Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Georgia" +contributor:("Kang Li"). Showing records 1 – 20 of 20 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Georgia

1. Zhong, Zhenyu. System oriented techniques for high-performance anti-spam solutions.

Degree: PhD, Computer Science, 2007, University of Georgia

 Email has become a crucial part of life as the Internet has developed. However, a massive influx of spam emails has threatened the usefulness of… (more)

Subjects/Keywords: SPAM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, Z. (2007). System oriented techniques for high-performance anti-spam solutions. (Doctoral Dissertation). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/zhong_zhenyu_200712_phd

Chicago Manual of Style (16th Edition):

Zhong, Zhenyu. “System oriented techniques for high-performance anti-spam solutions.” 2007. Doctoral Dissertation, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/zhong_zhenyu_200712_phd.

MLA Handbook (7th Edition):

Zhong, Zhenyu. “System oriented techniques for high-performance anti-spam solutions.” 2007. Web. 20 Jun 2019.

Vancouver:

Zhong Z. System oriented techniques for high-performance anti-spam solutions. [Internet] [Doctoral dissertation]. University of Georgia; 2007. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/zhong_zhenyu_200712_phd.

Council of Science Editors:

Zhong Z. System oriented techniques for high-performance anti-spam solutions. [Doctoral Dissertation]. University of Georgia; 2007. Available from: http://purl.galileo.usg.edu/uga_etd/zhong_zhenyu_200712_phd


University of Georgia

2. Vangapandu, Krishna Bhargava. A measurement study of Web redirections in the Internet.

Degree: MS, Computer Science, 2008, University of Georgia

 The use of URL redirections has been recently studied to filter spam as email and web spammers use redirection to camouflage their web pages. However,… (more)

Subjects/Keywords: URL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vangapandu, K. B. (2008). A measurement study of Web redirections in the Internet. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/vangapandu_krishna_b_200812_ms

Chicago Manual of Style (16th Edition):

Vangapandu, Krishna Bhargava. “A measurement study of Web redirections in the Internet.” 2008. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/vangapandu_krishna_b_200812_ms.

MLA Handbook (7th Edition):

Vangapandu, Krishna Bhargava. “A measurement study of Web redirections in the Internet.” 2008. Web. 20 Jun 2019.

Vancouver:

Vangapandu KB. A measurement study of Web redirections in the Internet. [Internet] [Masters thesis]. University of Georgia; 2008. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/vangapandu_krishna_b_200812_ms.

Council of Science Editors:

Vangapandu KB. A measurement study of Web redirections in the Internet. [Masters Thesis]. University of Georgia; 2008. Available from: http://purl.galileo.usg.edu/uga_etd/vangapandu_krishna_b_200812_ms


University of Georgia

3. Kasture, Mayuresh. Improving performance of SMTP relay servers: an in-kernel approach.

Degree: MS, Computer Science, 2010, University of Georgia

 With continuous increase in average size and number of e-mails on the Internet, load on SMTP servers is increasing. This work attempts to measure the… (more)

Subjects/Keywords: Zero copy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kasture, M. (2010). Improving performance of SMTP relay servers: an in-kernel approach. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/kasture_mayuresh_201005_ms

Chicago Manual of Style (16th Edition):

Kasture, Mayuresh. “Improving performance of SMTP relay servers: an in-kernel approach.” 2010. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/kasture_mayuresh_201005_ms.

MLA Handbook (7th Edition):

Kasture, Mayuresh. “Improving performance of SMTP relay servers: an in-kernel approach.” 2010. Web. 20 Jun 2019.

Vancouver:

Kasture M. Improving performance of SMTP relay servers: an in-kernel approach. [Internet] [Masters thesis]. University of Georgia; 2010. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/kasture_mayuresh_201005_ms.

Council of Science Editors:

Kasture M. Improving performance of SMTP relay servers: an in-kernel approach. [Masters Thesis]. University of Georgia; 2010. Available from: http://purl.galileo.usg.edu/uga_etd/kasture_mayuresh_201005_ms


University of Georgia

4. Patwardhan, Tapan. Aerial viewer: a cost effective framework for air-based video surveillance of emergency situations.

Degree: MS, Computer Science, 2010, University of Georgia

 An important application of aerial video surveillance pertains to assistance in emergency rescue operations, where regions struck by natural calamities such as earthquakes, floods, and… (more)

Subjects/Keywords: Aerial Surveillance; Motion Detection; Emergency Situations; Motion compensation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patwardhan, T. (2010). Aerial viewer: a cost effective framework for air-based video surveillance of emergency situations. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/patwardhan_tapan_201008_ms

Chicago Manual of Style (16th Edition):

Patwardhan, Tapan. “Aerial viewer: a cost effective framework for air-based video surveillance of emergency situations.” 2010. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/patwardhan_tapan_201008_ms.

MLA Handbook (7th Edition):

Patwardhan, Tapan. “Aerial viewer: a cost effective framework for air-based video surveillance of emergency situations.” 2010. Web. 20 Jun 2019.

Vancouver:

Patwardhan T. Aerial viewer: a cost effective framework for air-based video surveillance of emergency situations. [Internet] [Masters thesis]. University of Georgia; 2010. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/patwardhan_tapan_201008_ms.

Council of Science Editors:

Patwardhan T. Aerial viewer: a cost effective framework for air-based video surveillance of emergency situations. [Masters Thesis]. University of Georgia; 2010. Available from: http://purl.galileo.usg.edu/uga_etd/patwardhan_tapan_201008_ms


University of Georgia

5. Treadway, Brandon Douglas. Online gaming and spam.

Degree: MS, Computer Science, 2010, University of Georgia

 With the rise of interactions between players around the world through online gaming, there are many security issues in the games causing problems for the… (more)

Subjects/Keywords: Spam

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Treadway, B. D. (2010). Online gaming and spam. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/treadway_brandon_d_201008_ms

Chicago Manual of Style (16th Edition):

Treadway, Brandon Douglas. “Online gaming and spam.” 2010. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/treadway_brandon_d_201008_ms.

MLA Handbook (7th Edition):

Treadway, Brandon Douglas. “Online gaming and spam.” 2010. Web. 20 Jun 2019.

Vancouver:

Treadway BD. Online gaming and spam. [Internet] [Masters thesis]. University of Georgia; 2010. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/treadway_brandon_d_201008_ms.

Council of Science Editors:

Treadway BD. Online gaming and spam. [Masters Thesis]. University of Georgia; 2010. Available from: http://purl.galileo.usg.edu/uga_etd/treadway_brandon_d_201008_ms


University of Georgia

6. Brewer, Douglas. Detecting Web robots with passive behavioral analysis and forced behavior.

Degree: PhD, Computer Science, 2010, University of Georgia

 The use of web robots has exploded on today's World Wide Web (WWW). Web robots are used for various nefarious activities including click fraud, spamming,… (more)

Subjects/Keywords: Web Robots

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brewer, D. (2010). Detecting Web robots with passive behavioral analysis and forced behavior. (Doctoral Dissertation). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/brewer_douglas_201012_phd

Chicago Manual of Style (16th Edition):

Brewer, Douglas. “Detecting Web robots with passive behavioral analysis and forced behavior.” 2010. Doctoral Dissertation, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/brewer_douglas_201012_phd.

MLA Handbook (7th Edition):

Brewer, Douglas. “Detecting Web robots with passive behavioral analysis and forced behavior.” 2010. Web. 20 Jun 2019.

Vancouver:

Brewer D. Detecting Web robots with passive behavioral analysis and forced behavior. [Internet] [Doctoral dissertation]. University of Georgia; 2010. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/brewer_douglas_201012_phd.

Council of Science Editors:

Brewer D. Detecting Web robots with passive behavioral analysis and forced behavior. [Doctoral Dissertation]. University of Georgia; 2010. Available from: http://purl.galileo.usg.edu/uga_etd/brewer_douglas_201012_phd


University of Georgia

7. Howell, Matthew Raymond. Ranking documents using degrees of separation analysis from a large dataset of semantic relationships.

Degree: MS, Computer Science, 2010, University of Georgia

 In this paper, a ranking mechanism is presented that ranks documents based on their Semantic Association Similarity, which is defined as the close-ness (based on… (more)

Subjects/Keywords: Semantic Similarity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Howell, M. R. (2010). Ranking documents using degrees of separation analysis from a large dataset of semantic relationships. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/howell_matthew_r_201012_ms

Chicago Manual of Style (16th Edition):

Howell, Matthew Raymond. “Ranking documents using degrees of separation analysis from a large dataset of semantic relationships.” 2010. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/howell_matthew_r_201012_ms.

MLA Handbook (7th Edition):

Howell, Matthew Raymond. “Ranking documents using degrees of separation analysis from a large dataset of semantic relationships.” 2010. Web. 20 Jun 2019.

Vancouver:

Howell MR. Ranking documents using degrees of separation analysis from a large dataset of semantic relationships. [Internet] [Masters thesis]. University of Georgia; 2010. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/howell_matthew_r_201012_ms.

Council of Science Editors:

Howell MR. Ranking documents using degrees of separation analysis from a large dataset of semantic relationships. [Masters Thesis]. University of Georgia; 2010. Available from: http://purl.galileo.usg.edu/uga_etd/howell_matthew_r_201012_ms


University of Georgia

8. Kumar, Sriti. Detecting bots in Internet chat.

Degree: MS, Computer Science, 2010, University of Georgia

 Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse… (more)

Subjects/Keywords: Yahoo! Chat room; Chat Bots; ChatterBots; SPAM; YMSG

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, S. (2010). Detecting bots in Internet chat. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/kumar_sriti_201012_ms

Chicago Manual of Style (16th Edition):

Kumar, Sriti. “Detecting bots in Internet chat.” 2010. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/kumar_sriti_201012_ms.

MLA Handbook (7th Edition):

Kumar, Sriti. “Detecting bots in Internet chat.” 2010. Web. 20 Jun 2019.

Vancouver:

Kumar S. Detecting bots in Internet chat. [Internet] [Masters thesis]. University of Georgia; 2010. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/kumar_sriti_201012_ms.

Council of Science Editors:

Kumar S. Detecting bots in Internet chat. [Masters Thesis]. University of Georgia; 2010. Available from: http://purl.galileo.usg.edu/uga_etd/kumar_sriti_201012_ms


University of Georgia

9. Fan, Xiaohu. A study of attacks on collaborative filter.

Degree: MS, Computer Science, 2011, University of Georgia

 Collaborative filtering is a widely used technique to make classifications by using distributed feedback from all users. Recently, collaborative filtering has been proposed and used… (more)

Subjects/Keywords: Collaborative spam filtering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fan, X. (2011). A study of attacks on collaborative filter. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/fan_xiaohu_201105_ms

Chicago Manual of Style (16th Edition):

Fan, Xiaohu. “A study of attacks on collaborative filter.” 2011. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/fan_xiaohu_201105_ms.

MLA Handbook (7th Edition):

Fan, Xiaohu. “A study of attacks on collaborative filter.” 2011. Web. 20 Jun 2019.

Vancouver:

Fan X. A study of attacks on collaborative filter. [Internet] [Masters thesis]. University of Georgia; 2011. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/fan_xiaohu_201105_ms.

Council of Science Editors:

Fan X. A study of attacks on collaborative filter. [Masters Thesis]. University of Georgia; 2011. Available from: http://purl.galileo.usg.edu/uga_etd/fan_xiaohu_201105_ms


University of Georgia

10. Meyer, Carl Brett. Calling all nodes: classifying Skype overlay control flows.

Degree: MS, Computer Science, 2011, University of Georgia

 Peer-to-Peer botnets are of particular concern in the world of network security because of the difficulty involved in identifying the botmaster node in the network.… (more)

Subjects/Keywords: Skype

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meyer, C. B. (2011). Calling all nodes: classifying Skype overlay control flows. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/meyer_carl_b_201105_ms

Chicago Manual of Style (16th Edition):

Meyer, Carl Brett. “Calling all nodes: classifying Skype overlay control flows.” 2011. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/meyer_carl_b_201105_ms.

MLA Handbook (7th Edition):

Meyer, Carl Brett. “Calling all nodes: classifying Skype overlay control flows.” 2011. Web. 20 Jun 2019.

Vancouver:

Meyer CB. Calling all nodes: classifying Skype overlay control flows. [Internet] [Masters thesis]. University of Georgia; 2011. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/meyer_carl_b_201105_ms.

Council of Science Editors:

Meyer CB. Calling all nodes: classifying Skype overlay control flows. [Masters Thesis]. University of Georgia; 2011. Available from: http://purl.galileo.usg.edu/uga_etd/meyer_carl_b_201105_ms


University of Georgia

11. Ying, Yuchen. UnROP: creating correct backtrace from core dumps with stack pivoting.

Degree: MS, Computer Science, 2014, University of Georgia

 Return-oriented Programming (ROP) has become the most common way to exploit bugs in application, and stack pivoting is a common techniques for facilitating the attack.… (more)

Subjects/Keywords: Return-Oriented Programming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ying, Y. (2014). UnROP: creating correct backtrace from core dumps with stack pivoting. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/ying_yuchen_201408_ms

Chicago Manual of Style (16th Edition):

Ying, Yuchen. “UnROP: creating correct backtrace from core dumps with stack pivoting.” 2014. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/ying_yuchen_201408_ms.

MLA Handbook (7th Edition):

Ying, Yuchen. “UnROP: creating correct backtrace from core dumps with stack pivoting.” 2014. Web. 20 Jun 2019.

Vancouver:

Ying Y. UnROP: creating correct backtrace from core dumps with stack pivoting. [Internet] [Masters thesis]. University of Georgia; 2014. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/ying_yuchen_201408_ms.

Council of Science Editors:

Ying Y. UnROP: creating correct backtrace from core dumps with stack pivoting. [Masters Thesis]. University of Georgia; 2014. Available from: http://purl.galileo.usg.edu/uga_etd/ying_yuchen_201408_ms


University of Georgia

12. Werth, Thomas Edward. Bugs in embedded software: detection and analysis.

Degree: MS, Computer Science, 2014, University of Georgia

 Several tools and techniques have been developed to automatically detect software errors in programs written for use on standard CPU’s. While the architectures of microcontrollers… (more)

Subjects/Keywords: Microcontroller; Arduino; Static Analysis; Software bugs; Integer overflow; Buffer Overflow; Internet of things

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Werth, T. E. (2014). Bugs in embedded software: detection and analysis. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/werth_thomas_e_201412_ms

Chicago Manual of Style (16th Edition):

Werth, Thomas Edward. “Bugs in embedded software: detection and analysis.” 2014. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/werth_thomas_e_201412_ms.

MLA Handbook (7th Edition):

Werth, Thomas Edward. “Bugs in embedded software: detection and analysis.” 2014. Web. 20 Jun 2019.

Vancouver:

Werth TE. Bugs in embedded software: detection and analysis. [Internet] [Masters thesis]. University of Georgia; 2014. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/werth_thomas_e_201412_ms.

Council of Science Editors:

Werth TE. Bugs in embedded software: detection and analysis. [Masters Thesis]. University of Georgia; 2014. Available from: http://purl.galileo.usg.edu/uga_etd/werth_thomas_e_201412_ms


University of Georgia

13. Yin, Yue. Automated generating CTF challenges with program analysis tools resistance.

Degree: PhD, Computer Science, 2018, University of Georgia

 Capture the Flag(CTF) games and competitions have become popular today. Good CTF exercises are not only good approach for learning Cyber Security concepts and techniques… (more)

Subjects/Keywords: Capture-the-Flag(CTF); Software Vulnerability; Fuzzing; Debugging

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yin, Y. (2018). Automated generating CTF challenges with program analysis tools resistance. (Doctoral Dissertation). University of Georgia. Retrieved from http://hdl.handle.net/10724/38613

Chicago Manual of Style (16th Edition):

Yin, Yue. “Automated generating CTF challenges with program analysis tools resistance.” 2018. Doctoral Dissertation, University of Georgia. Accessed June 20, 2019. http://hdl.handle.net/10724/38613.

MLA Handbook (7th Edition):

Yin, Yue. “Automated generating CTF challenges with program analysis tools resistance.” 2018. Web. 20 Jun 2019.

Vancouver:

Yin Y. Automated generating CTF challenges with program analysis tools resistance. [Internet] [Doctoral dissertation]. University of Georgia; 2018. [cited 2019 Jun 20]. Available from: http://hdl.handle.net/10724/38613.

Council of Science Editors:

Yin Y. Automated generating CTF challenges with program analysis tools resistance. [Doctoral Dissertation]. University of Georgia; 2018. Available from: http://hdl.handle.net/10724/38613

14. Jiva, Farhan Saleem. Helping Johnny pentest: addressing the shortcomings of black-box Web vulnerability scanners.

Degree: MS, Computer Science, 2012, University of Georgia

 With the advent of innovative Web 2.0 technologies, web applications play an important role on the modern-day Internet by delivering rich services such as web-based… (more)

Subjects/Keywords: Black-box scanners

…undisclosed leak on pastebin2 , a web application hosted on the University of Georgia network fell… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiva, F. S. (2012). Helping Johnny pentest: addressing the shortcomings of black-box Web vulnerability scanners. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/jiva_farhan_s_201205_ms

Chicago Manual of Style (16th Edition):

Jiva, Farhan Saleem. “Helping Johnny pentest: addressing the shortcomings of black-box Web vulnerability scanners.” 2012. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/jiva_farhan_s_201205_ms.

MLA Handbook (7th Edition):

Jiva, Farhan Saleem. “Helping Johnny pentest: addressing the shortcomings of black-box Web vulnerability scanners.” 2012. Web. 20 Jun 2019.

Vancouver:

Jiva FS. Helping Johnny pentest: addressing the shortcomings of black-box Web vulnerability scanners. [Internet] [Masters thesis]. University of Georgia; 2012. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/jiva_farhan_s_201205_ms.

Council of Science Editors:

Jiva FS. Helping Johnny pentest: addressing the shortcomings of black-box Web vulnerability scanners. [Masters Thesis]. University of Georgia; 2012. Available from: http://purl.galileo.usg.edu/uga_etd/jiva_farhan_s_201205_ms

15. Wang, I-Cheng. Scalar-product based secure multi-party computation.

Degree: MS, Computer Science, 2012, University of Georgia

 Secure multiparty computation (SMC) enables parties to carry out distributed computing tasks, guaranteeing no additional private information is revealed, other than what can be inferred… (more)

Subjects/Keywords: MPC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, I. (2012). Scalar-product based secure multi-party computation. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/wang_i-cheng_201205_ms

Chicago Manual of Style (16th Edition):

Wang, I-Cheng. “Scalar-product based secure multi-party computation.” 2012. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/wang_i-cheng_201205_ms.

MLA Handbook (7th Edition):

Wang, I-Cheng. “Scalar-product based secure multi-party computation.” 2012. Web. 20 Jun 2019.

Vancouver:

Wang I. Scalar-product based secure multi-party computation. [Internet] [Masters thesis]. University of Georgia; 2012. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/wang_i-cheng_201205_ms.

Council of Science Editors:

Wang I. Scalar-product based secure multi-party computation. [Masters Thesis]. University of Georgia; 2012. Available from: http://purl.galileo.usg.edu/uga_etd/wang_i-cheng_201205_ms

16. Galli, Enrico. Reverse engineering Android applications.

Degree: MS, Computer Science, 2012, University of Georgia

 Android is the fastest growing mobile platform. This market growth has attracted malware authors. For example, in 2011, the number of malware applications targeting Android… (more)

Subjects/Keywords: Android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Galli, E. (2012). Reverse engineering Android applications. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/galli_enrico_201208_ms

Chicago Manual of Style (16th Edition):

Galli, Enrico. “Reverse engineering Android applications.” 2012. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/galli_enrico_201208_ms.

MLA Handbook (7th Edition):

Galli, Enrico. “Reverse engineering Android applications.” 2012. Web. 20 Jun 2019.

Vancouver:

Galli E. Reverse engineering Android applications. [Internet] [Masters thesis]. University of Georgia; 2012. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/galli_enrico_201208_ms.

Council of Science Editors:

Galli E. Reverse engineering Android applications. [Masters Thesis]. University of Georgia; 2012. Available from: http://purl.galileo.usg.edu/uga_etd/galli_enrico_201208_ms

17. Sugandhi, Sagar Shailesh. CacheMeter.

Degree: MS, Computer Science, 2013, University of Georgia

 HTTP Response caching significantly reduces user perceived latency. This thesis describes CacheMeter, our tool which calculates caching percentage of webpage(s) with respect to browser caching.… (more)

Subjects/Keywords: HTTP caching

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sugandhi, S. S. (2013). CacheMeter. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/sugandhi_sagar_s_201308_ms

Chicago Manual of Style (16th Edition):

Sugandhi, Sagar Shailesh. “CacheMeter.” 2013. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/sugandhi_sagar_s_201308_ms.

MLA Handbook (7th Edition):

Sugandhi, Sagar Shailesh. “CacheMeter.” 2013. Web. 20 Jun 2019.

Vancouver:

Sugandhi SS. CacheMeter. [Internet] [Masters thesis]. University of Georgia; 2013. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/sugandhi_sagar_s_201308_ms.

Council of Science Editors:

Sugandhi SS. CacheMeter. [Masters Thesis]. University of Georgia; 2013. Available from: http://purl.galileo.usg.edu/uga_etd/sugandhi_sagar_s_201308_ms


University of Georgia

18. Morris, Aura Lee. Spam filtering using social networks.

Degree: MS, Computer Science, 2005, University of Georgia

 Unsolicited commercial email, informally known as spam, is a rapidly growing problem that affects email users. Many methods of filtering spam have been studied; one… (more)

Subjects/Keywords: Spam

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morris, A. L. (2005). Spam filtering using social networks. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/morris_aura_l_200508_ms

Chicago Manual of Style (16th Edition):

Morris, Aura Lee. “Spam filtering using social networks.” 2005. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/morris_aura_l_200508_ms.

MLA Handbook (7th Edition):

Morris, Aura Lee. “Spam filtering using social networks.” 2005. Web. 20 Jun 2019.

Vancouver:

Morris AL. Spam filtering using social networks. [Internet] [Masters thesis]. University of Georgia; 2005. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/morris_aura_l_200508_ms.

Council of Science Editors:

Morris AL. Spam filtering using social networks. [Masters Thesis]. University of Georgia; 2005. Available from: http://purl.galileo.usg.edu/uga_etd/morris_aura_l_200508_ms


University of Georgia

19. Veal, Bryan Edward. Using self-clocking for passive estimation of TCP round-trip times.

Degree: MS, Computer Science, 2005, University of Georgia

 Passive methods of measurement allow the examination of network properties without altering the ow of data, which could change the network properties being measured. Passive… (more)

Subjects/Keywords: Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Veal, B. E. (2005). Using self-clocking for passive estimation of TCP round-trip times. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/veal_bryan_e_200508_ms

Chicago Manual of Style (16th Edition):

Veal, Bryan Edward. “Using self-clocking for passive estimation of TCP round-trip times.” 2005. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/veal_bryan_e_200508_ms.

MLA Handbook (7th Edition):

Veal, Bryan Edward. “Using self-clocking for passive estimation of TCP round-trip times.” 2005. Web. 20 Jun 2019.

Vancouver:

Veal BE. Using self-clocking for passive estimation of TCP round-trip times. [Internet] [Masters thesis]. University of Georgia; 2005. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/veal_bryan_e_200508_ms.

Council of Science Editors:

Veal BE. Using self-clocking for passive estimation of TCP round-trip times. [Masters Thesis]. University of Georgia; 2005. Available from: http://purl.galileo.usg.edu/uga_etd/veal_bryan_e_200508_ms


University of Georgia

20. Moore, Michael. ETCP: a flexible, asymmetric protocol for network applications.

Degree: MS, Computer Science, 2006, University of Georgia

 TCP is the predominant network protocol for Internet applications, including HTTP, FTP, andemail. However, many other applications, such as streaming multimedia, require a slightly differentfeature… (more)

Subjects/Keywords: TCP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moore, M. (2006). ETCP: a flexible, asymmetric protocol for network applications. (Masters Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/moore_michael_t_200608_ms

Chicago Manual of Style (16th Edition):

Moore, Michael. “ETCP: a flexible, asymmetric protocol for network applications.” 2006. Masters Thesis, University of Georgia. Accessed June 20, 2019. http://purl.galileo.usg.edu/uga_etd/moore_michael_t_200608_ms.

MLA Handbook (7th Edition):

Moore, Michael. “ETCP: a flexible, asymmetric protocol for network applications.” 2006. Web. 20 Jun 2019.

Vancouver:

Moore M. ETCP: a flexible, asymmetric protocol for network applications. [Internet] [Masters thesis]. University of Georgia; 2006. [cited 2019 Jun 20]. Available from: http://purl.galileo.usg.edu/uga_etd/moore_michael_t_200608_ms.

Council of Science Editors:

Moore M. ETCP: a flexible, asymmetric protocol for network applications. [Masters Thesis]. University of Georgia; 2006. Available from: http://purl.galileo.usg.edu/uga_etd/moore_michael_t_200608_ms

.