Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Rochester Institute of Technology" +contributor:("Shanchieh Jay Yang"). Showing records 1 – 23 of 23 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Rochester Institute of Technology

1. Jain, Saloni Mahendra. Detection of Autism using Magnetic Resonance Imaging data and Graph Convolutional Neural Networks.

Degree: MS, Computer Engineering, 2018, Rochester Institute of Technology

  Autism or Autism Spectrum Disorder (ASD) is a development disability which generally begins during childhood and may last throughout the lifetime of an individual.… (more)

Subjects/Keywords: ABIDE; Adjacency convolution; Autism; Graph convolutional neural networks; Temporal

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jain, S. M. (2018). Detection of Autism using Magnetic Resonance Imaging data and Graph Convolutional Neural Networks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9972

Chicago Manual of Style (16th Edition):

Jain, Saloni Mahendra. “Detection of Autism using Magnetic Resonance Imaging data and Graph Convolutional Neural Networks.” 2018. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9972.

MLA Handbook (7th Edition):

Jain, Saloni Mahendra. “Detection of Autism using Magnetic Resonance Imaging data and Graph Convolutional Neural Networks.” 2018. Web. 26 Mar 2019.

Vancouver:

Jain SM. Detection of Autism using Magnetic Resonance Imaging data and Graph Convolutional Neural Networks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2018. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9972.

Council of Science Editors:

Jain SM. Detection of Autism using Magnetic Resonance Imaging data and Graph Convolutional Neural Networks. [Masters Thesis]. Rochester Institute of Technology; 2018. Available from: https://scholarworks.rit.edu/theses/9972


Rochester Institute of Technology

2. Murphy, Christopher Thomas. CACTUSS: Clustering of Attack Tracks using Significant Services.

Degree: MS, Computer Engineering, 2009, Rochester Institute of Technology

  Network analysts are bombarded with large amounts of low level data, posing great challenges for them to differentiate and recognize critical multistage attacks. Multistage… (more)

Subjects/Keywords: Attack track; Clustering; Community; Multistage; Network; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Murphy, C. T. (2009). CACTUSS: Clustering of Attack Tracks using Significant Services. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9079

Chicago Manual of Style (16th Edition):

Murphy, Christopher Thomas. “CACTUSS: Clustering of Attack Tracks using Significant Services.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9079.

MLA Handbook (7th Edition):

Murphy, Christopher Thomas. “CACTUSS: Clustering of Attack Tracks using Significant Services.” 2009. Web. 26 Mar 2019.

Vancouver:

Murphy CT. CACTUSS: Clustering of Attack Tracks using Significant Services. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9079.

Council of Science Editors:

Murphy CT. CACTUSS: Clustering of Attack Tracks using Significant Services. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9079


Rochester Institute of Technology

3. Bean, Jordan. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.

Degree: MS, Computer Engineering, 2009, Rochester Institute of Technology

  On secure networks, even sophisticated cyber hackers must perform multiple steps to implement attacks on sensitive data and critical servers hidden behind layers of… (more)

Subjects/Keywords: Attack track; Cyber alert attribute analysis; Cyber security; Longest common subsequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bean, J. (2009). CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9095

Chicago Manual of Style (16th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9095.

MLA Handbook (7th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Web. 26 Mar 2019.

Vancouver:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9095.

Council of Science Editors:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9095


Rochester Institute of Technology

4. Cui, Biru. From Information Cascade to Knowledge Transfer:Predictive Analyses on Social Networks.

Degree: PhD, 2016, Rochester Institute of Technology

  As social media continues to influence our daily life, much research has focused on analyzing characteristics of social networks and tracking how information flows… (more)

Subjects/Keywords: Cascade size; Information cascade; Information propagation; Knowledge transfer; Social network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, B. (2016). From Information Cascade to Knowledge Transfer:Predictive Analyses on Social Networks. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9172

Chicago Manual of Style (16th Edition):

Cui, Biru. “From Information Cascade to Knowledge Transfer:Predictive Analyses on Social Networks.” 2016. Doctoral Dissertation, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9172.

MLA Handbook (7th Edition):

Cui, Biru. “From Information Cascade to Knowledge Transfer:Predictive Analyses on Social Networks.” 2016. Web. 26 Mar 2019.

Vancouver:

Cui B. From Information Cascade to Knowledge Transfer:Predictive Analyses on Social Networks. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2016. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9172.

Council of Science Editors:

Cui B. From Information Cascade to Knowledge Transfer:Predictive Analyses on Social Networks. [Doctoral Dissertation]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9172


Rochester Institute of Technology

5. Uzkent, Burak. Real-time Aerial Vehicle Detection and Tracking using a Multi-modal Optical Sensor.

Degree: PhD, Chester F. Carlson Center for Imaging Science (COS), 2016, Rochester Institute of Technology

  Vehicle tracking from an aerial platform poses a number of unique challenges including the small number of pixels representing a vehicle, large camera motion,… (more)

Subjects/Keywords: Aerial; Hyperspectral; Optical; Sensor; Tracking; Vehicle

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Uzkent, B. (2016). Real-time Aerial Vehicle Detection and Tracking using a Multi-modal Optical Sensor. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9242

Chicago Manual of Style (16th Edition):

Uzkent, Burak. “Real-time Aerial Vehicle Detection and Tracking using a Multi-modal Optical Sensor.” 2016. Doctoral Dissertation, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9242.

MLA Handbook (7th Edition):

Uzkent, Burak. “Real-time Aerial Vehicle Detection and Tracking using a Multi-modal Optical Sensor.” 2016. Web. 26 Mar 2019.

Vancouver:

Uzkent B. Real-time Aerial Vehicle Detection and Tracking using a Multi-modal Optical Sensor. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2016. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9242.

Council of Science Editors:

Uzkent B. Real-time Aerial Vehicle Detection and Tracking using a Multi-modal Optical Sensor. [Doctoral Dissertation]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9242


Rochester Institute of Technology

6. Moskal, Stephen Frank. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.

Degree: MS, Computer Engineering, 2016, Rochester Institute of Technology

  Computer networks are becoming more complex as the reliance on these network increases in this era of exponential technological growth. This makes the potential… (more)

Subjects/Keywords: Cyber attack behavior; Cyber attack modeling; Cyber threat analytics; Simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moskal, S. F. (2016). Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9216

Chicago Manual of Style (16th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9216.

MLA Handbook (7th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Web. 26 Mar 2019.

Vancouver:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9216.

Council of Science Editors:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9216


Rochester Institute of Technology

7. Jarvis, Ebrahim. Joint Source-Channel Coding Optimized On End-to-End Distortion for Multimedia Source.

Degree: MS, Computer Engineering, 2016, Rochester Institute of Technology

  In order to achieve high efficiency, multimedia source coding usually relies on the use of predictive coding. While more efficient, source coding based on… (more)

Subjects/Keywords: Incremental redundancy; Information theory; Joint source-channel coding; Lagrangian optimization; Predictive coding; Wireless communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jarvis, E. (2016). Joint Source-Channel Coding Optimized On End-to-End Distortion for Multimedia Source. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9219

Chicago Manual of Style (16th Edition):

Jarvis, Ebrahim. “Joint Source-Channel Coding Optimized On End-to-End Distortion for Multimedia Source.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9219.

MLA Handbook (7th Edition):

Jarvis, Ebrahim. “Joint Source-Channel Coding Optimized On End-to-End Distortion for Multimedia Source.” 2016. Web. 26 Mar 2019.

Vancouver:

Jarvis E. Joint Source-Channel Coding Optimized On End-to-End Distortion for Multimedia Source. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9219.

Council of Science Editors:

Jarvis E. Joint Source-Channel Coding Optimized On End-to-End Distortion for Multimedia Source. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9219

8. Aghaie, Anita. Efficient Error detection Architectures for for Low-Energy Block Ciphers with the Case Study of Midori Benchmarked on FPGA.

Degree: MS, Computer Engineering, 2017, Rochester Institute of Technology

  Achieving secure, high performance implementations for constrained applications such as implantable and wearable medical devices is a priority in efficient block ciphers. However, security… (more)

Subjects/Keywords: None provided

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aghaie, A. (2017). Efficient Error detection Architectures for for Low-Energy Block Ciphers with the Case Study of Midori Benchmarked on FPGA. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9504

Chicago Manual of Style (16th Edition):

Aghaie, Anita. “Efficient Error detection Architectures for for Low-Energy Block Ciphers with the Case Study of Midori Benchmarked on FPGA.” 2017. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9504.

MLA Handbook (7th Edition):

Aghaie, Anita. “Efficient Error detection Architectures for for Low-Energy Block Ciphers with the Case Study of Midori Benchmarked on FPGA.” 2017. Web. 26 Mar 2019.

Vancouver:

Aghaie A. Efficient Error detection Architectures for for Low-Energy Block Ciphers with the Case Study of Midori Benchmarked on FPGA. [Internet] [Masters thesis]. Rochester Institute of Technology; 2017. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9504.

Council of Science Editors:

Aghaie A. Efficient Error detection Architectures for for Low-Energy Block Ciphers with the Case Study of Midori Benchmarked on FPGA. [Masters Thesis]. Rochester Institute of Technology; 2017. Available from: https://scholarworks.rit.edu/theses/9504


Rochester Institute of Technology

9. Liu, Ziyang. Renewable Energy-Aware Routing in the Internet.

Degree: MS, Computer Engineering, 2017, Rochester Institute of Technology

  The increasing power consumption of the Internet infrastructure has attracted a lot of world-wide attention because of the severe impact on the environment. Many… (more)

Subjects/Keywords: BGP; Renewable energy; Routing algorithm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Z. (2017). Renewable Energy-Aware Routing in the Internet. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9661

Chicago Manual of Style (16th Edition):

Liu, Ziyang. “Renewable Energy-Aware Routing in the Internet.” 2017. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9661.

MLA Handbook (7th Edition):

Liu, Ziyang. “Renewable Energy-Aware Routing in the Internet.” 2017. Web. 26 Mar 2019.

Vancouver:

Liu Z. Renewable Energy-Aware Routing in the Internet. [Internet] [Masters thesis]. Rochester Institute of Technology; 2017. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9661.

Council of Science Editors:

Liu Z. Renewable Energy-Aware Routing in the Internet. [Masters Thesis]. Rochester Institute of Technology; 2017. Available from: https://scholarworks.rit.edu/theses/9661


Rochester Institute of Technology

10. Rawlins, Ryan T. Scalable Automation of Online Network Attack Characterization.

Degree: MS, Computer Engineering, 2014, Rochester Institute of Technology

  Cyber attacks to enterprise networks and critical infrastructures are becoming more prevalent and diverse. Timely recognition of attack strategies and behaviors will assist analysts… (more)

Subjects/Keywords: Attack social graph; Cyber security; Feature selection; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawlins, R. T. (2014). Scalable Automation of Online Network Attack Characterization. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8369

Chicago Manual of Style (16th Edition):

Rawlins, Ryan T. “Scalable Automation of Online Network Attack Characterization.” 2014. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8369.

MLA Handbook (7th Edition):

Rawlins, Ryan T. “Scalable Automation of Online Network Attack Characterization.” 2014. Web. 26 Mar 2019.

Vancouver:

Rawlins RT. Scalable Automation of Online Network Attack Characterization. [Internet] [Masters thesis]. Rochester Institute of Technology; 2014. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8369.

Council of Science Editors:

Rawlins RT. Scalable Automation of Online Network Attack Characterization. [Masters Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8369

11. Saxton, Jacob D. Dynamic Model Generation and Classification of Network Attacks.

Degree: MS, Computer Engineering, 2017, Rochester Institute of Technology

  When attempting to read malicious network traffic, security analysts are challenged to determine what attacks are happening in the network at any given time.… (more)

Subjects/Keywords: None provided

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saxton, J. D. (2017). Dynamic Model Generation and Classification of Network Attacks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9450

Chicago Manual of Style (16th Edition):

Saxton, Jacob D. “Dynamic Model Generation and Classification of Network Attacks.” 2017. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/9450.

MLA Handbook (7th Edition):

Saxton, Jacob D. “Dynamic Model Generation and Classification of Network Attacks.” 2017. Web. 26 Mar 2019.

Vancouver:

Saxton JD. Dynamic Model Generation and Classification of Network Attacks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2017. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/9450.

Council of Science Editors:

Saxton JD. Dynamic Model Generation and Classification of Network Attacks. [Masters Thesis]. Rochester Institute of Technology; 2017. Available from: https://scholarworks.rit.edu/theses/9450

12. Strapp, Steven E. Segmentation and Model Generation for Large-Scale Cyber Attacks.

Degree: MS, Computer Engineering, 2013, Rochester Institute of Technology

  Raw Cyber attack traffic can present more questions than answers to security analysts. Especially with large-scale observables it is difficult to identify which packets… (more)

Subjects/Keywords: Cyber security; Host clustering; Machine learning; Cyberterrorism – Research; Supervised learning (Machine learning); Information Security; Other Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Strapp, S. E. (2013). Segmentation and Model Generation for Large-Scale Cyber Attacks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/23

Chicago Manual of Style (16th Edition):

Strapp, Steven E. “Segmentation and Model Generation for Large-Scale Cyber Attacks.” 2013. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/23.

MLA Handbook (7th Edition):

Strapp, Steven E. “Segmentation and Model Generation for Large-Scale Cyber Attacks.” 2013. Web. 26 Mar 2019.

Vancouver:

Strapp SE. Segmentation and Model Generation for Large-Scale Cyber Attacks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2013. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/23.

Council of Science Editors:

Strapp SE. Segmentation and Model Generation for Large-Scale Cyber Attacks. [Masters Thesis]. Rochester Institute of Technology; 2013. Available from: https://scholarworks.rit.edu/theses/23

13. Du, Haitao. Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences.

Degree: PhD, PhD Program in Computing and Information Sciences, 2014, Rochester Institute of Technology

  Prevalent computing devices with networking capabilities have become critical network infrastructure for government, industry, academia and every-day life. As their value rises, the motivation… (more)

Subjects/Keywords: None provided

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Du, H. (2014). Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8331

Chicago Manual of Style (16th Edition):

Du, Haitao. “Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences.” 2014. Doctoral Dissertation, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8331.

MLA Handbook (7th Edition):

Du, Haitao. “Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences.” 2014. Web. 26 Mar 2019.

Vancouver:

Du H. Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2014. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8331.

Council of Science Editors:

Du H. Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences. [Doctoral Dissertation]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8331

14. Zhao, Leah Xinya. Privacy Sensitive Resource Access Monitoring For Android Systems.

Degree: MS, Computer Engineering, 2014, Rochester Institute of Technology

  Mobile devices, with an extensive array of capabilities and flexibility, are sometimes said to be an extension of the human body. Enhancing device capabilities… (more)

Subjects/Keywords: Access; Android; Mobile; Monitoring; Privacy; Resource

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhao, L. X. (2014). Privacy Sensitive Resource Access Monitoring For Android Systems. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8337

Chicago Manual of Style (16th Edition):

Zhao, Leah Xinya. “Privacy Sensitive Resource Access Monitoring For Android Systems.” 2014. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8337.

MLA Handbook (7th Edition):

Zhao, Leah Xinya. “Privacy Sensitive Resource Access Monitoring For Android Systems.” 2014. Web. 26 Mar 2019.

Vancouver:

Zhao LX. Privacy Sensitive Resource Access Monitoring For Android Systems. [Internet] [Masters thesis]. Rochester Institute of Technology; 2014. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8337.

Council of Science Editors:

Zhao LX. Privacy Sensitive Resource Access Monitoring For Android Systems. [Masters Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8337

15. Wheeler, Benjamin Fredrick. A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms.

Degree: MS, Computer Engineering, 2014, Rochester Institute of Technology

  In order to combat the increasing complexity of cyber attacks, a new category of cyber defense called dynamic cyber defense has been the focus… (more)

Subjects/Keywords: Cyber attack; Cyber attack simulation; Cyber defense; Cyber defense simulation; Dynamic cyber defense; Moving target network defense

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wheeler, B. F. (2014). A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8536

Chicago Manual of Style (16th Edition):

Wheeler, Benjamin Fredrick. “A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms.” 2014. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8536.

MLA Handbook (7th Edition):

Wheeler, Benjamin Fredrick. “A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms.” 2014. Web. 26 Mar 2019.

Vancouver:

Wheeler BF. A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms. [Internet] [Masters thesis]. Rochester Institute of Technology; 2014. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8536.

Council of Science Editors:

Wheeler BF. A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms. [Masters Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8536

16. Wong Hon Chan, Neil. SCANNER: Sequence Clustering of resource Access to find Nearest Neighbors.

Degree: MS, Computer Engineering, 2015, Rochester Institute of Technology

  The Android operating system currently holds 83% of the smartphone market with more than three million applications available on the leading applications (apps) stores.… (more)

Subjects/Keywords: Android; Mobile security; Sequential data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong Hon Chan, N. (2015). SCANNER: Sequence Clustering of resource Access to find Nearest Neighbors. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8866

Chicago Manual of Style (16th Edition):

Wong Hon Chan, Neil. “SCANNER: Sequence Clustering of resource Access to find Nearest Neighbors.” 2015. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8866.

MLA Handbook (7th Edition):

Wong Hon Chan, Neil. “SCANNER: Sequence Clustering of resource Access to find Nearest Neighbors.” 2015. Web. 26 Mar 2019.

Vancouver:

Wong Hon Chan N. SCANNER: Sequence Clustering of resource Access to find Nearest Neighbors. [Internet] [Masters thesis]. Rochester Institute of Technology; 2015. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8866.

Council of Science Editors:

Wong Hon Chan N. SCANNER: Sequence Clustering of resource Access to find Nearest Neighbors. [Masters Thesis]. Rochester Institute of Technology; 2015. Available from: https://scholarworks.rit.edu/theses/8866

17. Sharma, Riti. Object Detection using Dimensionality Reduction on Image Descriptors.

Degree: MS, Computer Engineering, 2014, Rochester Institute of Technology

  The aim of object detection is to recognize objects in a visual scene. Performing reliable object detection is becoming increasingly important in the fields… (more)

Subjects/Keywords: None provided

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharma, R. (2014). Object Detection using Dimensionality Reduction on Image Descriptors. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8211

Chicago Manual of Style (16th Edition):

Sharma, Riti. “Object Detection using Dimensionality Reduction on Image Descriptors.” 2014. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8211.

MLA Handbook (7th Edition):

Sharma, Riti. “Object Detection using Dimensionality Reduction on Image Descriptors.” 2014. Web. 26 Mar 2019.

Vancouver:

Sharma R. Object Detection using Dimensionality Reduction on Image Descriptors. [Internet] [Masters thesis]. Rochester Institute of Technology; 2014. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8211.

Council of Science Editors:

Sharma R. Object Detection using Dimensionality Reduction on Image Descriptors. [Masters Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8211

18. Kreider, Derek Miles. A Guidance Template for Attack Sequence Specification in Cyber Attack Simulation.

Degree: MS, Industrial and Systems Engineering, 2015, Rochester Institute of Technology

  Over the past decade the cost and frequency of cybercrime has skyrocketed and is still increasing year over year. Major targets of cyber attacks… (more)

Subjects/Keywords: Computer network; Cyber attack; Guidance template; Simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kreider, D. M. (2015). A Guidance Template for Attack Sequence Specification in Cyber Attack Simulation. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8786

Chicago Manual of Style (16th Edition):

Kreider, Derek Miles. “A Guidance Template for Attack Sequence Specification in Cyber Attack Simulation.” 2015. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8786.

MLA Handbook (7th Edition):

Kreider, Derek Miles. “A Guidance Template for Attack Sequence Specification in Cyber Attack Simulation.” 2015. Web. 26 Mar 2019.

Vancouver:

Kreider DM. A Guidance Template for Attack Sequence Specification in Cyber Attack Simulation. [Internet] [Masters thesis]. Rochester Institute of Technology; 2015. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8786.

Council of Science Editors:

Kreider DM. A Guidance Template for Attack Sequence Specification in Cyber Attack Simulation. [Masters Thesis]. Rochester Institute of Technology; 2015. Available from: https://scholarworks.rit.edu/theses/8786


Rochester Institute of Technology

19. May, Carter. Data Aggregation and Cross-layer Design in WSNs.

Degree: MS, Computer Engineering, 2005, Rochester Institute of Technology

  Over the past few years, advances in electrical engineering have allowed electronic devices to shrink in both size and cost. It has become possible… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

May, C. (2005). Data Aggregation and Cross-layer Design in WSNs. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8201

Chicago Manual of Style (16th Edition):

May, Carter. “Data Aggregation and Cross-layer Design in WSNs.” 2005. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8201.

MLA Handbook (7th Edition):

May, Carter. “Data Aggregation and Cross-layer Design in WSNs.” 2005. Web. 26 Mar 2019.

Vancouver:

May C. Data Aggregation and Cross-layer Design in WSNs. [Internet] [Masters thesis]. Rochester Institute of Technology; 2005. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8201.

Council of Science Editors:

May C. Data Aggregation and Cross-layer Design in WSNs. [Masters Thesis]. Rochester Institute of Technology; 2005. Available from: https://scholarworks.rit.edu/theses/8201


Rochester Institute of Technology

20. Wai, Kenny Chung Chung. FPGA implementation of Reed Solomon codec for 40Gbps Forward Error Correction in optical networks.

Degree: MS, Computer Engineering, 2006, Rochester Institute of Technology

  Reed-Solomon error correcting codes (RS codes) are widely used in communication and data storage systems to recover data from possible errors that occur during… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wai, K. C. C. (2006). FPGA implementation of Reed Solomon codec for 40Gbps Forward Error Correction in optical networks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8048

Chicago Manual of Style (16th Edition):

Wai, Kenny Chung Chung. “FPGA implementation of Reed Solomon codec for 40Gbps Forward Error Correction in optical networks.” 2006. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8048.

MLA Handbook (7th Edition):

Wai, Kenny Chung Chung. “FPGA implementation of Reed Solomon codec for 40Gbps Forward Error Correction in optical networks.” 2006. Web. 26 Mar 2019.

Vancouver:

Wai KCC. FPGA implementation of Reed Solomon codec for 40Gbps Forward Error Correction in optical networks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2006. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8048.

Council of Science Editors:

Wai KCC. FPGA implementation of Reed Solomon codec for 40Gbps Forward Error Correction in optical networks. [Masters Thesis]. Rochester Institute of Technology; 2006. Available from: https://scholarworks.rit.edu/theses/8048


Rochester Institute of Technology

21. Hannak, Victor. Concurrent evolution of feature extractors and modular artificial neural networks.

Degree: MS, Computer Engineering, 2004, Rochester Institute of Technology

  Artificial Neural Networks (ANNs) are commonly used in both academia and industry as a solution to challenges in the pattern recognition domain. However, there… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hannak, V. (2004). Concurrent evolution of feature extractors and modular artificial neural networks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/7048

Chicago Manual of Style (16th Edition):

Hannak, Victor. “Concurrent evolution of feature extractors and modular artificial neural networks.” 2004. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/7048.

MLA Handbook (7th Edition):

Hannak, Victor. “Concurrent evolution of feature extractors and modular artificial neural networks.” 2004. Web. 26 Mar 2019.

Vancouver:

Hannak V. Concurrent evolution of feature extractors and modular artificial neural networks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2004. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/7048.

Council of Science Editors:

Hannak V. Concurrent evolution of feature extractors and modular artificial neural networks. [Masters Thesis]. Rochester Institute of Technology; 2004. Available from: https://scholarworks.rit.edu/theses/7048


Rochester Institute of Technology

22. Ruppert, John A. Placement, visibility and coverage analysis of dynamic pan/tilt/zoom camera sensor networks.

Degree: MS, Computer Engineering, 2006, Rochester Institute of Technology

  Multi-camera vision systems have important application in a number of fields, including robotics and security. One interesting problem related to multi-camera vision systems is… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ruppert, J. A. (2006). Placement, visibility and coverage analysis of dynamic pan/tilt/zoom camera sensor networks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8022

Chicago Manual of Style (16th Edition):

Ruppert, John A. “Placement, visibility and coverage analysis of dynamic pan/tilt/zoom camera sensor networks.” 2006. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8022.

MLA Handbook (7th Edition):

Ruppert, John A. “Placement, visibility and coverage analysis of dynamic pan/tilt/zoom camera sensor networks.” 2006. Web. 26 Mar 2019.

Vancouver:

Ruppert JA. Placement, visibility and coverage analysis of dynamic pan/tilt/zoom camera sensor networks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2006. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8022.

Council of Science Editors:

Ruppert JA. Placement, visibility and coverage analysis of dynamic pan/tilt/zoom camera sensor networks. [Masters Thesis]. Rochester Institute of Technology; 2006. Available from: https://scholarworks.rit.edu/theses/8022


Rochester Institute of Technology

23. Mullen, Andrew. Real time face matching with multiple cameras using principal component analysis.

Degree: MS, Computer Engineering, 2006, Rochester Institute of Technology

  Face recognition is a rapidly advancing research topic due to the large number of applications that can benefit from it. Face recognition consists of… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mullen, A. (2006). Real time face matching with multiple cameras using principal component analysis. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8021

Chicago Manual of Style (16th Edition):

Mullen, Andrew. “Real time face matching with multiple cameras using principal component analysis.” 2006. Masters Thesis, Rochester Institute of Technology. Accessed March 26, 2019. https://scholarworks.rit.edu/theses/8021.

MLA Handbook (7th Edition):

Mullen, Andrew. “Real time face matching with multiple cameras using principal component analysis.” 2006. Web. 26 Mar 2019.

Vancouver:

Mullen A. Real time face matching with multiple cameras using principal component analysis. [Internet] [Masters thesis]. Rochester Institute of Technology; 2006. [cited 2019 Mar 26]. Available from: https://scholarworks.rit.edu/theses/8021.

Council of Science Editors:

Mullen A. Real time face matching with multiple cameras using principal component analysis. [Masters Thesis]. Rochester Institute of Technology; 2006. Available from: https://scholarworks.rit.edu/theses/8021

.