Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Purdue University" +contributor:("Baijian Yang"). Showing records 1 – 16 of 16 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Purdue University

1. Wang, Weijie. A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records.

Degree: MS, Computer and Information Technology, 2015, Purdue University

  Security is essentially important for any enterprise networks. Denial of service, port scanning, and data exfiltration are among of the most common network intrusions.… (more)

Subjects/Keywords: Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, W. (2015). A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Weijie. “A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records.” 2015. Thesis, Purdue University. Accessed January 22, 2020. http://docs.lib.purdue.edu/open_access_theses/626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Weijie. “A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records.” 2015. Web. 22 Jan 2020.

Vancouver:

Wang W. A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records. [Internet] [Thesis]. Purdue University; 2015. [cited 2020 Jan 22]. Available from: http://docs.lib.purdue.edu/open_access_theses/626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang W. A characteristic-based visual analytics approach to detect subtle attacks from NetFlow records. [Thesis]. Purdue University; 2015. Available from: http://docs.lib.purdue.edu/open_access_theses/626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

2. Faheem, Faheem. Ibeacon based proximity and indoor localization system.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  User location can be leveraged to provide a wide range of services in a variety of indoor locations including retails stores, hospitals, airports, museums… (more)

Subjects/Keywords: Applied sciences; Bayesian filtering; Ibeacon; Indoor localization; Internet of things; Location based services; Proximity based services; Electrical and Computer Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Faheem, F. (2016). Ibeacon based proximity and indoor localization system. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/767

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Faheem, Faheem. “Ibeacon based proximity and indoor localization system.” 2016. Thesis, Purdue University. Accessed January 22, 2020. http://docs.lib.purdue.edu/open_access_theses/767.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Faheem, Faheem. “Ibeacon based proximity and indoor localization system.” 2016. Web. 22 Jan 2020.

Vancouver:

Faheem F. Ibeacon based proximity and indoor localization system. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: http://docs.lib.purdue.edu/open_access_theses/767.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Faheem F. Ibeacon based proximity and indoor localization system. [Thesis]. Purdue University; 2016. Available from: http://docs.lib.purdue.edu/open_access_theses/767

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

3. Xie, Di. User-differentiated hierarchical key management for the bring-your-own-device environments.

Degree: MS, Technology, 2014, Purdue University

  To ensure confidentiality, the sensitive electronic data held within a corporation is always carefully encrypted and stored in a manner so that it is… (more)

Subjects/Keywords: Information Technology; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, D. (2014). User-differentiated hierarchical key management for the bring-your-own-device environments. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/462

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xie, Di. “User-differentiated hierarchical key management for the bring-your-own-device environments.” 2014. Thesis, Purdue University. Accessed January 22, 2020. http://docs.lib.purdue.edu/open_access_theses/462.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xie, Di. “User-differentiated hierarchical key management for the bring-your-own-device environments.” 2014. Web. 22 Jan 2020.

Vancouver:

Xie D. User-differentiated hierarchical key management for the bring-your-own-device environments. [Internet] [Thesis]. Purdue University; 2014. [cited 2020 Jan 22]. Available from: http://docs.lib.purdue.edu/open_access_theses/462.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xie D. User-differentiated hierarchical key management for the bring-your-own-device environments. [Thesis]. Purdue University; 2014. Available from: http://docs.lib.purdue.edu/open_access_theses/462

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

4. Silla, Chandrika. WeChat forensic artifacts: Android phone extraction and analysis.

Degree: MS, Computer and Information Technology, 2015, Purdue University

  Instant messaging (IM) applications on smart phones are being used across the globe for various modes of communication. They gained popularity mainly due to… (more)

Subjects/Keywords: Information Technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Silla, C. (2015). WeChat forensic artifacts: Android phone extraction and analysis. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Silla, Chandrika. “WeChat forensic artifacts: Android phone extraction and analysis.” 2015. Thesis, Purdue University. Accessed January 22, 2020. http://docs.lib.purdue.edu/open_access_theses/615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Silla, Chandrika. “WeChat forensic artifacts: Android phone extraction and analysis.” 2015. Web. 22 Jan 2020.

Vancouver:

Silla C. WeChat forensic artifacts: Android phone extraction and analysis. [Internet] [Thesis]. Purdue University; 2015. [cited 2020 Jan 22]. Available from: http://docs.lib.purdue.edu/open_access_theses/615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Silla C. WeChat forensic artifacts: Android phone extraction and analysis. [Thesis]. Purdue University; 2015. Available from: http://docs.lib.purdue.edu/open_access_theses/615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

5. Flory, Christopher Michael. Digital forensics and community supervision: Making a case for field based digital forensics training.

Degree: MA, Computer Science, 2015, Purdue University

  In this paper I will review the literature concerning investigator digital forensics models and how they apply to field investigators. A brief history of… (more)

Subjects/Keywords: Information Technology; Computer Sciences; Criminology and Criminal Justice; Vocational Education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flory, C. M. (2015). Digital forensics and community supervision: Making a case for field based digital forensics training. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Flory, Christopher Michael. “Digital forensics and community supervision: Making a case for field based digital forensics training.” 2015. Thesis, Purdue University. Accessed January 22, 2020. http://docs.lib.purdue.edu/open_access_theses/567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Flory, Christopher Michael. “Digital forensics and community supervision: Making a case for field based digital forensics training.” 2015. Web. 22 Jan 2020.

Vancouver:

Flory CM. Digital forensics and community supervision: Making a case for field based digital forensics training. [Internet] [Thesis]. Purdue University; 2015. [cited 2020 Jan 22]. Available from: http://docs.lib.purdue.edu/open_access_theses/567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Flory CM. Digital forensics and community supervision: Making a case for field based digital forensics training. [Thesis]. Purdue University; 2015. Available from: http://docs.lib.purdue.edu/open_access_theses/567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

6. Hegde, Prajwal B. Monitoring DBMS activity to detect insider threat using query selectivity.

Degree: MS, Interdisciplinary Studies, 2016, Purdue University

  The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider… (more)

Subjects/Keywords: Information Technology; Applied sciences; Anomaly detection mechanism; Information security; Insider threat; Query optimizer; Query selectivity; Relational database management systems; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hegde, P. B. (2016). Monitoring DBMS activity to detect insider threat using query selectivity. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hegde, Prajwal B. “Monitoring DBMS activity to detect insider threat using query selectivity.” 2016. Thesis, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_theses/952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hegde, Prajwal B. “Monitoring DBMS activity to detect insider threat using query selectivity.” 2016. Web. 22 Jan 2020.

Vancouver:

Hegde PB. Monitoring DBMS activity to detect insider threat using query selectivity. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hegde PB. Monitoring DBMS activity to detect insider threat using query selectivity. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

7. Alaskandrani, Faisal Talal. A Threat Intelligence Framework for Access Control Security In The Oil Industry.

Degree: MS, Computer and Information Technology, 2015, Purdue University

 The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing… (more)

Subjects/Keywords: Framework; ICS; NIST Cybersecurity framework; Oil Industry; SCADA; Threat Intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alaskandrani, F. T. (2015). A Threat Intelligence Framework for Access Control Security In The Oil Industry. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Thesis, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_theses/1044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Web. 22 Jan 2020.

Vancouver:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Internet] [Thesis]. Purdue University; 2015. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/1044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Thesis]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_theses/1044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

8. Lerums, James Edward. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.

Degree: MS, Computer and Information Technology, 2016, Purdue University

 This thesis study introduces operational concepts for accelerating necessary cyber security improvements for critical infrastructure industrial control systems. National critical infrastructures’ industrial control systems experienced… (more)

Subjects/Keywords: Critical Infrastructure; Cybersecurity; Industrial Control Systems; Operationalization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lerums, J. E. (2016). Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Thesis, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Web. 22 Jan 2020.

Vancouver:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

9. Alaskandrani, Faisal Talal. A Threat Intelligence Framework for Access Control Security In The Oil Industry.

Degree: MS, Computer and Information Technology, 2015, Purdue University

  The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry… (more)

Subjects/Keywords: Framework; ICS; NIST Cybersecurity framework; Oil Industry; SCADA; Threat Intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alaskandrani, F. T. (2015). A Threat Intelligence Framework for Access Control Security In The Oil Industry. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Thesis, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_theses/1035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alaskandrani, Faisal Talal. “A Threat Intelligence Framework for Access Control Security In The Oil Industry.” 2015. Web. 22 Jan 2020.

Vancouver:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Internet] [Thesis]. Purdue University; 2015. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/1035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alaskandrani FT. A Threat Intelligence Framework for Access Control Security In The Oil Industry. [Thesis]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_theses/1035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

10. Zhang, Yue. A cross-site study of user behavior and privacy perception in social networks.

Degree: MS, Technology, 2014, Purdue University

  While online social networking sites have brought convenience and diversity in people's social lives, they have also been the source for information leakage. Researchers… (more)

Subjects/Keywords: Library and Information Science; Social Work

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2014). A cross-site study of user behavior and privacy perception in social networks. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Yue. “A cross-site study of user behavior and privacy perception in social networks.” 2014. Thesis, Purdue University. Accessed January 22, 2020. http://docs.lib.purdue.edu/open_access_theses/716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Yue. “A cross-site study of user behavior and privacy perception in social networks.” 2014. Web. 22 Jan 2020.

Vancouver:

Zhang Y. A cross-site study of user behavior and privacy perception in social networks. [Internet] [Thesis]. Purdue University; 2014. [cited 2020 Jan 22]. Available from: http://docs.lib.purdue.edu/open_access_theses/716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang Y. A cross-site study of user behavior and privacy perception in social networks. [Thesis]. Purdue University; 2014. Available from: http://docs.lib.purdue.edu/open_access_theses/716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

11. Diao, Kelu. Hardware accelerated redundancy elimination in network system.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  With the tremendous growth in the amount of information stored on remote locations and cloud systems, many service providers are seeking ways to reduce… (more)

Subjects/Keywords: Applied sciences; Accleration; CUDA; GPU; Network; Ns-3; Redundancy elimination; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diao, K. (2016). Hardware accelerated redundancy elimination in network system. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diao, Kelu. “Hardware accelerated redundancy elimination in network system.” 2016. Thesis, Purdue University. Accessed January 22, 2020. http://docs.lib.purdue.edu/open_access_theses/765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diao, Kelu. “Hardware accelerated redundancy elimination in network system.” 2016. Web. 22 Jan 2020.

Vancouver:

Diao K. Hardware accelerated redundancy elimination in network system. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: http://docs.lib.purdue.edu/open_access_theses/765.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diao K. Hardware accelerated redundancy elimination in network system. [Thesis]. Purdue University; 2016. Available from: http://docs.lib.purdue.edu/open_access_theses/765

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

12. Dominic Savio, Lourdes Gino. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research… (more)

Subjects/Keywords: Information Technology; Applied sciences; Covert channels; IPv6; Network forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dominic Savio, L. G. (2016). Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dominic Savio, Lourdes Gino. “Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs.” 2016. Thesis, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_theses/941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dominic Savio, Lourdes Gino. “Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs.” 2016. Web. 22 Jan 2020.

Vancouver:

Dominic Savio LG. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dominic Savio LG. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

13. Sandchez Cossio, William Fernando. Exploratory study of students' representational fluency and competence of electric circuits.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Electric circuits are extensively used in today’s devices as computers, phones, cameras and others. This makes them a crucial topic in engineering because almost… (more)

Subjects/Keywords: Applied sciences; Education; Conceptual understanding; Model-based reasoning; Model-eliciting activities; Models and modeling perspective; Representational competence; Representational fluency; Education; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sandchez Cossio, W. F. (2016). Exploratory study of students' representational fluency and competence of electric circuits. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sandchez Cossio, William Fernando. “Exploratory study of students' representational fluency and competence of electric circuits.” 2016. Thesis, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_theses/996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sandchez Cossio, William Fernando. “Exploratory study of students' representational fluency and competence of electric circuits.” 2016. Web. 22 Jan 2020.

Vancouver:

Sandchez Cossio WF. Exploratory study of students' representational fluency and competence of electric circuits. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sandchez Cossio WF. Exploratory study of students' representational fluency and competence of electric circuits. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

14. Song, Yuankun. Using ubiquitous data to improve smartwatches' context awareness.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about… (more)

Subjects/Keywords: Information Technology; Applied sciences; Android; Android wear; Context awareness; Smartwatch; Ubiquitous computing; User experience; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, Y. (2016). Using ubiquitous data to improve smartwatches' context awareness. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1008

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Song, Yuankun. “Using ubiquitous data to improve smartwatches' context awareness.” 2016. Thesis, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_theses/1008.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Song, Yuankun. “Using ubiquitous data to improve smartwatches' context awareness.” 2016. Web. 22 Jan 2020.

Vancouver:

Song Y. Using ubiquitous data to improve smartwatches' context awareness. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/1008.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Song Y. Using ubiquitous data to improve smartwatches' context awareness. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/1008

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

15. Sharevski, Filipo. The Impact of Mobile Network Forensics Evidence on the Criminal Case Processing Performance in Macedonia: An Institutional Analysis Study.

Degree: PhD, Technology, 2015, Purdue University

 The purpose of this study was to explore the contribution of the localization data, network-management data, and content-of-communication data in the case processing performance in… (more)

Subjects/Keywords: criminal case processing; digital forensics; institutional analysis; mobile network foreniscs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharevski, F. (2015). The Impact of Mobile Network Forensics Evidence on the Criminal Case Processing Performance in Macedonia: An Institutional Analysis Study. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1146

Chicago Manual of Style (16th Edition):

Sharevski, Filipo. “The Impact of Mobile Network Forensics Evidence on the Criminal Case Processing Performance in Macedonia: An Institutional Analysis Study.” 2015. Doctoral Dissertation, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1146.

MLA Handbook (7th Edition):

Sharevski, Filipo. “The Impact of Mobile Network Forensics Evidence on the Criminal Case Processing Performance in Macedonia: An Institutional Analysis Study.” 2015. Web. 22 Jan 2020.

Vancouver:

Sharevski F. The Impact of Mobile Network Forensics Evidence on the Criminal Case Processing Performance in Macedonia: An Institutional Analysis Study. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1146.

Council of Science Editors:

Sharevski F. The Impact of Mobile Network Forensics Evidence on the Criminal Case Processing Performance in Macedonia: An Institutional Analysis Study. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1146


Purdue University

16. Waziri, Ibrahim M. Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).

Degree: PhD, Interdisciplinary Studies, 2016, Purdue University

  DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500… (more)

Subjects/Keywords: Information Technology; Applied sciences; Denial of service attack; Firewalls; Information security; Network function virtualization; Networking; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waziri, I. M. (2016). Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies). (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/880

Chicago Manual of Style (16th Edition):

Waziri, Ibrahim M. “Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).” 2016. Doctoral Dissertation, Purdue University. Accessed January 22, 2020. https://docs.lib.purdue.edu/open_access_dissertations/880.

MLA Handbook (7th Edition):

Waziri, Ibrahim M. “Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies).” 2016. Web. 22 Jan 2020.

Vancouver:

Waziri IM. Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies). [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Jan 22]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/880.

Council of Science Editors:

Waziri IM. Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies). [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/880

.