Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Purdue University" +contributor:("Baijian Yang"). Showing records 1 – 15 of 15 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Purdue University

1. Wang, Weijie. A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records.

Degree: MS, Computer and Information Technology, 2015, Purdue University

  Security is essentially important for any enterprise networks. Denial of service, port scanning, and data exfiltration are among of the most common network intrusions.… (more)

Subjects/Keywords: Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, W. (2015). A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Weijie. “A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records.” 2015. Thesis, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_theses/626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Weijie. “A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records.” 2015. Web. 24 May 2019.

Vancouver:

Wang W. A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records. [Internet] [Thesis]. Purdue University; 2015. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_theses/626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang W. A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records. [Thesis]. Purdue University; 2015. Available from: http://docs.lib.purdue.edu/open_access_theses/626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

2. Faheem, Faheem. Ibeacon based proximity and indoor localization system.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  User location can be leveraged to provide a wide range of services in a variety of indoor locations including retails stores, hospitals, airports, museums… (more)

Subjects/Keywords: Applied sciences; Bayesian filtering; Ibeacon; Indoor localization; Internet of things; Location based services; Proximity based services; Electrical and Computer Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Faheem, F. (2016). Ibeacon based proximity and indoor localization system. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/767

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Faheem, Faheem. “Ibeacon based proximity and indoor localization system.” 2016. Thesis, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_theses/767.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Faheem, Faheem. “Ibeacon based proximity and indoor localization system.” 2016. Web. 24 May 2019.

Vancouver:

Faheem F. Ibeacon based proximity and indoor localization system. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_theses/767.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Faheem F. Ibeacon based proximity and indoor localization system. [Thesis]. Purdue University; 2016. Available from: http://docs.lib.purdue.edu/open_access_theses/767

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

3. Xie, Di. User-differentiated hierarchical key management for the bring-your-own-device environments.

Degree: MS, Technology, 2014, Purdue University

  To ensure confidentiality, the sensitive electronic data held within a corporation is always carefully encrypted and stored in a manner so that it is… (more)

Subjects/Keywords: Information Technology; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, D. (2014). User-differentiated hierarchical key management for the bring-your-own-device environments. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/462

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xie, Di. “User-differentiated hierarchical key management for the bring-your-own-device environments.” 2014. Thesis, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_theses/462.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xie, Di. “User-differentiated hierarchical key management for the bring-your-own-device environments.” 2014. Web. 24 May 2019.

Vancouver:

Xie D. User-differentiated hierarchical key management for the bring-your-own-device environments. [Internet] [Thesis]. Purdue University; 2014. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_theses/462.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xie D. User-differentiated hierarchical key management for the bring-your-own-device environments. [Thesis]. Purdue University; 2014. Available from: http://docs.lib.purdue.edu/open_access_theses/462

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

4. Silla, Chandrika. WeChat forensic artifacts: Android phone extraction and analysis.

Degree: MS, Computer and Information Technology, 2015, Purdue University

  Instant messaging (IM) applications on smart phones are being used across the globe for various modes of communication. They gained popularity mainly due to… (more)

Subjects/Keywords: Information Technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Silla, C. (2015). WeChat forensic artifacts: Android phone extraction and analysis. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Silla, Chandrika. “WeChat forensic artifacts: Android phone extraction and analysis.” 2015. Thesis, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_theses/615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Silla, Chandrika. “WeChat forensic artifacts: Android phone extraction and analysis.” 2015. Web. 24 May 2019.

Vancouver:

Silla C. WeChat forensic artifacts: Android phone extraction and analysis. [Internet] [Thesis]. Purdue University; 2015. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_theses/615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Silla C. WeChat forensic artifacts: Android phone extraction and analysis. [Thesis]. Purdue University; 2015. Available from: http://docs.lib.purdue.edu/open_access_theses/615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

5. Flory, Christopher Michael. Digital forensics and community supervision: Making a case for field based digital forensics training.

Degree: MA, Computer Science, 2015, Purdue University

  In this paper I will review the literature concerning investigator digital forensics models and how they apply to field investigators. A brief history of… (more)

Subjects/Keywords: Information Technology; Computer Sciences; Criminology and Criminal Justice; Vocational Education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flory, C. M. (2015). Digital forensics and community supervision: Making a case for field based digital forensics training. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Flory, Christopher Michael. “Digital forensics and community supervision: Making a case for field based digital forensics training.” 2015. Thesis, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_theses/567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Flory, Christopher Michael. “Digital forensics and community supervision: Making a case for field based digital forensics training.” 2015. Web. 24 May 2019.

Vancouver:

Flory CM. Digital forensics and community supervision: Making a case for field based digital forensics training. [Internet] [Thesis]. Purdue University; 2015. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_theses/567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Flory CM. Digital forensics and community supervision: Making a case for field based digital forensics training. [Thesis]. Purdue University; 2015. Available from: http://docs.lib.purdue.edu/open_access_theses/567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

6. Zhang, Yue. A cross-site study of user behavior and privacy perception in social networks.

Degree: MS, Technology, 2014, Purdue University

  While online social networking sites have brought convenience and diversity in people's social lives, they have also been the source for information leakage. Researchers… (more)

Subjects/Keywords: Library and Information Science; Social Work

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2014). A cross-site study of user behavior and privacy perception in social networks. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Yue. “A cross-site study of user behavior and privacy perception in social networks.” 2014. Thesis, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_theses/716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Yue. “A cross-site study of user behavior and privacy perception in social networks.” 2014. Web. 24 May 2019.

Vancouver:

Zhang Y. A cross-site study of user behavior and privacy perception in social networks. [Internet] [Thesis]. Purdue University; 2014. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_theses/716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang Y. A cross-site study of user behavior and privacy perception in social networks. [Thesis]. Purdue University; 2014. Available from: http://docs.lib.purdue.edu/open_access_theses/716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

7. Diao, Kelu. Hardware accelerated redundancy elimination in network system.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  With the tremendous growth in the amount of information stored on remote locations and cloud systems, many service providers are seeking ways to reduce… (more)

Subjects/Keywords: Applied sciences; Accleration; CUDA; GPU; Network; Ns-3; Redundancy elimination; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diao, K. (2016). Hardware accelerated redundancy elimination in network system. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diao, Kelu. “Hardware accelerated redundancy elimination in network system.” 2016. Thesis, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_theses/765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diao, Kelu. “Hardware accelerated redundancy elimination in network system.” 2016. Web. 24 May 2019.

Vancouver:

Diao K. Hardware accelerated redundancy elimination in network system. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_theses/765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diao K. Hardware accelerated redundancy elimination in network system. [Thesis]. Purdue University; 2016. Available from: http://docs.lib.purdue.edu/open_access_theses/765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

8. Hegde, Prajwal B. Monitoring DBMS activity to detect insider threat using query selectivity.

Degree: MS, Interdisciplinary Studies, 2016, Purdue University

  The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider… (more)

Subjects/Keywords: Information Technology; Applied sciences; Anomaly detection mechanism; Information security; Insider threat; Query optimizer; Query selectivity; Relational database management systems; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hegde, P. B. (2016). Monitoring DBMS activity to detect insider threat using query selectivity. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hegde, Prajwal B. “Monitoring DBMS activity to detect insider threat using query selectivity.” 2016. Thesis, Purdue University. Accessed May 24, 2019. https://docs.lib.purdue.edu/open_access_theses/952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hegde, Prajwal B. “Monitoring DBMS activity to detect insider threat using query selectivity.” 2016. Web. 24 May 2019.

Vancouver:

Hegde PB. Monitoring DBMS activity to detect insider threat using query selectivity. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 May 24]. Available from: https://docs.lib.purdue.edu/open_access_theses/952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hegde PB. Monitoring DBMS activity to detect insider threat using query selectivity. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

9. Alaskandrani, Faisal Talal. A Threat Intelligence Framework for Access Control Security In The Oil Industry.

Degree: MS, Computer and Information Technology, 2015, Purdue University

 The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing… (more)

Subjects/Keywords: Framework; ICS; NIST Cybersecurity framework; Oil Industry; SCADA; Threat Intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alaskandrani, F. T. (2015). A Threat Intelligence Framework for Access Control Security In The Oil Industry. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Thesis, Purdue University. Accessed May 24, 2019. https://docs.lib.purdue.edu/open_access_theses/1044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Web. 24 May 2019.

Vancouver:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Internet] [Thesis]. Purdue University; 2015. [cited 2019 May 24]. Available from: https://docs.lib.purdue.edu/open_access_theses/1044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Thesis]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_theses/1044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

10. Lerums, James Edward. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.

Degree: MS, Computer and Information Technology, 2016, Purdue University

 This thesis study introduces operational concepts for accelerating necessary cyber security improvements for critical infrastructure industrial control systems. National critical infrastructures’ industrial control systems experienced… (more)

Subjects/Keywords: Critical Infrastructure; Cybersecurity; Industrial Control Systems; Operationalization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lerums, J. E. (2016). Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Thesis, Purdue University. Accessed May 24, 2019. https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Web. 24 May 2019.

Vancouver:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 May 24]. Available from: https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

11. Alaskandrani, Faisal Talal. A Threat Intelligence Framework for Access Control Security In The Oil Industry.

Degree: MS, Computer and Information Technology, 2015, Purdue University

  The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry… (more)

Subjects/Keywords: Framework; ICS; NIST Cybersecurity framework; Oil Industry; SCADA; Threat Intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alaskandrani, F. T. (2015). A Threat Intelligence Framework for Access Control Security In The Oil Industry. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Thesis, Purdue University. Accessed May 24, 2019. https://docs.lib.purdue.edu/open_access_theses/1035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Web. 24 May 2019.

Vancouver:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Internet] [Thesis]. Purdue University; 2015. [cited 2019 May 24]. Available from: https://docs.lib.purdue.edu/open_access_theses/1035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Thesis]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_theses/1035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

12. Dominic Savio, Lourdes Gino. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research… (more)

Subjects/Keywords: Information Technology; Applied sciences; Covert channels; IPv6; Network forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dominic Savio, L. G. (2016). Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dominic Savio, Lourdes Gino. “Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs.” 2016. Thesis, Purdue University. Accessed May 24, 2019. https://docs.lib.purdue.edu/open_access_theses/941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dominic Savio, Lourdes Gino. “Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs.” 2016. Web. 24 May 2019.

Vancouver:

Dominic Savio LG. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 May 24]. Available from: https://docs.lib.purdue.edu/open_access_theses/941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dominic Savio LG. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

13. Sandchez Cossio, William Fernando. Exploratory study of students' representational fluency and competence of electric circuits.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Electric circuits are extensively used in today’s devices as computers, phones, cameras and others. This makes them a crucial topic in engineering because almost… (more)

Subjects/Keywords: Applied sciences; Education; Conceptual understanding; Model-based reasoning; Model-eliciting activities; Models and modeling perspective; Representational competence; Representational fluency; Education; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sandchez Cossio, W. F. (2016). Exploratory study of students' representational fluency and competence of electric circuits. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sandchez Cossio, William Fernando. “Exploratory study of students' representational fluency and competence of electric circuits.” 2016. Thesis, Purdue University. Accessed May 24, 2019. https://docs.lib.purdue.edu/open_access_theses/996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sandchez Cossio, William Fernando. “Exploratory study of students' representational fluency and competence of electric circuits.” 2016. Web. 24 May 2019.

Vancouver:

Sandchez Cossio WF. Exploratory study of students' representational fluency and competence of electric circuits. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 May 24]. Available from: https://docs.lib.purdue.edu/open_access_theses/996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sandchez Cossio WF. Exploratory study of students' representational fluency and competence of electric circuits. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

14. Song, Yuankun. Using ubiquitous data to improve smartwatches' context awareness.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about… (more)

Subjects/Keywords: Information Technology; Applied sciences; Android; Android wear; Context awareness; Smartwatch; Ubiquitous computing; User experience; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, Y. (2016). Using ubiquitous data to improve smartwatches' context awareness. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1008

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Song, Yuankun. “Using ubiquitous data to improve smartwatches' context awareness.” 2016. Thesis, Purdue University. Accessed May 24, 2019. https://docs.lib.purdue.edu/open_access_theses/1008.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Song, Yuankun. “Using ubiquitous data to improve smartwatches' context awareness.” 2016. Web. 24 May 2019.

Vancouver:

Song Y. Using ubiquitous data to improve smartwatches' context awareness. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 May 24]. Available from: https://docs.lib.purdue.edu/open_access_theses/1008.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Song Y. Using ubiquitous data to improve smartwatches' context awareness. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/1008

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

15. Waziri, Ibrahim M. Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).

Degree: PhD, Interdisciplinary Studies, 2016, Purdue University

  DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500… (more)

Subjects/Keywords: Information Technology; Applied sciences; Denial of service attack; Firewalls; Information security; Network function virtualization; Networking; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waziri, I. M. (2016). Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies). (Doctoral Dissertation). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_dissertations/880

Chicago Manual of Style (16th Edition):

Waziri, Ibrahim M. “Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).” 2016. Doctoral Dissertation, Purdue University. Accessed May 24, 2019. http://docs.lib.purdue.edu/open_access_dissertations/880.

MLA Handbook (7th Edition):

Waziri, Ibrahim M. “Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).” 2016. Web. 24 May 2019.

Vancouver:

Waziri IM. Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies). [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2019 May 24]. Available from: http://docs.lib.purdue.edu/open_access_dissertations/880.

Council of Science Editors:

Waziri IM. Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies). [Doctoral Dissertation]. Purdue University; 2016. Available from: http://docs.lib.purdue.edu/open_access_dissertations/880

.