Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of New Orleans" +contributor:("Roussev, Vassil"). Showing records 1 – 30 of 32 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of New Orleans

1. Horton, Brian. Software Renovation: An In-house Perspective with Case Studies.

Degree: MS, Computer Science, 2010, University of New Orleans

  Programs are not only a tool for the simplification or automation of everyday tasks; they also represent a significant time and money investment. A… (more)

Subjects/Keywords: Methodologies; Code Design; Programming Paradigms; Maintenance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Horton, B. (2010). Software Renovation: An In-house Perspective with Case Studies. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Horton, Brian. “Software Renovation: An In-house Perspective with Case Studies.” 2010. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Horton, Brian. “Software Renovation: An In-house Perspective with Case Studies.” 2010. Web. 08 Dec 2019.

Vancouver:

Horton B. Software Renovation: An In-house Perspective with Case Studies. [Internet] [Thesis]. University of New Orleans; 2010. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Horton B. Software Renovation: An In-house Perspective with Case Studies. [Thesis]. University of New Orleans; 2010. Available from: https://scholarworks.uno.edu/td/112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

2. Sajja, Abhilash. Forensic Reconstruction of Fragmented Variable Bitrate MP3 files.

Degree: MS, Computer Science, 2010, University of New Orleans

 File carving is a technique used to recover data from a digital device without the help of file system metadata. The current file carvers use… (more)

Subjects/Keywords: Data; Compression

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sajja, A. (2010). Forensic Reconstruction of Fragmented Variable Bitrate MP3 files. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1258

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sajja, Abhilash. “Forensic Reconstruction of Fragmented Variable Bitrate MP3 files.” 2010. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1258.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sajja, Abhilash. “Forensic Reconstruction of Fragmented Variable Bitrate MP3 files.” 2010. Web. 08 Dec 2019.

Vancouver:

Sajja A. Forensic Reconstruction of Fragmented Variable Bitrate MP3 files. [Internet] [Thesis]. University of New Orleans; 2010. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1258.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sajja A. Forensic Reconstruction of Fragmented Variable Bitrate MP3 files. [Thesis]. University of New Orleans; 2010. Available from: https://scholarworks.uno.edu/td/1258

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

3. Tuladhar, Punnya. Nonattribution Properties of JPEG Quantization Tables.

Degree: MS, Computer Science, 2010, University of New Orleans

 In digital forensics, source camera identification of digital images has drawn attention in recent years. An image does contain information of its camera and/or editing… (more)

Subjects/Keywords: identification of camera; huffman table; quantization table; jpeg exif data; correlation of camera and quantization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tuladhar, P. (2010). Nonattribution Properties of JPEG Quantization Tables. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tuladhar, Punnya. “Nonattribution Properties of JPEG Quantization Tables.” 2010. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tuladhar, Punnya. “Nonattribution Properties of JPEG Quantization Tables.” 2010. Web. 08 Dec 2019.

Vancouver:

Tuladhar P. Nonattribution Properties of JPEG Quantization Tables. [Internet] [Thesis]. University of New Orleans; 2010. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1261.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tuladhar P. Nonattribution Properties of JPEG Quantization Tables. [Thesis]. University of New Orleans; 2010. Available from: https://scholarworks.uno.edu/td/1261

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

4. Case, Andrew. Detecting Objective-C Malware through Memory Forensics.

Degree: MS, Computer Science, 2016, University of New Orleans

  Memory forensics is increasingly used to detect and analyze sophisticated malware. In the last decade, major advances in memory forensics have made analysis of… (more)

Subjects/Keywords: Memory Forensics; Objective-C; Malware Analysis; Incident Response; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Case, A. (2016). Detecting Objective-C Malware through Memory Forensics. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Case, Andrew. “Detecting Objective-C Malware through Memory Forensics.” 2016. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/2132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Case, Andrew. “Detecting Objective-C Malware through Memory Forensics.” 2016. Web. 08 Dec 2019.

Vancouver:

Case A. Detecting Objective-C Malware through Memory Forensics. [Internet] [Thesis]. University of New Orleans; 2016. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/2132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Case A. Detecting Objective-C Malware through Memory Forensics. [Thesis]. University of New Orleans; 2016. Available from: https://scholarworks.uno.edu/td/2132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

5. gorbov, sergey. Practical Application of Fast Disk Analysis for Selective Data Acquisition.

Degree: MS, Computer Science, 2016, University of New Orleans

  Using a forensic imager to produce a copy of the storage is a common practice. Due to the large volumes of the modern disks,… (more)

Subjects/Keywords: Digital forensics, selective imaging, partial image, fast disk analysis, statistical disk analysis, fast imaging, concurrent imager, bitmap walking; Information Security; Other Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

gorbov, s. (2016). Practical Application of Fast Disk Analysis for Selective Data Acquisition. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2230

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

gorbov, sergey. “Practical Application of Fast Disk Analysis for Selective Data Acquisition.” 2016. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/2230.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

gorbov, sergey. “Practical Application of Fast Disk Analysis for Selective Data Acquisition.” 2016. Web. 08 Dec 2019.

Vancouver:

gorbov s. Practical Application of Fast Disk Analysis for Selective Data Acquisition. [Internet] [Thesis]. University of New Orleans; 2016. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/2230.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

gorbov s. Practical Application of Fast Disk Analysis for Selective Data Acquisition. [Thesis]. University of New Orleans; 2016. Available from: https://scholarworks.uno.edu/td/2230

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

6. McCulley, Shane. Forensic Analysis of G Suite Collaborative Protocols.

Degree: MS, Computer Science, 2017, University of New Orleans

  Widespread adoption of cloud services is fundamentally changing the way IT services are delivered and how data is stored. Current forensic tools and techniques… (more)

Subjects/Keywords: cloud forensics, G Suite, reverse engineering, cloud-native artifacts, kumodocs; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McCulley, S. (2017). Forensic Analysis of G Suite Collaborative Protocols. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2386

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McCulley, Shane. “Forensic Analysis of G Suite Collaborative Protocols.” 2017. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/2386.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McCulley, Shane. “Forensic Analysis of G Suite Collaborative Protocols.” 2017. Web. 08 Dec 2019.

Vancouver:

McCulley S. Forensic Analysis of G Suite Collaborative Protocols. [Internet] [Thesis]. University of New Orleans; 2017. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/2386.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McCulley S. Forensic Analysis of G Suite Collaborative Protocols. [Thesis]. University of New Orleans; 2017. Available from: https://scholarworks.uno.edu/td/2386

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

7. kalle, Sushma. Semantic-aware Stealthy Control Logic Infection Attack.

Degree: MS, Computer Science, 2018, University of New Orleans

  In this thesis work we present CLIK, a new, automated, remote attack on the control logic of a programmable logic controller (PLC) in industrial… (more)

Subjects/Keywords: Programmable Logic Controller, Instruction List, Decompiler, Industrial Control System, Digital Forensics, Cyberattack; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

kalle, S. (2018). Semantic-aware Stealthy Control Logic Infection Attack. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

kalle, Sushma. “Semantic-aware Stealthy Control Logic Infection Attack.” 2018. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/2512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

kalle, Sushma. “Semantic-aware Stealthy Control Logic Infection Attack.” 2018. Web. 08 Dec 2019.

Vancouver:

kalle S. Semantic-aware Stealthy Control Logic Infection Attack. [Internet] [Thesis]. University of New Orleans; 2018. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/2512.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

kalle S. Semantic-aware Stealthy Control Logic Infection Attack. [Thesis]. University of New Orleans; 2018. Available from: https://scholarworks.uno.edu/td/2512

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

8. Oh, Se Hun. High-Level Test-Driven Learning Using Web Application and Web Service.

Degree: MS, Computer Science, 2010, University of New Orleans

 In order to introduce learning cases with real-world contexts to the Computer Science students in their early stage of learning, a set of Web applications… (more)

Subjects/Keywords: High-level test-driven learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oh, S. H. (2010). High-Level Test-Driven Learning Using Web Application and Web Service. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1124

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Oh, Se Hun. “High-Level Test-Driven Learning Using Web Application and Web Service.” 2010. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1124.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Oh, Se Hun. “High-Level Test-Driven Learning Using Web Application and Web Service.” 2010. Web. 08 Dec 2019.

Vancouver:

Oh SH. High-Level Test-Driven Learning Using Web Application and Web Service. [Internet] [Thesis]. University of New Orleans; 2010. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1124.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Oh SH. High-Level Test-Driven Learning Using Web Application and Web Service. [Thesis]. University of New Orleans; 2010. Available from: https://scholarworks.uno.edu/td/1124

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

9. Ali-Gombe, Aisha Ibrahim. Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications.

Degree: PhD, Computer Science, 2017, University of New Orleans

  The rapid increase in mobile malware and deployment of over-privileged applications over the years has been of great concern to the security community. Encroaching… (more)

Subjects/Keywords: Android, Malware Analysis, Fingerprinting; Hybrid Analysis; Instrumentation; AspectJ; Similarity Matching; Privacy; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ali-Gombe, A. I. (2017). Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications. (Doctoral Dissertation). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/2290

Chicago Manual of Style (16th Edition):

Ali-Gombe, Aisha Ibrahim. “Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications.” 2017. Doctoral Dissertation, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/2290.

MLA Handbook (7th Edition):

Ali-Gombe, Aisha Ibrahim. “Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications.” 2017. Web. 08 Dec 2019.

Vancouver:

Ali-Gombe AI. Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications. [Internet] [Doctoral dissertation]. University of New Orleans; 2017. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/2290.

Council of Science Editors:

Ali-Gombe AI. Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications. [Doctoral Dissertation]. University of New Orleans; 2017. Available from: https://scholarworks.uno.edu/td/2290

10. Barone, Joshua M. Automated Timeline Anomaly Detection.

Degree: MS, Computer Science, 2013, University of New Orleans

  Digital forensics is the practice of trained investigators gathering and analyzing evidence from digital devices such as computers and smart phones. On these digital… (more)

Subjects/Keywords: Timeline; Anomaly; Forensics; Digital Forensics; Computer Forensics; Other Computer Sciences

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barone, J. M. (2013). Automated Timeline Anomaly Detection. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barone, Joshua M. “Automated Timeline Anomaly Detection.” 2013. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barone, Joshua M. “Automated Timeline Anomaly Detection.” 2013. Web. 08 Dec 2019.

Vancouver:

Barone JM. Automated Timeline Anomaly Detection. [Internet] [Thesis]. University of New Orleans; 2013. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1609.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barone JM. Automated Timeline Anomaly Detection. [Thesis]. University of New Orleans; 2013. Available from: https://scholarworks.uno.edu/td/1609

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Stormo, Jeremy M. Analysis of Windows 8 Registry Artifacts.

Degree: MS, Computer Science, 2013, University of New Orleans

  Microsoft’s series of Windows operating systems represents some of the most commonly encountered technologies in the field of digital forensics. It is then fair… (more)

Subjects/Keywords: Windows 8; Forensics; Registry; Other Computer Sciences

…Science. In 2011, Jeremy entered the University of New Orleans Computer Science graduate program… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stormo, J. M. (2013). Analysis of Windows 8 Registry Artifacts. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1779

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stormo, Jeremy M. “Analysis of Windows 8 Registry Artifacts.” 2013. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1779.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stormo, Jeremy M. “Analysis of Windows 8 Registry Artifacts.” 2013. Web. 08 Dec 2019.

Vancouver:

Stormo JM. Analysis of Windows 8 Registry Artifacts. [Internet] [Thesis]. University of New Orleans; 2013. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1779.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stormo JM. Analysis of Windows 8 Registry Artifacts. [Thesis]. University of New Orleans; 2013. Available from: https://scholarworks.uno.edu/td/1779

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

12. Tingstrom, Daniel. Cheetah: An Economical Distributed RAM Drive.

Degree: MS, Computer Science, 2006, University of New Orleans

 Current hard drive technology shows a widening gap between the ability to store vast amounts of data and the ability to process. To overcome the… (more)

Subjects/Keywords: Digital forensics; File carving; Data storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tingstrom, D. (2006). Cheetah: An Economical Distributed RAM Drive. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tingstrom, Daniel. “Cheetah: An Economical Distributed RAM Drive.” 2006. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tingstrom, Daniel. “Cheetah: An Economical Distributed RAM Drive.” 2006. Web. 08 Dec 2019.

Vancouver:

Tingstrom D. Cheetah: An Economical Distributed RAM Drive. [Internet] [Thesis]. University of New Orleans; 2006. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tingstrom D. Cheetah: An Economical Distributed RAM Drive. [Thesis]. University of New Orleans; 2006. Available from: https://scholarworks.uno.edu/td/323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

13. Sharma, Seema. Location Based Authentication.

Degree: MS, Computer Science, 2005, University of New Orleans

 With the growth of wireless technologies in sectors like the military, aviation, etc, there is a need to determine the authenticity of a genuine user.… (more)

Subjects/Keywords: Authentication; Use of strong authentication; Authentication factors; Location based authentication; Benefits of location based authentication; Drawbacks of location based authentication; Security in wireless systems; Travel plan puzzle

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharma, S. (2005). Location Based Authentication. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/141

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sharma, Seema. “Location Based Authentication.” 2005. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/141.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sharma, Seema. “Location Based Authentication.” 2005. Web. 08 Dec 2019.

Vancouver:

Sharma S. Location Based Authentication. [Internet] [Thesis]. University of New Orleans; 2005. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/141.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sharma S. Location Based Authentication. [Thesis]. University of New Orleans; 2005. Available from: https://scholarworks.uno.edu/td/141

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

14. Ruth, Michael. Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services.

Degree: MS, Computer Science, 2005, University of New Orleans

 Single-Request/Multiple-Response (SRMR) is an important messaging exchange pattern because it can be used to model many real world problems elegantly. However, SRMR messaging is not… (more)

Subjects/Keywords: Enterprise network security; Web services; Message exchange pattern; Callback; Clearinghouse; Framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ruth, M. (2005). Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ruth, Michael. “Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services.” 2005. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ruth, Michael. “Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services.” 2005. Web. 08 Dec 2019.

Vancouver:

Ruth M. Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services. [Internet] [Thesis]. University of New Orleans; 2005. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ruth M. Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services. [Thesis]. University of New Orleans; 2005. Available from: https://scholarworks.uno.edu/td/244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

15. Mandelecha, Sonal. Prototype Digital Forensics Repository.

Degree: MS, Computer Science, 2005, University of New Orleans

 The explosive growth in technology has led to a new league of a crime involving identity theft, stealing trade secrets, malicious virus attacks, hacking of… (more)

Subjects/Keywords: Digital Forensics Repository; ASP.NET; C#

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mandelecha, S. (2005). Prototype Digital Forensics Repository. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/292

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mandelecha, Sonal. “Prototype Digital Forensics Repository.” 2005. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/292.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mandelecha, Sonal. “Prototype Digital Forensics Repository.” 2005. Web. 08 Dec 2019.

Vancouver:

Mandelecha S. Prototype Digital Forensics Repository. [Internet] [Thesis]. University of New Orleans; 2005. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/292.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mandelecha S. Prototype Digital Forensics Repository. [Thesis]. University of New Orleans; 2005. Available from: https://scholarworks.uno.edu/td/292

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

16. Bourg, Rachel. Bloom Filters for Filesystem Forensics.

Degree: MS, Computer Science, 2006, University of New Orleans

 Digital forensics investigations become more time consuming as the amount of data to be investigated grows. Secular growth trends between hard drive and memory capacity… (more)

Subjects/Keywords: Computer crimes investigation; Forensic sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bourg, R. (2006). Bloom Filters for Filesystem Forensics. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1288

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bourg, Rachel. “Bloom Filters for Filesystem Forensics.” 2006. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1288.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bourg, Rachel. “Bloom Filters for Filesystem Forensics.” 2006. Web. 08 Dec 2019.

Vancouver:

Bourg R. Bloom Filters for Filesystem Forensics. [Internet] [Thesis]. University of New Orleans; 2006. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1288.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bourg R. Bloom Filters for Filesystem Forensics. [Thesis]. University of New Orleans; 2006. Available from: https://scholarworks.uno.edu/td/1288

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

17. Chikhi, Yacine. Reducing the Hot Spot Effect in Wireless Sensor Networks with the Use of Mobile Data Sink.

Degree: MS, Computer Science, 2006, University of New Orleans

 The Hot Spot effect is an issue that reduces the network lifetime considerably. The network on the field forms a tree structure in which the… (more)

Subjects/Keywords: Normalizing energy consumption; Extension network lifetime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chikhi, Y. (2006). Reducing the Hot Spot Effect in Wireless Sensor Networks with the Use of Mobile Data Sink. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/365

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chikhi, Yacine. “Reducing the Hot Spot Effect in Wireless Sensor Networks with the Use of Mobile Data Sink.” 2006. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/365.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chikhi, Yacine. “Reducing the Hot Spot Effect in Wireless Sensor Networks with the Use of Mobile Data Sink.” 2006. Web. 08 Dec 2019.

Vancouver:

Chikhi Y. Reducing the Hot Spot Effect in Wireless Sensor Networks with the Use of Mobile Data Sink. [Internet] [Thesis]. University of New Orleans; 2006. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/365.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chikhi Y. Reducing the Hot Spot Effect in Wireless Sensor Networks with the Use of Mobile Data Sink. [Thesis]. University of New Orleans; 2006. Available from: https://scholarworks.uno.edu/td/365

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

18. Mishra, Sanjeeb. Keyword Indexing and Searching for Large Forensics Targets using Distributed Computing.

Degree: MS, Computer Science, 2007, University of New Orleans

 When computer forensics investigation is carried out on single workstations and the forensics image in hand is of terabytes of length, indexing of keywords takes… (more)

Subjects/Keywords: computers; forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mishra, S. (2007). Keyword Indexing and Searching for Large Forensics Targets using Distributed Computing. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/510

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mishra, Sanjeeb. “Keyword Indexing and Searching for Large Forensics Targets using Distributed Computing.” 2007. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/510.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mishra, Sanjeeb. “Keyword Indexing and Searching for Large Forensics Targets using Distributed Computing.” 2007. Web. 08 Dec 2019.

Vancouver:

Mishra S. Keyword Indexing and Searching for Large Forensics Targets using Distributed Computing. [Internet] [Thesis]. University of New Orleans; 2007. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/510.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mishra S. Keyword Indexing and Searching for Large Forensics Targets using Distributed Computing. [Thesis]. University of New Orleans; 2007. Available from: https://scholarworks.uno.edu/td/510

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

19. Flowers, Paul. Enhancing Crowds to Support Truly Anonymous FTP Transactions.

Degree: MS, Computer Science, 2007, University of New Orleans

 Ensuring privacy on the Internet is one of the most daunting challenges that we presently face. Crowds is the implementation of an approach to provide… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flowers, P. (2007). Enhancing Crowds to Support Truly Anonymous FTP Transactions. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/530

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Flowers, Paul. “Enhancing Crowds to Support Truly Anonymous FTP Transactions.” 2007. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/530.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Flowers, Paul. “Enhancing Crowds to Support Truly Anonymous FTP Transactions.” 2007. Web. 08 Dec 2019.

Vancouver:

Flowers P. Enhancing Crowds to Support Truly Anonymous FTP Transactions. [Internet] [Thesis]. University of New Orleans; 2007. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/530.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Flowers P. Enhancing Crowds to Support Truly Anonymous FTP Transactions. [Thesis]. University of New Orleans; 2007. Available from: https://scholarworks.uno.edu/td/530

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

20. Pedda Reddy, Swaroop Kumar. Steganalysis Techniques: A Comparative Study.

Degree: MS, Computer Science, 2007, University of New Orleans

 Steganography is the art of hiding information within cover objects like images or audio/video files. It has been widely reported that there has been a… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pedda Reddy, S. K. (2007). Steganalysis Techniques: A Comparative Study. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/562

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pedda Reddy, Swaroop Kumar. “Steganalysis Techniques: A Comparative Study.” 2007. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/562.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pedda Reddy, Swaroop Kumar. “Steganalysis Techniques: A Comparative Study.” 2007. Web. 08 Dec 2019.

Vancouver:

Pedda Reddy SK. Steganalysis Techniques: A Comparative Study. [Internet] [Thesis]. University of New Orleans; 2007. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/562.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pedda Reddy SK. Steganalysis Techniques: A Comparative Study. [Thesis]. University of New Orleans; 2007. Available from: https://scholarworks.uno.edu/td/562

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

21. Ruth, Michael Edward. Automating Regression Test Selection for Web Services.

Degree: PhD, Computer Science, 2007, University of New Orleans

 As Web services grow in maturity and use, so do the methods which are being used to test and maintain them. Regression Testing is a… (more)

Subjects/Keywords: Regression Testing; Regression Test Selection; Safe Regression Test Selection; Web services; Concurrency; Coverage Conflict; Test Inconsistency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ruth, M. E. (2007). Automating Regression Test Selection for Web Services. (Doctoral Dissertation). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/587

Chicago Manual of Style (16th Edition):

Ruth, Michael Edward. “Automating Regression Test Selection for Web Services.” 2007. Doctoral Dissertation, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/587.

MLA Handbook (7th Edition):

Ruth, Michael Edward. “Automating Regression Test Selection for Web Services.” 2007. Web. 08 Dec 2019.

Vancouver:

Ruth ME. Automating Regression Test Selection for Web Services. [Internet] [Doctoral dissertation]. University of New Orleans; 2007. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/587.

Council of Science Editors:

Ruth ME. Automating Regression Test Selection for Web Services. [Doctoral Dissertation]. University of New Orleans; 2007. Available from: https://scholarworks.uno.edu/td/587


University of New Orleans

22. Vogt, Aline. Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System.

Degree: MS, Computer Science, 2007, University of New Orleans

 The need for a robust system architecture to support software development is well known. In enterprise software development, this must be realized in a multi-tier… (more)

Subjects/Keywords: System Architecture; Software Modeling; Enterprise Software Development; J2EE System Design; Grid-partitioning software models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vogt, A. (2007). Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/593

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vogt, Aline. “Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System.” 2007. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/593.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vogt, Aline. “Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System.” 2007. Web. 08 Dec 2019.

Vancouver:

Vogt A. Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System. [Internet] [Thesis]. University of New Orleans; 2007. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/593.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vogt A. Applying Grid-Partitioning To The Architecture of the Disaster Response Mitigation (DISarm) System. [Thesis]. University of New Orleans; 2007. Available from: https://scholarworks.uno.edu/td/593

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

23. Wu, Jingqi. Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection.

Degree: MS, Computer Science, 2008, University of New Orleans

 Generally, collisions between packets are undesired in wireless networks. We design this scheme, Cooperative Jamming in Wireless Networks (CJWN), to make use of collision to… (more)

Subjects/Keywords: Wireless Communication; Propagation Model; 802.11b; MAC; CSMA/CA; CJWN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, J. (2008). Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/885

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Jingqi. “Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection.” 2008. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/885.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Jingqi. “Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection.” 2008. Web. 08 Dec 2019.

Vancouver:

Wu J. Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection. [Internet] [Thesis]. University of New Orleans; 2008. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/885.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu J. Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection. [Thesis]. University of New Orleans; 2008. Available from: https://scholarworks.uno.edu/td/885

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

24. Dillon, Patrice. Taintx: A System for Protecting Sensitive Documents.

Degree: MS, Computer Science, 2009, University of New Orleans

 Across the country members of the workforce are being laid off due to downsizing. Most of those people work for large corporations and have access… (more)

Subjects/Keywords: Linux; Linux Kernel; System Call; Scheduler; Process ID (PID); Inode; File System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dillon, P. (2009). Taintx: A System for Protecting Sensitive Documents. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/976

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dillon, Patrice. “Taintx: A System for Protecting Sensitive Documents.” 2009. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/976.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dillon, Patrice. “Taintx: A System for Protecting Sensitive Documents.” 2009. Web. 08 Dec 2019.

Vancouver:

Dillon P. Taintx: A System for Protecting Sensitive Documents. [Internet] [Thesis]. University of New Orleans; 2009. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/976.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dillon P. Taintx: A System for Protecting Sensitive Documents. [Thesis]. University of New Orleans; 2009. Available from: https://scholarworks.uno.edu/td/976

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

25. Marks, David. An Analysis of netCDF-FastBit Integration and Primitive Spatial-Temporal Operations.

Degree: MS, Computer Science, 2009, University of New Orleans

 A process allowing for the intuitive use of SQL queries on dense multidimensional data stored in Network Common Data Format (netCDF) files is developed using… (more)

Subjects/Keywords: netCDF; FastBit; geospatial operations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marks, D. (2009). An Analysis of netCDF-FastBit Integration and Primitive Spatial-Temporal Operations. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/984

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marks, David. “An Analysis of netCDF-FastBit Integration and Primitive Spatial-Temporal Operations.” 2009. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/984.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marks, David. “An Analysis of netCDF-FastBit Integration and Primitive Spatial-Temporal Operations.” 2009. Web. 08 Dec 2019.

Vancouver:

Marks D. An Analysis of netCDF-FastBit Integration and Primitive Spatial-Temporal Operations. [Internet] [Thesis]. University of New Orleans; 2009. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/984.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marks D. An Analysis of netCDF-FastBit Integration and Primitive Spatial-Temporal Operations. [Thesis]. University of New Orleans; 2009. Available from: https://scholarworks.uno.edu/td/984

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

26. Marziale, Lodovico. Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations.

Degree: PhD, Computer Science, 2009, University of New Orleans

 Digital forensics is the science concerned with discovering, preserving, and analyzing evidence on digital devices. The intent is to be able to determine what events… (more)

Subjects/Keywords: Computer Forensics; Digital Forensics; Digital Investigation; File Carving; Live Forensics; RAM Forensics; Forensic Discovery; Forensic Discovery Auditing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marziale, L. (2009). Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations. (Doctoral Dissertation). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1027

Chicago Manual of Style (16th Edition):

Marziale, Lodovico. “Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations.” 2009. Doctoral Dissertation, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1027.

MLA Handbook (7th Edition):

Marziale, Lodovico. “Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations.” 2009. Web. 08 Dec 2019.

Vancouver:

Marziale L. Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations. [Internet] [Doctoral dissertation]. University of New Orleans; 2009. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1027.

Council of Science Editors:

Marziale L. Advanced Techniques for Improving the Efficacy of Digital Forensics Investigations. [Doctoral Dissertation]. University of New Orleans; 2009. Available from: https://scholarworks.uno.edu/td/1027


University of New Orleans

27. Liu, Kejun. Detecting Routing Misbehavior In Mobile Ad Hoc Network.

Degree: MS, Computer Science, 2006, University of New Orleans

 Routing misbehavior in MANETs (Mobile Ad Hoc Networks) is studied in this thesis. In general, routing protocols for MANETs are designed based on the assumption… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, K. (2006). Detecting Routing Misbehavior In Mobile Ad Hoc Network. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1046

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Kejun. “Detecting Routing Misbehavior In Mobile Ad Hoc Network.” 2006. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1046.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Kejun. “Detecting Routing Misbehavior In Mobile Ad Hoc Network.” 2006. Web. 08 Dec 2019.

Vancouver:

Liu K. Detecting Routing Misbehavior In Mobile Ad Hoc Network. [Internet] [Thesis]. University of New Orleans; 2006. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1046.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu K. Detecting Routing Misbehavior In Mobile Ad Hoc Network. [Thesis]. University of New Orleans; 2006. Available from: https://scholarworks.uno.edu/td/1046

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

28. Liu, Fangfang. An ontology-based approach to Automatic Generation of GUI for Data Entry.

Degree: MS, Computer Science, 2009, University of New Orleans

 This thesis reports an ontology-based approach to automatic generation of highly tailored GUI components that can make customized data requests for the end users. Using… (more)

Subjects/Keywords: Ontology; Graphic user interface; OWL/RDF; Jena

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, F. (2009). An ontology-based approach to Automatic Generation of GUI for Data Entry. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Fangfang. “An ontology-based approach to Automatic Generation of GUI for Data Entry.” 2009. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/1094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Fangfang. “An ontology-based approach to Automatic Generation of GUI for Data Entry.” 2009. Web. 08 Dec 2019.

Vancouver:

Liu F. An ontology-based approach to Automatic Generation of GUI for Data Entry. [Internet] [Thesis]. University of New Orleans; 2009. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/1094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu F. An ontology-based approach to Automatic Generation of GUI for Data Entry. [Thesis]. University of New Orleans; 2009. Available from: https://scholarworks.uno.edu/td/1094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

29. Roux, Brian. Reconstructing Textual File Fragments Using Unsupervised Machine Learning Techniques.

Degree: MS, Computer Science, 2008, University of New Orleans

 This work is an investigation into reconstructing fragmented ASCII files based on content analysis motivated by a desire to demonstrate machine learning's applicability to Digital… (more)

Subjects/Keywords: Machine Learning; File Carving; Fragmented Files; Support Vector Machines; SVM; Digital Forensics; Information Retrieval

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roux, B. (2008). Reconstructing Textual File Fragments Using Unsupervised Machine Learning Techniques. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Roux, Brian. “Reconstructing Textual File Fragments Using Unsupervised Machine Learning Techniques.” 2008. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Roux, Brian. “Reconstructing Textual File Fragments Using Unsupervised Machine Learning Techniques.” 2008. Web. 08 Dec 2019.

Vancouver:

Roux B. Reconstructing Textual File Fragments Using Unsupervised Machine Learning Techniques. [Internet] [Thesis]. University of New Orleans; 2008. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/881.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Roux B. Reconstructing Textual File Fragments Using Unsupervised Machine Learning Techniques. [Thesis]. University of New Orleans; 2008. Available from: https://scholarworks.uno.edu/td/881

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Orleans

30. Rosa, William Domingo. Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML).

Degree: MS, Computer Science, 2009, University of New Orleans

 The eXtensible Access Control Markup Language (XACML) is allowing enterprises to implement a standard way of access control to their resources. Security administrators no longer… (more)

Subjects/Keywords: XACML; OASIS; XML; DOM; XPath; Java; Derby

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rosa, W. D. (2009). Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML). (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/914

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rosa, William Domingo. “Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML).” 2009. Thesis, University of New Orleans. Accessed December 08, 2019. https://scholarworks.uno.edu/td/914.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rosa, William Domingo. “Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML).” 2009. Web. 08 Dec 2019.

Vancouver:

Rosa WD. Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML). [Internet] [Thesis]. University of New Orleans; 2009. [cited 2019 Dec 08]. Available from: https://scholarworks.uno.edu/td/914.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rosa WD. Toward Visualizing Potential Policy Conflicts in eXtensible Access Control Markup Language (XACML). [Thesis]. University of New Orleans; 2009. Available from: https://scholarworks.uno.edu/td/914

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.