Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Victoria University of Wellington" +contributor:("Welch, Ian"). Showing records 1 – 22 of 22 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Victoria University of Wellington

1. Emmanuel, Michael. Interconnection Impact Analysis of Solar Photovoltaic Systems with Distribution Networks.

Degree: 2018, Victoria University of Wellington

 As the solar PV technology continues to evolve as the most common distributed generation (DG) coupled with increasing interconnection requests, accurate modelling of the potential… (more)

Subjects/Keywords: Photovoltaic; Electric power system; Interconnection impact analysis; Distribution systems; Electric grid; Photovoltaic systems; Distribution; Grid engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Emmanuel, M. (2018). Interconnection Impact Analysis of Solar Photovoltaic Systems with Distribution Networks. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/7052

Chicago Manual of Style (16th Edition):

Emmanuel, Michael. “Interconnection Impact Analysis of Solar Photovoltaic Systems with Distribution Networks.” 2018. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/7052.

MLA Handbook (7th Edition):

Emmanuel, Michael. “Interconnection Impact Analysis of Solar Photovoltaic Systems with Distribution Networks.” 2018. Web. 15 Jan 2021.

Vancouver:

Emmanuel M. Interconnection Impact Analysis of Solar Photovoltaic Systems with Distribution Networks. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2018. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/7052.

Council of Science Editors:

Emmanuel M. Interconnection Impact Analysis of Solar Photovoltaic Systems with Distribution Networks. [Doctoral Dissertation]. Victoria University of Wellington; 2018. Available from: http://hdl.handle.net/10063/7052


Victoria University of Wellington

2. Kumar, Santosh. Transfer Learning for Dataset Shift in Classification and Clustering Problems.

Degree: 2017, Victoria University of Wellington

 This research focusses on the dataset shift problem in classification and clustering tasks. This thesis primarily aims to propose a domain-independent transfer learning based solution… (more)

Subjects/Keywords: Machine learning; Classification; Clustering; Dataset shift

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, S. (2017). Transfer Learning for Dataset Shift in Classification and Clustering Problems. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/6808

Chicago Manual of Style (16th Edition):

Kumar, Santosh. “Transfer Learning for Dataset Shift in Classification and Clustering Problems.” 2017. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/6808.

MLA Handbook (7th Edition):

Kumar, Santosh. “Transfer Learning for Dataset Shift in Classification and Clustering Problems.” 2017. Web. 15 Jan 2021.

Vancouver:

Kumar S. Transfer Learning for Dataset Shift in Classification and Clustering Problems. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2017. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/6808.

Council of Science Editors:

Kumar S. Transfer Learning for Dataset Shift in Classification and Clustering Problems. [Doctoral Dissertation]. Victoria University of Wellington; 2017. Available from: http://hdl.handle.net/10063/6808


Victoria University of Wellington

3. Mahmood, Muhammad. Event Reliability in Wireless Sensor Networks.

Degree: 2019, Victoria University of Wellington

 Ensuring reliable transport of data in resource-constrained Wireless Sensor Networks (WSNs) is one of the primary concerns to achieve a high degree of efficiency in… (more)

Subjects/Keywords: Wireless Sensor Networks; Reliability; Event identification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahmood, M. (2019). Event Reliability in Wireless Sensor Networks. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/8105

Chicago Manual of Style (16th Edition):

Mahmood, Muhammad. “Event Reliability in Wireless Sensor Networks.” 2019. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/8105.

MLA Handbook (7th Edition):

Mahmood, Muhammad. “Event Reliability in Wireless Sensor Networks.” 2019. Web. 15 Jan 2021.

Vancouver:

Mahmood M. Event Reliability in Wireless Sensor Networks. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2019. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/8105.

Council of Science Editors:

Mahmood M. Event Reliability in Wireless Sensor Networks. [Doctoral Dissertation]. Victoria University of Wellington; 2019. Available from: http://hdl.handle.net/10063/8105


Victoria University of Wellington

4. Seifert, Christian. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.

Degree: 2010, Victoria University of Wellington

 With the increasing connectivity of and reliance on computers and networks, important aspects of computer systems are under a constant threat. In particular, drive-by-download attacks… (more)

Subjects/Keywords: Intrusion detection; Honeypots; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Seifert, C. (2010). Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1385

Chicago Manual of Style (16th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/1385.

MLA Handbook (7th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Web. 15 Jan 2021.

Vancouver:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2010. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/1385.

Council of Science Editors:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Doctoral Dissertation]. Victoria University of Wellington; 2010. Available from: http://hdl.handle.net/10063/1385


Victoria University of Wellington

5. Palmer, Benjamin Philip. Anonymously Establishing Digital Provenance in Reseller Chains.

Degree: 2012, Victoria University of Wellington

 An increasing number of products are exclusively digital items, such as media files, licenses, services, or subscriptions. In many cases customers do not purchase these… (more)

Subjects/Keywords: Provenance; e-Commerce; Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palmer, B. P. (2012). Anonymously Establishing Digital Provenance in Reseller Chains. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/2281

Chicago Manual of Style (16th Edition):

Palmer, Benjamin Philip. “Anonymously Establishing Digital Provenance in Reseller Chains.” 2012. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/2281.

MLA Handbook (7th Edition):

Palmer, Benjamin Philip. “Anonymously Establishing Digital Provenance in Reseller Chains.” 2012. Web. 15 Jan 2021.

Vancouver:

Palmer BP. Anonymously Establishing Digital Provenance in Reseller Chains. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2012. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/2281.

Council of Science Editors:

Palmer BP. Anonymously Establishing Digital Provenance in Reseller Chains. [Doctoral Dissertation]. Victoria University of Wellington; 2012. Available from: http://hdl.handle.net/10063/2281


Victoria University of Wellington

6. Nowitz, Jayden. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients.

Degree: 2018, Victoria University of Wellington

 Research on how to counter phishing from a user behavior perspective has been explored for over a decade, yet the prevalence of such threats is… (more)

Subjects/Keywords: Phishing; Mobile; Desktop

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nowitz, J. (2018). A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/7907

Chicago Manual of Style (16th Edition):

Nowitz, Jayden. “A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients.” 2018. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/7907.

MLA Handbook (7th Edition):

Nowitz, Jayden. “A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients.” 2018. Web. 15 Jan 2021.

Vancouver:

Nowitz J. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. [Internet] [Masters thesis]. Victoria University of Wellington; 2018. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/7907.

Council of Science Editors:

Nowitz J. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. [Masters Thesis]. Victoria University of Wellington; 2018. Available from: http://hdl.handle.net/10063/7907


Victoria University of Wellington

7. Shepherd, Deb. Developing the Fringe Routing Protocol.

Degree: 2011, Victoria University of Wellington

 An ISP style network often has a particular traffic pattern not typically seen in other networks and which is a direct result of the ISP’s… (more)

Subjects/Keywords: Computer networking; Routing; Fringe routing protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shepherd, D. (2011). Developing the Fringe Routing Protocol. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1981

Chicago Manual of Style (16th Edition):

Shepherd, Deb. “Developing the Fringe Routing Protocol.” 2011. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/1981.

MLA Handbook (7th Edition):

Shepherd, Deb. “Developing the Fringe Routing Protocol.” 2011. Web. 15 Jan 2021.

Vancouver:

Shepherd D. Developing the Fringe Routing Protocol. [Internet] [Masters thesis]. Victoria University of Wellington; 2011. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/1981.

Council of Science Editors:

Shepherd D. Developing the Fringe Routing Protocol. [Masters Thesis]. Victoria University of Wellington; 2011. Available from: http://hdl.handle.net/10063/1981


Victoria University of Wellington

8. Radford, Paul. Improving Salience Retention and Identification in the Automated Filtering of Event Log Messages.

Degree: 2011, Victoria University of Wellington

 Event log messages are currently the only genuine interface through which computer systems administrators can effectively monitor their systems and assemble a mental perception of… (more)

Subjects/Keywords: Salience; Messages; Filtering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Radford, P. (2011). Improving Salience Retention and Identification in the Automated Filtering of Event Log Messages. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/2077

Chicago Manual of Style (16th Edition):

Radford, Paul. “Improving Salience Retention and Identification in the Automated Filtering of Event Log Messages.” 2011. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/2077.

MLA Handbook (7th Edition):

Radford, Paul. “Improving Salience Retention and Identification in the Automated Filtering of Event Log Messages.” 2011. Web. 15 Jan 2021.

Vancouver:

Radford P. Improving Salience Retention and Identification in the Automated Filtering of Event Log Messages. [Internet] [Masters thesis]. Victoria University of Wellington; 2011. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/2077.

Council of Science Editors:

Radford P. Improving Salience Retention and Identification in the Automated Filtering of Event Log Messages. [Masters Thesis]. Victoria University of Wellington; 2011. Available from: http://hdl.handle.net/10063/2077


Victoria University of Wellington

9. Chard, Ryan. Reputation Description and Interpretation.

Degree: 2012, Victoria University of Wellington

 Reputation is an opinion held by others about a particular person, group, organisation, or resource. As a tool, reputation can be used to forecast the… (more)

Subjects/Keywords: Reputation exchange; Trust; OpenRep

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chard, R. (2012). Reputation Description and Interpretation. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/2303

Chicago Manual of Style (16th Edition):

Chard, Ryan. “Reputation Description and Interpretation.” 2012. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/2303.

MLA Handbook (7th Edition):

Chard, Ryan. “Reputation Description and Interpretation.” 2012. Web. 15 Jan 2021.

Vancouver:

Chard R. Reputation Description and Interpretation. [Internet] [Masters thesis]. Victoria University of Wellington; 2012. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/2303.

Council of Science Editors:

Chard R. Reputation Description and Interpretation. [Masters Thesis]. Victoria University of Wellington; 2012. Available from: http://hdl.handle.net/10063/2303


Victoria University of Wellington

10. Iqbal, Aun Haji. Development of Osix - A Peering Point in a Box.

Degree: 2013, Victoria University of Wellington

 Sending traffic over international communication links is much more expensive than sending traffic locally. Unfortunately, there are situations where two local networks end up using… (more)

Subjects/Keywords: Peering; Exchange; Routing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Iqbal, A. H. (2013). Development of Osix - A Peering Point in a Box. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/2699

Chicago Manual of Style (16th Edition):

Iqbal, Aun Haji. “Development of Osix - A Peering Point in a Box.” 2013. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/2699.

MLA Handbook (7th Edition):

Iqbal, Aun Haji. “Development of Osix - A Peering Point in a Box.” 2013. Web. 15 Jan 2021.

Vancouver:

Iqbal AH. Development of Osix - A Peering Point in a Box. [Internet] [Masters thesis]. Victoria University of Wellington; 2013. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/2699.

Council of Science Editors:

Iqbal AH. Development of Osix - A Peering Point in a Box. [Masters Thesis]. Victoria University of Wellington; 2013. Available from: http://hdl.handle.net/10063/2699


Victoria University of Wellington

11. Thomson, Wayne. GAF: A General Auction Framework for Secure Combinatorial Auctions.

Degree: 2013, Victoria University of Wellington

 Auctions are an economic mechanism for allocating goods to interested parties. There are many methods, each of which is an Auction Protocol. Some protocols are… (more)

Subjects/Keywords: Auction; Security; Framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thomson, W. (2013). GAF: A General Auction Framework for Secure Combinatorial Auctions. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/3247

Chicago Manual of Style (16th Edition):

Thomson, Wayne. “GAF: A General Auction Framework for Secure Combinatorial Auctions.” 2013. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/3247.

MLA Handbook (7th Edition):

Thomson, Wayne. “GAF: A General Auction Framework for Secure Combinatorial Auctions.” 2013. Web. 15 Jan 2021.

Vancouver:

Thomson W. GAF: A General Auction Framework for Secure Combinatorial Auctions. [Internet] [Masters thesis]. Victoria University of Wellington; 2013. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/3247.

Council of Science Editors:

Thomson W. GAF: A General Auction Framework for Secure Combinatorial Auctions. [Masters Thesis]. Victoria University of Wellington; 2013. Available from: http://hdl.handle.net/10063/3247


Victoria University of Wellington

12. Davenport, Hugh. Implementation and Evaluation of Security Protocols in E-Commerce Applications.

Degree: 2013, Victoria University of Wellington

 There are a large amount of programs in the development process in todays technology environment, and many of these involve some type of security needs.… (more)

Subjects/Keywords: Security; Evaluation; Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davenport, H. (2013). Implementation and Evaluation of Security Protocols in E-Commerce Applications. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/2631

Chicago Manual of Style (16th Edition):

Davenport, Hugh. “Implementation and Evaluation of Security Protocols in E-Commerce Applications.” 2013. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/2631.

MLA Handbook (7th Edition):

Davenport, Hugh. “Implementation and Evaluation of Security Protocols in E-Commerce Applications.” 2013. Web. 15 Jan 2021.

Vancouver:

Davenport H. Implementation and Evaluation of Security Protocols in E-Commerce Applications. [Internet] [Masters thesis]. Victoria University of Wellington; 2013. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/2631.

Council of Science Editors:

Davenport H. Implementation and Evaluation of Security Protocols in E-Commerce Applications. [Masters Thesis]. Victoria University of Wellington; 2013. Available from: http://hdl.handle.net/10063/2631


Victoria University of Wellington

13. Yang, Kaishuo. Reverse Engineering of an Obfuscated Binary.

Degree: 2020, Victoria University of Wellington

 Reverse engineering is an important process employed by both attackers seeking to gain entry to a system as well as the security engineers that protect… (more)

Subjects/Keywords: reverse engineering; disassembly; memory analysis; reverse engineering in games

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, K. (2020). Reverse Engineering of an Obfuscated Binary. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/9244

Chicago Manual of Style (16th Edition):

Yang, Kaishuo. “Reverse Engineering of an Obfuscated Binary.” 2020. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/9244.

MLA Handbook (7th Edition):

Yang, Kaishuo. “Reverse Engineering of an Obfuscated Binary.” 2020. Web. 15 Jan 2021.

Vancouver:

Yang K. Reverse Engineering of an Obfuscated Binary. [Internet] [Masters thesis]. Victoria University of Wellington; 2020. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/9244.

Council of Science Editors:

Yang K. Reverse Engineering of an Obfuscated Binary. [Masters Thesis]. Victoria University of Wellington; 2020. Available from: http://hdl.handle.net/10063/9244


Victoria University of Wellington

14. Truong, Huu Trung. Software-Defined Network Application for Inter-domain Routing in Transit ISPs.

Degree: 2020, Victoria University of Wellington

 Today, the Internet plays an vital part in our society. We rely greatly on the Internet to work, to communicate and to entertain. The Internet… (more)

Subjects/Keywords: SDN; Interdomain; ISP; Routing; BGP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Truong, H. T. (2020). Software-Defined Network Application for Inter-domain Routing in Transit ISPs. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/9150

Chicago Manual of Style (16th Edition):

Truong, Huu Trung. “Software-Defined Network Application for Inter-domain Routing in Transit ISPs.” 2020. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/9150.

MLA Handbook (7th Edition):

Truong, Huu Trung. “Software-Defined Network Application for Inter-domain Routing in Transit ISPs.” 2020. Web. 15 Jan 2021.

Vancouver:

Truong HT. Software-Defined Network Application for Inter-domain Routing in Transit ISPs. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2020. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/9150.

Council of Science Editors:

Truong HT. Software-Defined Network Application for Inter-domain Routing in Transit ISPs. [Doctoral Dissertation]. Victoria University of Wellington; 2020. Available from: http://hdl.handle.net/10063/9150


Victoria University of Wellington

15. Tariq, Hassan. Resource and Performance Modelling of Hadoop Clusters Using Machine Learning.

Degree: 2020, Victoria University of Wellington

 There is a huge and rapidly increasing amount of data being generated by social media, mobile applications and sensing devices. Big data is the term… (more)

Subjects/Keywords: Modelling and prediction; Performance; Hadoop Clusters; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tariq, H. (2020). Resource and Performance Modelling of Hadoop Clusters Using Machine Learning. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/8958

Chicago Manual of Style (16th Edition):

Tariq, Hassan. “Resource and Performance Modelling of Hadoop Clusters Using Machine Learning.” 2020. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/8958.

MLA Handbook (7th Edition):

Tariq, Hassan. “Resource and Performance Modelling of Hadoop Clusters Using Machine Learning.” 2020. Web. 15 Jan 2021.

Vancouver:

Tariq H. Resource and Performance Modelling of Hadoop Clusters Using Machine Learning. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2020. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/8958.

Council of Science Editors:

Tariq H. Resource and Performance Modelling of Hadoop Clusters Using Machine Learning. [Doctoral Dissertation]. Victoria University of Wellington; 2020. Available from: http://hdl.handle.net/10063/8958


Victoria University of Wellington

16. Stevens, Matt. Applying Formal Modelling to the Specification and Testing of SDN Network Functionality.

Degree: 2016, Victoria University of Wellington

 Software Defined Networks offers a new paradigm to manage networks, one that favors centralised control over the distributed control used in legacy networks. This brings… (more)

Subjects/Keywords: Formal methods; SDN; Firewall; Security; Architecture; Model based testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stevens, M. (2016). Applying Formal Modelling to the Specification and Testing of SDN Network Functionality. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/6179

Chicago Manual of Style (16th Edition):

Stevens, Matt. “Applying Formal Modelling to the Specification and Testing of SDN Network Functionality.” 2016. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/6179.

MLA Handbook (7th Edition):

Stevens, Matt. “Applying Formal Modelling to the Specification and Testing of SDN Network Functionality.” 2016. Web. 15 Jan 2021.

Vancouver:

Stevens M. Applying Formal Modelling to the Specification and Testing of SDN Network Functionality. [Internet] [Masters thesis]. Victoria University of Wellington; 2016. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/6179.

Council of Science Editors:

Stevens M. Applying Formal Modelling to the Specification and Testing of SDN Network Functionality. [Masters Thesis]. Victoria University of Wellington; 2016. Available from: http://hdl.handle.net/10063/6179

17. Mansoori, Masood. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.

Degree: 2017, Victoria University of Wellington

 Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit… (more)

Subjects/Keywords: Geolocation Attacks; HAZOP; Client Honeypots; Browser Based Attacks; IP Tracking; Browser Exploit Kits; YALIH; Localized Attacks; Targeted attacks; Honeypots; Honey clients; Hazard and Operability

…locate a user . 33 3.2 HTTP header information of a client at Victoria university of… …Wellington, captured by a remote server . . . . . . . . . . . . . 40 Locale settings detected by… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mansoori, M. (2017). Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/6567

Chicago Manual of Style (16th Edition):

Mansoori, Masood. “Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.” 2017. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/6567.

MLA Handbook (7th Edition):

Mansoori, Masood. “Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.” 2017. Web. 15 Jan 2021.

Vancouver:

Mansoori M. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2017. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/6567.

Council of Science Editors:

Mansoori M. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. [Doctoral Dissertation]. Victoria University of Wellington; 2017. Available from: http://hdl.handle.net/10063/6567

18. Esnaashari, Shadi. Invisible Barriers: Identifying restrictions affecting New Zealanders' access to the Internet.

Degree: 2014, Victoria University of Wellington

 The Internet is an important technology worldwide. People use the Internet for research, communication, shopping, entertainment, etc. In addition to these benefits, the Internet provides… (more)

Subjects/Keywords: Monitoring tool; Blocking content; Blocking services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Esnaashari, S. (2014). Invisible Barriers: Identifying restrictions affecting New Zealanders' access to the Internet. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/3263

Chicago Manual of Style (16th Edition):

Esnaashari, Shadi. “Invisible Barriers: Identifying restrictions affecting New Zealanders' access to the Internet.” 2014. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/3263.

MLA Handbook (7th Edition):

Esnaashari, Shadi. “Invisible Barriers: Identifying restrictions affecting New Zealanders' access to the Internet.” 2014. Web. 15 Jan 2021.

Vancouver:

Esnaashari S. Invisible Barriers: Identifying restrictions affecting New Zealanders' access to the Internet. [Internet] [Masters thesis]. Victoria University of Wellington; 2014. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/3263.

Council of Science Editors:

Esnaashari S. Invisible Barriers: Identifying restrictions affecting New Zealanders' access to the Internet. [Masters Thesis]. Victoria University of Wellington; 2014. Available from: http://hdl.handle.net/10063/3263

19. Koay, Abigail. Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks.

Degree: 2019, Victoria University of Wellington

 High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks that disrupt Internet users and their daily operations. Detecting these attacks is… (more)

Subjects/Keywords: Anomaly detection; Machine Learning; Software-Defined Networking; ML; SDN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koay, A. (2019). Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/8069

Chicago Manual of Style (16th Edition):

Koay, Abigail. “Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks.” 2019. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/8069.

MLA Handbook (7th Edition):

Koay, Abigail. “Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks.” 2019. Web. 15 Jan 2021.

Vancouver:

Koay A. Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2019. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/8069.

Council of Science Editors:

Koay A. Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks. [Doctoral Dissertation]. Victoria University of Wellington; 2019. Available from: http://hdl.handle.net/10063/8069


Victoria University of Wellington

20. Palmer, Ben. Verifying Privacy Preserving Combinatorial Auctions.

Degree: 2009, Victoria University of Wellington

 Suppose you are competing in an online sealed bid auction for some goods. How do you know the auction result can be trusted? The auction… (more)

Subjects/Keywords: Verification; Zero knowledge; Auctions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palmer, B. (2009). Verifying Privacy Preserving Combinatorial Auctions. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/867

Chicago Manual of Style (16th Edition):

Palmer, Ben. “Verifying Privacy Preserving Combinatorial Auctions.” 2009. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/867.

MLA Handbook (7th Edition):

Palmer, Ben. “Verifying Privacy Preserving Combinatorial Auctions.” 2009. Web. 15 Jan 2021.

Vancouver:

Palmer B. Verifying Privacy Preserving Combinatorial Auctions. [Internet] [Masters thesis]. Victoria University of Wellington; 2009. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/867.

Council of Science Editors:

Palmer B. Verifying Privacy Preserving Combinatorial Auctions. [Masters Thesis]. Victoria University of Wellington; 2009. Available from: http://hdl.handle.net/10063/867


Victoria University of Wellington

21. Stirling, David. Enhancing Client Honeypots with Grid Services and Workflows.

Degree: 2009, Victoria University of Wellington

 Client honeypots are devices for detecting malicious servers on a network. They interact with potentially malicious servers and analyse the Web pages returned to assess… (more)

Subjects/Keywords: Honeypot (computing); Network security; Security; Distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stirling, D. (2009). Enhancing Client Honeypots with Grid Services and Workflows. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1177

Chicago Manual of Style (16th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/1177.

MLA Handbook (7th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Web. 15 Jan 2021.

Vancouver:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Internet] [Masters thesis]. Victoria University of Wellington; 2009. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/1177.

Council of Science Editors:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Masters Thesis]. Victoria University of Wellington; 2009. Available from: http://hdl.handle.net/10063/1177


Victoria University of Wellington

22. Delwadia, Vipul. RemoteME: Experiments in Thin-Client Mobile Computing.

Degree: 2009, Victoria University of Wellington

 Mobile phones are ubiquitous, however they are vastly underpowered compared to their desktop counterparts. We propose a technique to play potentially resource intensive games over… (more)

Subjects/Keywords: Remote computing; Mobile communication systems; Ubiquitous computing; Client/server computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Delwadia, V. (2009). RemoteME: Experiments in Thin-Client Mobile Computing. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1260

Chicago Manual of Style (16th Edition):

Delwadia, Vipul. “RemoteME: Experiments in Thin-Client Mobile Computing.” 2009. Masters Thesis, Victoria University of Wellington. Accessed January 15, 2021. http://hdl.handle.net/10063/1260.

MLA Handbook (7th Edition):

Delwadia, Vipul. “RemoteME: Experiments in Thin-Client Mobile Computing.” 2009. Web. 15 Jan 2021.

Vancouver:

Delwadia V. RemoteME: Experiments in Thin-Client Mobile Computing. [Internet] [Masters thesis]. Victoria University of Wellington; 2009. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10063/1260.

Council of Science Editors:

Delwadia V. RemoteME: Experiments in Thin-Client Mobile Computing. [Masters Thesis]. Victoria University of Wellington; 2009. Available from: http://hdl.handle.net/10063/1260

.