouver:

Chaugule A. Interrupt And IPC Driven Kernel Framework For Prevention Against Smartphone Malware . [Internet] [Thesis]. Penn State University; 2009. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/9374.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chaugule A. Interrupt And IPC Driven Kernel Framework For Prevention Against Smartphone Malware . [Thesis]. Penn State University; 2009. Available from: https://submit-etda.libraries.psu.edu/catalog/9374

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

26. Zhang, Lei. ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK.

Degree: 2008, Penn State University

 Since its emergence in 1997 [1] , online social networks have experienced dramatic evolution and played an increasingly important role in our life. With the… (more)

Subjects/Keywords: Teens ;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, L. (2008). ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9005

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Lei. “ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK.” 2008. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/9005.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Lei. “ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK.” 2008. Web. 05 Dec 2020.

Vancouver:

Zhang L. ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK. [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/9005.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang L. ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK. [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/9005

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

27. Jain, Soumya. Stolen Vehicle Tracking using Sensor Networks .

Degree: 2009, Penn State University

 Wireless sensor networks are typically deployed in ubiquitous and distributed computer system settings to ‘sense and send’ information. Recently, there have emerged a significant set… (more)

Subjects/Keywords: sleep scheduling; slave sensors; sensor network; roadside access point

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jain, S. (2009). Stolen Vehicle Tracking using Sensor Networks . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jain, Soumya. “Stolen Vehicle Tracking using Sensor Networks .” 2009. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/9676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jain, Soumya. “Stolen Vehicle Tracking using Sensor Networks .” 2009. Web. 05 Dec 2020.

Vancouver:

Jain S. Stolen Vehicle Tracking using Sensor Networks . [Internet] [Thesis]. Penn State University; 2009. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/9676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jain S. Stolen Vehicle Tracking using Sensor Networks . [Thesis]. Penn State University; 2009. Available from: https://submit-etda.libraries.psu.edu/catalog/9676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

28. Dutt, Sudeep. DISTRIBUTED DENIAL OF SERVICE ATTACKS IN IEEE 802.11S WIRELESS MESH NETWORKS.

Degree: 2009, Penn State University

 IEEE 802.11 Wireless Local Area Networks (WLAN's) have become ubiquitous over the past few years. IEEE 802.11s Wireless Mesh Networks (WMNs) can potentially provide cheap… (more)

Subjects/Keywords: Wireless; DDoS; IEEE 802.11s; WMN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dutt, S. (2009). DISTRIBUTED DENIAL OF SERVICE ATTACKS IN IEEE 802.11S WIRELESS MESH NETWORKS. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dutt, Sudeep. “DISTRIBUTED DENIAL OF SERVICE ATTACKS IN IEEE 802.11S WIRELESS MESH NETWORKS.” 2009. Thesis, Penn State University. Accessed December 05, 2020. https://submit-etda.libraries.psu.edu/catalog/9354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dutt, Sudeep. “DISTRIBUTED DENIAL OF SERVICE ATTACKS IN IEEE 802.11S WIRELESS MESH NETWORKS.” 2009. Web. 05 Dec 2020.

Vancouver:

Dutt S. DISTRIBUTED DENIAL OF SERVICE ATTACKS IN IEEE 802.11S WIRELESS MESH NETWORKS. [Internet] [Thesis]. Penn State University; 2009. [cited 2020 Dec 05]. Available from: https://submit-etda.libraries.psu.edu/catalog/9354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dutt S. DISTRIBUTED DENIAL OF SERVICE ATTACKS IN IEEE 802.11S WIRELESS MESH NETWORKS. [Thesis]. Penn State University; 2009. Available from: https://submit-etda.libraries.psu.edu/catalog/9354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.