Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Illinois – Chicago" +contributor:("Zuck, Lenore"). Showing records 1 – 14 of 14 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Illinois – Chicago

1. Colombo, Edoardo G. Cerberus: Detection and Characterization of Automatically-Generated Malicious Domains.

Degree: 2014, University of Illinois – Chicago

 Botnets are networks of infected machines (the bots) controlled by an external entity, the botmaster, who uses this infrastructure to carry out malicious activities, e.g.,… (more)

Subjects/Keywords: botnet; computer security; domain generation algorithm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Colombo, E. G. (2014). Cerberus: Detection and Characterization of Automatically-Generated Malicious Domains. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/19055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Colombo, Edoardo G. “Cerberus: Detection and Characterization of Automatically-Generated Malicious Domains.” 2014. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/19055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Colombo, Edoardo G. “Cerberus: Detection and Characterization of Automatically-Generated Malicious Domains.” 2014. Web. 23 Jan 2021.

Vancouver:

Colombo EG. Cerberus: Detection and Characterization of Automatically-Generated Malicious Domains. [Internet] [Thesis]. University of Illinois – Chicago; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/19055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Colombo EG. Cerberus: Detection and Characterization of Automatically-Generated Malicious Domains. [Thesis]. University of Illinois – Chicago; 2014. Available from: http://hdl.handle.net/10027/19055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

2. Bernasconi, Anna. Building Deductive Proofs of LTL Properties for Iteratively Refined Systems.

Degree: 2016, University of Illinois – Chicago

 Modern software development processes are evolving from sequential to increasingly agile and incremental paradigms. Verification, unavoidable step of a correct software production, cannot get left… (more)

Subjects/Keywords: formal software verification; model checking; deductive verification; requirements; incremental; deductive proof; deductive system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bernasconi, A. (2016). Building Deductive Proofs of LTL Properties for Iteratively Refined Systems. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/20884

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bernasconi, Anna. “Building Deductive Proofs of LTL Properties for Iteratively Refined Systems.” 2016. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/20884.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bernasconi, Anna. “Building Deductive Proofs of LTL Properties for Iteratively Refined Systems.” 2016. Web. 23 Jan 2021.

Vancouver:

Bernasconi A. Building Deductive Proofs of LTL Properties for Iteratively Refined Systems. [Internet] [Thesis]. University of Illinois – Chicago; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/20884.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bernasconi A. Building Deductive Proofs of LTL Properties for Iteratively Refined Systems. [Thesis]. University of Illinois – Chicago; 2016. Available from: http://hdl.handle.net/10027/20884

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

3. Casula, Dario. Witnessing Control Flow Graph Optimizations.

Degree: 2016, University of Illinois – Chicago

 Proving the correctness of a program transformation, and specifically, of a compiler op- timization, is a long-standing research problem. Trusting the compiler requires to guarantee… (more)

Subjects/Keywords: llvm; witness; z3; CFG; compiler

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Casula, D. (2016). Witnessing Control Flow Graph Optimizations. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/20974

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Casula, Dario. “Witnessing Control Flow Graph Optimizations.” 2016. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/20974.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Casula, Dario. “Witnessing Control Flow Graph Optimizations.” 2016. Web. 23 Jan 2021.

Vancouver:

Casula D. Witnessing Control Flow Graph Optimizations. [Internet] [Thesis]. University of Illinois – Chicago; 2016. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/20974.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Casula D. Witnessing Control Flow Graph Optimizations. [Thesis]. University of Illinois – Chicago; 2016. Available from: http://hdl.handle.net/10027/20974

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

4. Rossetti, Daniele. Specifying and Enforcing Workflows in Ruby on Rails.

Degree: 2013, University of Illinois – Chicago

 Nowadays, Web applications are afflicted by numerous vulnerabilities and there ex- ist many attacks that exploit them to execute malicious tasks. In this thesis we… (more)

Subjects/Keywords: workflows; web attacks; ruby on rails; web security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rossetti, D. (2013). Specifying and Enforcing Workflows in Ruby on Rails. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/10142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rossetti, Daniele. “Specifying and Enforcing Workflows in Ruby on Rails.” 2013. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/10142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rossetti, Daniele. “Specifying and Enforcing Workflows in Ruby on Rails.” 2013. Web. 23 Jan 2021.

Vancouver:

Rossetti D. Specifying and Enforcing Workflows in Ruby on Rails. [Internet] [Thesis]. University of Illinois – Chicago; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/10142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rossetti D. Specifying and Enforcing Workflows in Ruby on Rails. [Thesis]. University of Illinois – Chicago; 2013. Available from: http://hdl.handle.net/10027/10142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

5. Monshizadeh, Maliheh -. Inferring Specifications for Web Application Security.

Degree: 2017, University of Illinois – Chicago

 Over the past two decades, we have been witnessing the evolution of the web applications from simple static pages into complex, interactive platforms. With increasing… (more)

Subjects/Keywords: Program Analysis; Web Applications; Software Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Monshizadeh, M. -. (2017). Inferring Specifications for Web Application Security. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/21846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Monshizadeh, Maliheh -. “Inferring Specifications for Web Application Security.” 2017. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/21846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Monshizadeh, Maliheh -. “Inferring Specifications for Web Application Security.” 2017. Web. 23 Jan 2021.

Vancouver:

Monshizadeh M-. Inferring Specifications for Web Application Security. [Internet] [Thesis]. University of Illinois – Chicago; 2017. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/21846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Monshizadeh M-. Inferring Specifications for Web Application Security. [Thesis]. University of Illinois – Chicago; 2017. Available from: http://hdl.handle.net/10027/21846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Zarzani, Niko. Improving Compiler Optimizations using Program Annotations.

Degree: 2014, University of Illinois – Chicago

 In this work we describe a framework that combines the results of from program testing, formal verification and compiler optimization. We focus on how the… (more)

Subjects/Keywords: Compilers; Optimizations; Annotations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zarzani, N. (2014). Improving Compiler Optimizations using Program Annotations. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/18817

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zarzani, Niko. “Improving Compiler Optimizations using Program Annotations.” 2014. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/18817.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zarzani, Niko. “Improving Compiler Optimizations using Program Annotations.” 2014. Web. 23 Jan 2021.

Vancouver:

Zarzani N. Improving Compiler Optimizations using Program Annotations. [Internet] [Thesis]. University of Illinois – Chicago; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/18817.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zarzani N. Improving Compiler Optimizations using Program Annotations. [Thesis]. University of Illinois – Chicago; 2014. Available from: http://hdl.handle.net/10027/18817

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Panebianco, Alessandro. Simple Structures For Complex Data: Optimizing Metadata Storage & Retrieval Using Graph Databases.

Degree: 2014, University of Illinois – Chicago

 Analyzing and processing the dynamic structure of today’s data represents a challenge for developers which prompts them to explore alternative methods with respect to the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Panebianco, A. (2014). Simple Structures For Complex Data: Optimizing Metadata Storage & Retrieval Using Graph Databases. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/19028

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Panebianco, Alessandro. “Simple Structures For Complex Data: Optimizing Metadata Storage & Retrieval Using Graph Databases.” 2014. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/19028.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Panebianco, Alessandro. “Simple Structures For Complex Data: Optimizing Metadata Storage & Retrieval Using Graph Databases.” 2014. Web. 23 Jan 2021.

Vancouver:

Panebianco A. Simple Structures For Complex Data: Optimizing Metadata Storage & Retrieval Using Graph Databases. [Internet] [Thesis]. University of Illinois – Chicago; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/19028.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Panebianco A. Simple Structures For Complex Data: Optimizing Metadata Storage & Retrieval Using Graph Databases. [Thesis]. University of Illinois – Chicago; 2014. Available from: http://hdl.handle.net/10027/19028

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Martinoia, Diego. Proving Correctness within an Access Control Evaluation Framework.

Degree: 2013, University of Illinois – Chicago

 This thesis presents the proofs developed to demonstrate correctness of a case study within the Access Control Evaluation Framework (ACEF). ACEF is a theoretical framework… (more)

Subjects/Keywords: Access Control; Formal Methods; Correctness; PVS; Verification

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martinoia, D. (2013). Proving Correctness within an Access Control Evaluation Framework. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/10132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Martinoia, Diego. “Proving Correctness within an Access Control Evaluation Framework.” 2013. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/10132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Martinoia, Diego. “Proving Correctness within an Access Control Evaluation Framework.” 2013. Web. 23 Jan 2021.

Vancouver:

Martinoia D. Proving Correctness within an Access Control Evaluation Framework. [Internet] [Thesis]. University of Illinois – Chicago; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/10132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Martinoia D. Proving Correctness within an Access Control Evaluation Framework. [Thesis]. University of Illinois – Chicago; 2013. Available from: http://hdl.handle.net/10027/10132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Tagliabue, Giacomo A. An Annotation Framework for Low-Level Virtual Machine Compiler Infrastructure.

Degree: 2013, University of Illinois – Chicago

 This work has been part of the ongoing results in a research project on compilers, formal methods and computer security to build a defensive optimizer… (more)

Subjects/Keywords: Compilers; Formal Methods; LLVM

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tagliabue, G. A. (2013). An Annotation Framework for Low-Level Virtual Machine Compiler Infrastructure. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/10137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tagliabue, Giacomo A. “An Annotation Framework for Low-Level Virtual Machine Compiler Infrastructure.” 2013. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/10137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tagliabue, Giacomo A. “An Annotation Framework for Low-Level Virtual Machine Compiler Infrastructure.” 2013. Web. 23 Jan 2021.

Vancouver:

Tagliabue GA. An Annotation Framework for Low-Level Virtual Machine Compiler Infrastructure. [Internet] [Thesis]. University of Illinois – Chicago; 2013. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/10137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tagliabue GA. An Annotation Framework for Low-Level Virtual Machine Compiler Infrastructure. [Thesis]. University of Illinois – Chicago; 2013. Available from: http://hdl.handle.net/10027/10137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Petronella, Gabriele. Analyzing Privacy of Android Apps.

Degree: 2014, University of Illinois – Chicago

 In this thesis we present the design and the implementation of a tool to analyze privacy policies of Android applications, with the purpose of increasing… (more)

Subjects/Keywords: privacy; android; mobile; policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Petronella, G. (2014). Analyzing Privacy of Android Apps. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/18815

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Petronella, Gabriele. “Analyzing Privacy of Android Apps.” 2014. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/18815.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Petronella, Gabriele. “Analyzing Privacy of Android Apps.” 2014. Web. 23 Jan 2021.

Vancouver:

Petronella G. Analyzing Privacy of Android Apps. [Internet] [Thesis]. University of Illinois – Chicago; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/18815.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Petronella G. Analyzing Privacy of Android Apps. [Thesis]. University of Illinois – Chicago; 2014. Available from: http://hdl.handle.net/10027/18815

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Graziani, Luca. Query Depth in Relational Databases: Ensuring the Legality of Searches on Business Records Metadata.

Degree: 2015, University of Illinois – Chicago

 Intelligence agencies worldwide have access to databases containing daily business records metadata, such as telephony metadata, with the aim of preventing and identifying terrorist activity.… (more)

Subjects/Keywords: Databases; Privacy; NSA; Query depth; Relational databases; optimization; legal access; syntactic; business; records; metadata; Query; SQL; datalog; business records; business records metadata; luca graziani; computer science; optimization; java

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Graziani, L. (2015). Query Depth in Relational Databases: Ensuring the Legality of Searches on Business Records Metadata. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/19662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Graziani, Luca. “Query Depth in Relational Databases: Ensuring the Legality of Searches on Business Records Metadata.” 2015. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/19662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Graziani, Luca. “Query Depth in Relational Databases: Ensuring the Legality of Searches on Business Records Metadata.” 2015. Web. 23 Jan 2021.

Vancouver:

Graziani L. Query Depth in Relational Databases: Ensuring the Legality of Searches on Business Records Metadata. [Internet] [Thesis]. University of Illinois – Chicago; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/19662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Graziani L. Query Depth in Relational Databases: Ensuring the Legality of Searches on Business Records Metadata. [Thesis]. University of Illinois – Chicago; 2015. Available from: http://hdl.handle.net/10027/19662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Andronio, Nicolo. Heldroid: Fast and Efficient Linguistic-Based Ransomware Detection.

Degree: 2015, University of Illinois – Chicago

 In every era, there has always been a slice of society devoted to deception and subtlety. Sadly, but inexorably, progress in technology has changed the… (more)

Subjects/Keywords: ransomware; detection; natural language processing; filtering; android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andronio, N. (2015). Heldroid: Fast and Efficient Linguistic-Based Ransomware Detection. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/19676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andronio, Nicolo. “Heldroid: Fast and Efficient Linguistic-Based Ransomware Detection.” 2015. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/19676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andronio, Nicolo. “Heldroid: Fast and Efficient Linguistic-Based Ransomware Detection.” 2015. Web. 23 Jan 2021.

Vancouver:

Andronio N. Heldroid: Fast and Efficient Linguistic-Based Ransomware Detection. [Internet] [Thesis]. University of Illinois – Chicago; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/19676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andronio N. Heldroid: Fast and Efficient Linguistic-Based Ransomware Detection. [Thesis]. University of Illinois – Chicago; 2015. Available from: http://hdl.handle.net/10027/19676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Cioria, Luca. Temporal Analysis of Wire Transfers for Fraud Detection.

Degree: 2015, University of Illinois – Chicago

 This thesis aims to improve the current systems to identify fraudolent bank trans- actions. We start by analyzing the state of the art, in particular… (more)

Subjects/Keywords: fraud detection; data analysis; computer security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cioria, L. (2015). Temporal Analysis of Wire Transfers for Fraud Detection. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/19747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cioria, Luca. “Temporal Analysis of Wire Transfers for Fraud Detection.” 2015. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/19747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cioria, Luca. “Temporal Analysis of Wire Transfers for Fraud Detection.” 2015. Web. 23 Jan 2021.

Vancouver:

Cioria L. Temporal Analysis of Wire Transfers for Fraud Detection. [Internet] [Thesis]. University of Illinois – Chicago; 2015. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/19747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cioria L. Temporal Analysis of Wire Transfers for Fraud Detection. [Thesis]. University of Illinois – Chicago; 2015. Available from: http://hdl.handle.net/10027/19747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Hossain, BM M. Enhancing Parallelism and Scalability of Database-Centric Applications in Presence of Database Deadlocks.

Degree: 2014, University of Illinois – Chicago

 Currently, in Database-Centric Applications (DCAs), database deadlocks are typically detected at runtime within database engines using special algorithms that analyze whether resources are held in… (more)

Subjects/Keywords: Deadlocks; Parallelism; Database Deadlocks Prevention; Cycle Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hossain, B. M. (2014). Enhancing Parallelism and Scalability of Database-Centric Applications in Presence of Database Deadlocks. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/18810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hossain, BM M. “Enhancing Parallelism and Scalability of Database-Centric Applications in Presence of Database Deadlocks.” 2014. Thesis, University of Illinois – Chicago. Accessed January 23, 2021. http://hdl.handle.net/10027/18810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hossain, BM M. “Enhancing Parallelism and Scalability of Database-Centric Applications in Presence of Database Deadlocks.” 2014. Web. 23 Jan 2021.

Vancouver:

Hossain BM. Enhancing Parallelism and Scalability of Database-Centric Applications in Presence of Database Deadlocks. [Internet] [Thesis]. University of Illinois – Chicago; 2014. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/10027/18810.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hossain BM. Enhancing Parallelism and Scalability of Database-Centric Applications in Presence of Database Deadlocks. [Thesis]. University of Illinois – Chicago; 2014. Available from: http://hdl.handle.net/10027/18810

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.