Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Illinois – Urbana-Champaign" +contributor:("Nicol, David M."). Showing records 1 – 30 of 32 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


University of Illinois – Urbana-Champaign

1. Edwards, Nathan. Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems.

Degree: MS, 1200, 2013, University of Illinois – Urbana-Champaign

 Along with an increase in cyber security concerns for critical infrastructure applications, there is a growing concern and lack of solutions for cyber-based supply chain… (more)

Subjects/Keywords: Hardware intrusion detection; Embedded systems Trojan detection; Multinomial logistic regression; Two-stage resistor-capacitor filter; Supply chain risk; Smart grid; Smart meter; Advanced Metering Infrastructure (AMI)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edwards, N. (2013). Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/35322

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edwards, Nathan. “Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems.” 2013. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/35322.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edwards, Nathan. “Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems.” 2013. Web. 23 Nov 2020.

Vancouver:

Edwards N. Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/35322.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Edwards N. Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems. [Thesis]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/35322

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

2. Palani, Kartik. Scalable authentication for consumer-side smart grid Internet of Things.

Degree: MS, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 As computing becomes ubiquitous, there is an increased interaction between the computing devices. The transformation of the Internet of Computers (IoC) into the Internet of… (more)

Subjects/Keywords: Security; Internet of things (IoT); Public key infrastructure (PKI); Certificates

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palani, K. (2016). Scalable authentication for consumer-side smart grid Internet of Things. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/95510

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Palani, Kartik. “Scalable authentication for consumer-side smart grid Internet of Things.” 2016. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/95510.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Palani, Kartik. “Scalable authentication for consumer-side smart grid Internet of Things.” 2016. Web. 23 Nov 2020.

Vancouver:

Palani K. Scalable authentication for consumer-side smart grid Internet of Things. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2016. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/95510.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Palani K. Scalable authentication for consumer-side smart grid Internet of Things. [Thesis]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/95510

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

3. Nguyen, Hoang Hai. An approach to incorporating uncertainty in network security analysis.

Degree: MS, Electrical & Computer Engr, 2018, University of Illinois – Urbana-Champaign

 Attack graphs used in network security analysis are analyzed to determine sequences of exploits that lead to successful acquisition of privileges or data at critical… (more)

Subjects/Keywords: network security; uncertainty; attach graph; reachability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, H. H. (2018). An approach to incorporating uncertainty in network security analysis. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/102416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nguyen, Hoang Hai. “An approach to incorporating uncertainty in network security analysis.” 2018. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/102416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nguyen, Hoang Hai. “An approach to incorporating uncertainty in network security analysis.” 2018. Web. 23 Nov 2020.

Vancouver:

Nguyen HH. An approach to incorporating uncertainty in network security analysis. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2018. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/102416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nguyen HH. An approach to incorporating uncertainty in network security analysis. [Thesis]. University of Illinois – Urbana-Champaign; 2018. Available from: http://hdl.handle.net/2142/102416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

4. Hosseinabadi, Ghazale. Exploiting wireless broadcast property to improve performance of distributed algorithms and mac protocols in wireless networks.

Degree: PhD, 1200, 2014, University of Illinois – Urbana-Champaign

 Because a wireless channel is a shared medium, messages sent on the wireless links might be overheard by the neighboring stations. The information obtained from… (more)

Subjects/Keywords: Wireless Networks; Media Access Control (MAC) Protocols; Distributed Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hosseinabadi, G. (2014). Exploiting wireless broadcast property to improve performance of distributed algorithms and mac protocols in wireless networks. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/46850

Chicago Manual of Style (16th Edition):

Hosseinabadi, Ghazale. “Exploiting wireless broadcast property to improve performance of distributed algorithms and mac protocols in wireless networks.” 2014. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/46850.

MLA Handbook (7th Edition):

Hosseinabadi, Ghazale. “Exploiting wireless broadcast property to improve performance of distributed algorithms and mac protocols in wireless networks.” 2014. Web. 23 Nov 2020.

Vancouver:

Hosseinabadi G. Exploiting wireless broadcast property to improve performance of distributed algorithms and mac protocols in wireless networks. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2014. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/46850.

Council of Science Editors:

Hosseinabadi G. Exploiting wireless broadcast property to improve performance of distributed algorithms and mac protocols in wireless networks. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2014. Available from: http://hdl.handle.net/2142/46850


University of Illinois – Urbana-Champaign

5. Lemay, Elizabeth. Adversary-driven state-based system security evaluation.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 Quantitative metrics can aid decision-makers in making informed trade-off decisions. In system-level security decisions, quantitative security metrics allow decision-makers to compare the relative security of… (more)

Subjects/Keywords: model-based quantitative security metrics; system security analysis; attack execution graph; executable security models; attack step decision function; state look-ahead tree; ADversary VIew Security Evaluation (ADVISE) method

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lemay, E. (2012). Adversary-driven state-based system security evaluation. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/29707

Chicago Manual of Style (16th Edition):

Lemay, Elizabeth. “Adversary-driven state-based system security evaluation.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/29707.

MLA Handbook (7th Edition):

Lemay, Elizabeth. “Adversary-driven state-based system security evaluation.” 2012. Web. 23 Nov 2020.

Vancouver:

Lemay E. Adversary-driven state-based system security evaluation. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/29707.

Council of Science Editors:

Lemay E. Adversary-driven state-based system security evaluation. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/29707


University of Illinois – Urbana-Champaign

6. Aquino-Lugo, Angel A. Distributed and decentralized control of the power grid.

Degree: PhD, 1200, 2011, University of Illinois – Urbana-Champaign

 The introduction of remotely controlled network devices is transforming the way the power system is operated and studied. The ability to provide real and reactive… (more)

Subjects/Keywords: distribution network; control; smart grid; agents; decentralized

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aquino-Lugo, A. A. (2011). Distributed and decentralized control of the power grid. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/18430

Chicago Manual of Style (16th Edition):

Aquino-Lugo, Angel A. “Distributed and decentralized control of the power grid.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/18430.

MLA Handbook (7th Edition):

Aquino-Lugo, Angel A. “Distributed and decentralized control of the power grid.” 2011. Web. 23 Nov 2020.

Vancouver:

Aquino-Lugo AA. Distributed and decentralized control of the power grid. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/18430.

Council of Science Editors:

Aquino-Lugo AA. Distributed and decentralized control of the power grid. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/18430


University of Illinois – Urbana-Champaign

7. Rogers, Katherine. Data-enhanced applications for power systems analysis.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 As power system data becomes more abundant, there is an increasing need for applications which can make appropriate use of this data to perform power… (more)

Subjects/Keywords: data mining; cluster analysis; power systems analysis; sensitivity analysis; equivalent estimation; parameter estimation; bad data detection; reduced network modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rogers, K. (2012). Data-enhanced applications for power systems analysis. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/29740

Chicago Manual of Style (16th Edition):

Rogers, Katherine. “Data-enhanced applications for power systems analysis.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/29740.

MLA Handbook (7th Edition):

Rogers, Katherine. “Data-enhanced applications for power systems analysis.” 2012. Web. 23 Nov 2020.

Vancouver:

Rogers K. Data-enhanced applications for power systems analysis. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/29740.

Council of Science Editors:

Rogers K. Data-enhanced applications for power systems analysis. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/29740


University of Illinois – Urbana-Champaign

8. Schear, Nabil A. Preventing encrypted traffic analysis.

Degree: PhD, 0112, 2011, University of Illinois – Urbana-Champaign

 Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used… (more)

Subjects/Keywords: Networking; Security; Privacy; Traffic analysis; Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schear, N. A. (2011). Preventing encrypted traffic analysis. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/24379

Chicago Manual of Style (16th Edition):

Schear, Nabil A. “Preventing encrypted traffic analysis.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/24379.

MLA Handbook (7th Edition):

Schear, Nabil A. “Preventing encrypted traffic analysis.” 2011. Web. 23 Nov 2020.

Vancouver:

Schear NA. Preventing encrypted traffic analysis. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/24379.

Council of Science Editors:

Schear NA. Preventing encrypted traffic analysis. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/24379

9. Yordy, Zachary. A methodology to configure a minimal, application-specific operating system for distribution and operation.

Degree: MS, 1200, 2013, University of Illinois – Urbana-Champaign

 NetAPT is a tool that helps enterprise and utility customers validate their network security policy. While the tool gives helpful results, it relies on lots… (more)

Subjects/Keywords: Network Access Policy Tool (NetAPT); Operating System; Application-Specific Operating System (ASOS); Compile; Linux; Distribution

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yordy, Z. (2013). A methodology to configure a minimal, application-specific operating system for distribution and operation. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/45344

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yordy, Zachary. “A methodology to configure a minimal, application-specific operating system for distribution and operation.” 2013. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/45344.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yordy, Zachary. “A methodology to configure a minimal, application-specific operating system for distribution and operation.” 2013. Web. 23 Nov 2020.

Vancouver:

Yordy Z. A methodology to configure a minimal, application-specific operating system for distribution and operation. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/45344.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yordy Z. A methodology to configure a minimal, application-specific operating system for distribution and operation. [Thesis]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/45344

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Zhu, Huaiyu. Intrusion detection and prevention in advanced metering networks.

Degree: MS, 1200, 2015, University of Illinois – Urbana-Champaign

 Advanced metering infrastructure (AMI) is envisioned to be able to revolutionize the power grid and turn it into the “smart grid”. AMI, through the use… (more)

Subjects/Keywords: smart grid security; intrusion detection; security system design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, H. (2015). Intrusion detection and prevention in advanced metering networks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/72835

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhu, Huaiyu. “Intrusion detection and prevention in advanced metering networks.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/72835.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhu, Huaiyu. “Intrusion detection and prevention in advanced metering networks.” 2015. Web. 23 Nov 2020.

Vancouver:

Zhu H. Intrusion detection and prevention in advanced metering networks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/72835.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhu H. Intrusion detection and prevention in advanced metering networks. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/72835

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Jin, Dong. Efficient ethernet switch models for large-scale network simulation.

Degree: MS, 1200, 2010, University of Illinois – Urbana-Champaign

 Ethernet is the most widely implemented low-level networking technology used today, with Gigabit Ethernet seen as the emerging standard implementation. The backbones of many large… (more)

Subjects/Keywords: switch modeling; simulation; measurement; performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jin, D. (2010). Efficient ethernet switch models for large-scale network simulation. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16183

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jin, Dong. “Efficient ethernet switch models for large-scale network simulation.” 2010. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/16183.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jin, Dong. “Efficient ethernet switch models for large-scale network simulation.” 2010. Web. 23 Nov 2020.

Vancouver:

Jin D. Efficient ethernet switch models for large-scale network simulation. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2010. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/16183.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jin D. Efficient ethernet switch models for large-scale network simulation. [Thesis]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16183

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Winterrowd, Lenhard. Congestion-resilient TCP.

Degree: MS, 0112, 2013, University of Illinois – Urbana-Champaign

 In response to the advent of publicly-accessible high bandwidth links, we explore a potential resiliency enhancement to TCP that makes use of extra bandwidth to… (more)

Subjects/Keywords: XOR packets; Transmission Control Protocol (TCP); network congestion; congestion resilience; network protocol enhancement; forward error correction; exclusive-or (XOR); packet loss; network reliability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Winterrowd, L. (2013). Congestion-resilient TCP. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/44164

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Winterrowd, Lenhard. “Congestion-resilient TCP.” 2013. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/44164.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Winterrowd, Lenhard. “Congestion-resilient TCP.” 2013. Web. 23 Nov 2020.

Vancouver:

Winterrowd L. Congestion-resilient TCP. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/44164.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Winterrowd L. Congestion-resilient TCP. [Thesis]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/44164

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Khirwadkar, Tanmay S. Defense against network attacks using game theory.

Degree: MS, 0112, 2011, University of Illinois – Urbana-Champaign

 As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network attacks have been used to achieve a wide gamut of… (more)

Subjects/Keywords: Game Theory; Fictitious Play; Denial of Service Attacks; Network Attacks; Defense

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khirwadkar, T. S. (2011). Defense against network attacks using game theory. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/24243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khirwadkar, Tanmay S. “Defense against network attacks using game theory.” 2011. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/24243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khirwadkar, Tanmay S. “Defense against network attacks using game theory.” 2011. Web. 23 Nov 2020.

Vancouver:

Khirwadkar TS. Defense against network attacks using game theory. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2011. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/24243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khirwadkar TS. Defense against network attacks using game theory. [Thesis]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/24243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Zheng, Yuhao. Large-scale and high-fidelity wireless network simulation and emulation.

Degree: PhD, 0112, 2013, University of Illinois – Urbana-Champaign

 Large-scale networks, such as the Internet, cellular networks, play critical roles in today's life. The advancement of large-scale computer and communication networks heavily depends on… (more)

Subjects/Keywords: parallel discrete event simulation; network emulation; virtual machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zheng, Y. (2013). Large-scale and high-fidelity wireless network simulation and emulation. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/45413

Chicago Manual of Style (16th Edition):

Zheng, Yuhao. “Large-scale and high-fidelity wireless network simulation and emulation.” 2013. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/45413.

MLA Handbook (7th Edition):

Zheng, Yuhao. “Large-scale and high-fidelity wireless network simulation and emulation.” 2013. Web. 23 Nov 2020.

Vancouver:

Zheng Y. Large-scale and high-fidelity wireless network simulation and emulation. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/45413.

Council of Science Editors:

Zheng Y. Large-scale and high-fidelity wireless network simulation and emulation. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/45413

15. Jin, Dong. Network-simulation-based evaluation of smart grid applications.

Degree: PhD, 1200, 2013, University of Illinois – Urbana-Champaign

 The United States and many other countries are conducting a major upgrade of their electrical grids. The new “smart grid” is not a physically isolated… (more)

Subjects/Keywords: Smart Grid; Network Security; Parallel Discrete Event Simulation; Network Emulation; virtual time

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jin, D. (2013). Network-simulation-based evaluation of smart grid applications. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/45427

Chicago Manual of Style (16th Edition):

Jin, Dong. “Network-simulation-based evaluation of smart grid applications.” 2013. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/45427.

MLA Handbook (7th Edition):

Jin, Dong. “Network-simulation-based evaluation of smart grid applications.” 2013. Web. 23 Nov 2020.

Vancouver:

Jin D. Network-simulation-based evaluation of smart grid applications. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/45427.

Council of Science Editors:

Jin D. Network-simulation-based evaluation of smart grid applications. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/45427

16. Kumar, Rakesh. Programmable cyber networks for critical infrastructure.

Degree: PhD, Electrical & Computer Engr, 2019, University of Illinois – Urbana-Champaign

 The operational integrity of the infrastructure systems is critical for a nation state’s economic and security interests. Such systems rely on automation to perform complex… (more)

Subjects/Keywords: Critical Infrastructure Networking Reliability Resilience Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, R. (2019). Programmable cyber networks for critical infrastructure. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/106221

Chicago Manual of Style (16th Edition):

Kumar, Rakesh. “Programmable cyber networks for critical infrastructure.” 2019. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/106221.

MLA Handbook (7th Edition):

Kumar, Rakesh. “Programmable cyber networks for critical infrastructure.” 2019. Web. 23 Nov 2020.

Vancouver:

Kumar R. Programmable cyber networks for critical infrastructure. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2019. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/106221.

Council of Science Editors:

Kumar R. Programmable cyber networks for critical infrastructure. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2019. Available from: http://hdl.handle.net/2142/106221


University of Illinois – Urbana-Champaign

17. Bergman, David C. Power grid simulation, evaluation, and test framework.

Degree: MS, 1200, 2010, University of Illinois – Urbana-Champaign

 The Virtual Power System Testbed (VPST) at the University of Illinois at Urbana-Champaign is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIP)… (more)

Subjects/Keywords: Power Grid; Test Bed; Distributed Network Protocol (DNP3); Supervisory Control and Data Acquisition (SCADA); Simulation; Security; Test Framework; Modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bergman, D. C. (2010). Power grid simulation, evaluation, and test framework. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bergman, David C. “Power grid simulation, evaluation, and test framework.” 2010. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/16156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bergman, David C. “Power grid simulation, evaluation, and test framework.” 2010. Web. 23 Nov 2020.

Vancouver:

Bergman DC. Power grid simulation, evaluation, and test framework. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2010. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/16156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bergman DC. Power grid simulation, evaluation, and test framework. [Thesis]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

18. Nellikar, Suraj. Insider threat simulation and performance analysis of insider detection algorithms with role based models.

Degree: MS, 1200, 2010, University of Illinois – Urbana-Champaign

 Insider threat problems are widespread in industry today. They have resulted in huge losses to organizations. The security reports by leading organizations point out the… (more)

Subjects/Keywords: Insider threat; Insider detection algorithms; Role-based access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nellikar, S. (2010). Insider threat simulation and performance analysis of insider detection algorithms with role based models. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nellikar, Suraj. “Insider threat simulation and performance analysis of insider detection algorithms with role based models.” 2010. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/16177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nellikar, Suraj. “Insider threat simulation and performance analysis of insider detection algorithms with role based models.” 2010. Web. 23 Nov 2020.

Vancouver:

Nellikar S. Insider threat simulation and performance analysis of insider detection algorithms with role based models. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2010. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/16177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nellikar S. Insider threat simulation and performance analysis of insider detection algorithms with role based models. [Thesis]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

19. Thomas, Kurt A. Multi-party privacy risks in social networks.

Degree: MS, 1200, 2010, University of Illinois – Urbana-Champaign

 As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social networks allow… (more)

Subjects/Keywords: security; privacy; social networks; inference

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thomas, K. A. (2010). Multi-party privacy risks in social networks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16498

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Thomas, Kurt A. “Multi-party privacy risks in social networks.” 2010. Thesis, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/16498.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Thomas, Kurt A. “Multi-party privacy risks in social networks.” 2010. Web. 23 Nov 2020.

Vancouver:

Thomas KA. Multi-party privacy risks in social networks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2010. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/16498.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Thomas KA. Multi-party privacy risks in social networks. [Thesis]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16498

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Houmansadr, Amir. Design, analysis, and implementation of effective network flow watermarking schemes.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 Linking network flows is an important problem in several security-related applications including intrusion detection and anonymity. The flows of interest in these applications are commonly… (more)

Subjects/Keywords: Traffic analysis; network flow watermark; anonymity system; stepping stone attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Houmansadr, A. (2012). Design, analysis, and implementation of effective network flow watermarking schemes. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/34395

Chicago Manual of Style (16th Edition):

Houmansadr, Amir. “Design, analysis, and implementation of effective network flow watermarking schemes.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/34395.

MLA Handbook (7th Edition):

Houmansadr, Amir. “Design, analysis, and implementation of effective network flow watermarking schemes.” 2012. Web. 23 Nov 2020.

Vancouver:

Houmansadr A. Design, analysis, and implementation of effective network flow watermarking schemes. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/34395.

Council of Science Editors:

Houmansadr A. Design, analysis, and implementation of effective network flow watermarking schemes. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/34395

21. Eskins, Douglas. Modeling human decision points in complex systems.

Degree: PhD, 1200, 2013, University of Illinois – Urbana-Champaign

 The actions of human participants in complex systems can greatly affect system outcomes. In particular, the security of cyber-human systems (CHSs) can be highly influenced… (more)

Subjects/Keywords: cyber-human system; human decision point; cyber-security model; human-influenced task-oriented process model (HITOP);

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Eskins, D. (2013). Modeling human decision points in complex systems. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/42143

Chicago Manual of Style (16th Edition):

Eskins, Douglas. “Modeling human decision points in complex systems.” 2013. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/42143.

MLA Handbook (7th Edition):

Eskins, Douglas. “Modeling human decision points in complex systems.” 2013. Web. 23 Nov 2020.

Vancouver:

Eskins D. Modeling human decision points in complex systems. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/42143.

Council of Science Editors:

Eskins D. Modeling human decision points in complex systems. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/42143

22. Rana, Shehla. Understanding the interaction between reliability and wireless broadcast.

Degree: PhD, 1200, 2014, University of Illinois – Urbana-Champaign

 With advancement in communication technologies, the design of efficient and lightweight reliability protocols seems like an achievable goal. However, strategies for attacking and compromising communication… (more)

Subjects/Keywords: Reliability; Wireless networks; location privacy; Byzantine; Watchdog; Advanced Metering Infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rana, S. (2014). Understanding the interaction between reliability and wireless broadcast. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/49403

Chicago Manual of Style (16th Edition):

Rana, Shehla. “Understanding the interaction between reliability and wireless broadcast.” 2014. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/49403.

MLA Handbook (7th Edition):

Rana, Shehla. “Understanding the interaction between reliability and wireless broadcast.” 2014. Web. 23 Nov 2020.

Vancouver:

Rana S. Understanding the interaction between reliability and wireless broadcast. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2014. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/49403.

Council of Science Editors:

Rana S. Understanding the interaction between reliability and wireless broadcast. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2014. Available from: http://hdl.handle.net/2142/49403

23. Konigsmark, Sven Tenzing Choden. Hardware security design from circuits to systems.

Degree: PhD, Electrical & Computer Engr, 2017, University of Illinois – Urbana-Champaign

 The security of hardware implementations is of considerable importance, as even the most secure and carefully analyzed algorithms and protocols can be vulnerable in their… (more)

Subjects/Keywords: Hardware security; Physically unclonable function; Hardware Trojan horse; Authentication; Invasive attacks; Carbon nanotubes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Konigsmark, S. T. C. (2017). Hardware security design from circuits to systems. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/97659

Chicago Manual of Style (16th Edition):

Konigsmark, Sven Tenzing Choden. “Hardware security design from circuits to systems.” 2017. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/97659.

MLA Handbook (7th Edition):

Konigsmark, Sven Tenzing Choden. “Hardware security design from circuits to systems.” 2017. Web. 23 Nov 2020.

Vancouver:

Konigsmark STC. Hardware security design from circuits to systems. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2017. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/97659.

Council of Science Editors:

Konigsmark STC. Hardware security design from circuits to systems. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2017. Available from: http://hdl.handle.net/2142/97659

24. Lefever, Ryan M. Diverse partial memory replication.

Degree: PhD, 1200, 2011, University of Illinois – Urbana-Champaign

 An important approach for software dependability is the use of diversity to detect and/or tolerate errors. We develop and evaluate an approach for automated program… (more)

Subjects/Keywords: diverse partial memory replication; software memory errors; memory safety; software diversity; replication; partial replication; fault injection; experimental evaluation

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lefever, R. M. (2011). Diverse partial memory replication. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/24042

Chicago Manual of Style (16th Edition):

Lefever, Ryan M. “Diverse partial memory replication.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/24042.

MLA Handbook (7th Edition):

Lefever, Ryan M. “Diverse partial memory replication.” 2011. Web. 23 Nov 2020.

Vancouver:

Lefever RM. Diverse partial memory replication. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/24042.

Council of Science Editors:

Lefever RM. Diverse partial memory replication. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/24042

25. Lam, Vinh V. A path-based framework for analyzing large markov models.

Degree: PhD, 0112, 2011, University of Illinois – Urbana-Champaign

 Reliability and dependability modeling can be employed during many stages of analysis of a computing system to gain insights into its critical behaviors. To provide… (more)

Subjects/Keywords: Numerical analysis; Markov chains; System modelling

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lam, V. V. (2011). A path-based framework for analyzing large markov models. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/24155

Chicago Manual of Style (16th Edition):

Lam, Vinh V. “A path-based framework for analyzing large markov models.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/24155.

MLA Handbook (7th Edition):

Lam, Vinh V. “A path-based framework for analyzing large markov models.” 2011. Web. 23 Nov 2020.

Vancouver:

Lam VV. A path-based framework for analyzing large markov models. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/24155.

Council of Science Editors:

Lam VV. A path-based framework for analyzing large markov models. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/24155

26. Kumar, Jayanand Asok. Statistical guarantees of performance for RTL designs.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 Traditional hardware verification is a non-probabilistic process that verifies the adherence of a design to a non-probabilistic performance specification. However, adaptive techniques like voltage and… (more)

Subjects/Keywords: Hardware; RTL design; Variations; Better-than-worst-case design; Statistical analysis; Probabilistic verification; Formal methods; Performance estimation; register transfer level (RTL)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, J. A. (2012). Statistical guarantees of performance for RTL designs. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/30951

Chicago Manual of Style (16th Edition):

Kumar, Jayanand Asok. “Statistical guarantees of performance for RTL designs.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/30951.

MLA Handbook (7th Edition):

Kumar, Jayanand Asok. “Statistical guarantees of performance for RTL designs.” 2012. Web. 23 Nov 2020.

Vancouver:

Kumar JA. Statistical guarantees of performance for RTL designs. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/30951.

Council of Science Editors:

Kumar JA. Statistical guarantees of performance for RTL designs. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/30951

27. Raman, Vijay. Traffic-aware channel allocation and routing in multichannel, multi-radio wireless networks.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 Modern day wireless network applications exhibit varying service demands to satisfy user requirements, while differing in the nature of traffic they generate. Future wireless networks… (more)

Subjects/Keywords: ad hoc networks; channel allocation; variable channel widths; routing; traffic awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Raman, V. (2012). Traffic-aware channel allocation and routing in multichannel, multi-radio wireless networks. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/31126

Chicago Manual of Style (16th Edition):

Raman, Vijay. “Traffic-aware channel allocation and routing in multichannel, multi-radio wireless networks.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/31126.

MLA Handbook (7th Edition):

Raman, Vijay. “Traffic-aware channel allocation and routing in multichannel, multi-radio wireless networks.” 2012. Web. 23 Nov 2020.

Vancouver:

Raman V. Traffic-aware channel allocation and routing in multichannel, multi-radio wireless networks. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/31126.

Council of Science Editors:

Raman V. Traffic-aware channel allocation and routing in multichannel, multi-radio wireless networks. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/31126

28. Singh, Sankalp. Automatic verification of security policy implementations.

Degree: PhD, 0112, 2012, University of Illinois – Urbana-Champaign

 Networked systems are ubiquitous in our modern society. They are found in settings that vary from mundane enterprise IT systems to critical infrastructure systems. The… (more)

Subjects/Keywords: Security; Security Assessment; Firewall; Access Control; Policy; Policy Specification; Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singh, S. (2012). Automatic verification of security policy implementations. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/30938

Chicago Manual of Style (16th Edition):

Singh, Sankalp. “Automatic verification of security policy implementations.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/30938.

MLA Handbook (7th Edition):

Singh, Sankalp. “Automatic verification of security policy implementations.” 2012. Web. 23 Nov 2020.

Vancouver:

Singh S. Automatic verification of security policy implementations. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/30938.

Council of Science Editors:

Singh S. Automatic verification of security policy implementations. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/30938

29. Dutta, Sudipta. Data mining and graph theory focused solutions to Smart Grid challenges.

Degree: PhD, 1200, 2013, University of Illinois – Urbana-Champaign

 The Smart Grid represents a transition of the power and energy industry into a new era of improved efficiency, reliability, availability, and security, while contributing… (more)

Subjects/Keywords: Data mining; Graph Theory; Spanning trees; Steiner tree; wind farm collector system; wind power integration; coordination of wind power with energy storage; energy storage sizing; wind power forecasting; pattern identification; data volume reduction; power system visualization; spark-lines; Smart Grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dutta, S. (2013). Data mining and graph theory focused solutions to Smart Grid challenges. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/42195

Chicago Manual of Style (16th Edition):

Dutta, Sudipta. “Data mining and graph theory focused solutions to Smart Grid challenges.” 2013. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/42195.

MLA Handbook (7th Edition):

Dutta, Sudipta. “Data mining and graph theory focused solutions to Smart Grid challenges.” 2013. Web. 23 Nov 2020.

Vancouver:

Dutta S. Data mining and graph theory focused solutions to Smart Grid challenges. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2013. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/42195.

Council of Science Editors:

Dutta S. Data mining and graph theory focused solutions to Smart Grid challenges. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/42195


University of Illinois – Urbana-Champaign

30. Okhravi, Hamed. Trusted and high assurance systems.

Degree: PhD, 1200, 2010, University of Illinois – Urbana-Champaign

 High assurance MILS (multiple independent levels of security) and MLS (multilevel security) systems require strict limitation of the interactions between different security compartments based on… (more)

Subjects/Keywords: Trusted systems; High assurance systems; Multilevel security (MLS); Virtualization; Trusted boot; Trusted networks; Patch management; Trusted graphics; Formal methods

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okhravi, H. (2010). Trusted and high assurance systems. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16020

Chicago Manual of Style (16th Edition):

Okhravi, Hamed. “Trusted and high assurance systems.” 2010. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 23, 2020. http://hdl.handle.net/2142/16020.

MLA Handbook (7th Edition):

Okhravi, Hamed. “Trusted and high assurance systems.” 2010. Web. 23 Nov 2020.

Vancouver:

Okhravi H. Trusted and high assurance systems. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2010. [cited 2020 Nov 23]. Available from: http://hdl.handle.net/2142/16020.

Council of Science Editors:

Okhravi H. Trusted and high assurance systems. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16020

[1] [2]

.