Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Virginia Tech" +contributor:("Lou, Wenjing"). Showing records 1 – 30 of 31 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Virginia Tech

1. Saglam, Mehmet. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.

Degree: MS, Computer Science, 2014, Virginia Tech

 Power grids are regarded as significant military targets and have been targeted with kinetic attacks in previous military operations. These attacks resulted in significant levels… (more)

Subjects/Keywords: Cyber Warfare; Power Grid; Cyber Attack; Kinetic Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saglam, M. (2014). A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49435

Chicago Manual of Style (16th Edition):

Saglam, Mehmet. “A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.” 2014. Masters Thesis, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/49435.

MLA Handbook (7th Edition):

Saglam, Mehmet. “A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.” 2014. Web. 20 Sep 2019.

Vancouver:

Saglam M. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/49435.

Council of Science Editors:

Saglam M. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49435


Virginia Tech

2. Gaebel, Ethan Daniel. Looks Good To Me (LGTM): Authentication for Augmented Reality.

Degree: MS, Computer Science, 2016, Virginia Tech

 Augmented reality is poised to become the next dominant computing paradigm over the course of the next decade. With the three-dimensional graphics and interactive interfaces… (more)

Subjects/Keywords: augmented reality; authentication; looks good to me; lgtm; mixed reality; hologram; holograms; wireless localization; localization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaebel, E. D. (2016). Looks Good To Me (LGTM): Authentication for Augmented Reality. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/71638

Chicago Manual of Style (16th Edition):

Gaebel, Ethan Daniel. “Looks Good To Me (LGTM): Authentication for Augmented Reality.” 2016. Masters Thesis, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/71638.

MLA Handbook (7th Edition):

Gaebel, Ethan Daniel. “Looks Good To Me (LGTM): Authentication for Augmented Reality.” 2016. Web. 20 Sep 2019.

Vancouver:

Gaebel ED. Looks Good To Me (LGTM): Authentication for Augmented Reality. [Internet] [Masters thesis]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/71638.

Council of Science Editors:

Gaebel ED. Looks Good To Me (LGTM): Authentication for Augmented Reality. [Masters Thesis]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/71638


Virginia Tech

3. Buchholz, Alexander Karl. DPP: Dual Path PKI for Secure Aircraft Data Communication.

Degree: MS, Computer Science, 2013, Virginia Tech

 Through application of modern technology, aviation systems are becoming more automated and are relying less on antiquated air traffic control (ATC) voice systems. Aircraft are… (more)

Subjects/Keywords: Air Traffic Control; ADS-B; PKI; ECC; Certificate Revocation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Buchholz, A. K. (2013). DPP: Dual Path PKI for Secure Aircraft Data Communication. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/20373

Chicago Manual of Style (16th Edition):

Buchholz, Alexander Karl. “DPP: Dual Path PKI for Secure Aircraft Data Communication.” 2013. Masters Thesis, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/20373.

MLA Handbook (7th Edition):

Buchholz, Alexander Karl. “DPP: Dual Path PKI for Secure Aircraft Data Communication.” 2013. Web. 20 Sep 2019.

Vancouver:

Buchholz AK. DPP: Dual Path PKI for Secure Aircraft Data Communication. [Internet] [Masters thesis]. Virginia Tech; 2013. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/20373.

Council of Science Editors:

Buchholz AK. DPP: Dual Path PKI for Secure Aircraft Data Communication. [Masters Thesis]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/20373


Virginia Tech

4. Qin, Xiaoqi. On Throughput Maximization in a Multi-hop MIMO Ad Hoc Network.

Degree: MS, Electrical and Computer Engineering, 2013, Virginia Tech

 In recent years, there has been a growing research interest in throughput optimization problems in a multi-hop wireless network. MIMO (multiple-input multiple-output), as an advanced… (more)

Subjects/Keywords: Cross layer design and optimization;  MIMO technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Qin, X. (2013). On Throughput Maximization in a Multi-hop MIMO Ad Hoc Network. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/23160

Chicago Manual of Style (16th Edition):

Qin, Xiaoqi. “On Throughput Maximization in a Multi-hop MIMO Ad Hoc Network.” 2013. Masters Thesis, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/23160.

MLA Handbook (7th Edition):

Qin, Xiaoqi. “On Throughput Maximization in a Multi-hop MIMO Ad Hoc Network.” 2013. Web. 20 Sep 2019.

Vancouver:

Qin X. On Throughput Maximization in a Multi-hop MIMO Ad Hoc Network. [Internet] [Masters thesis]. Virginia Tech; 2013. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/23160.

Council of Science Editors:

Qin X. On Throughput Maximization in a Multi-hop MIMO Ad Hoc Network. [Masters Thesis]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/23160


Virginia Tech

5. Ma, Zhongmin. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection.

Degree: MS, Electrical and Computer Engineering, 2014, Virginia Tech

 The open source structure of Android applications introduces security vulnerabilities that can be readily exploited by third-party applications. We address certain vulnerabilities at both installation… (more)

Subjects/Keywords: Android; Security; Android Permission Label; Machine Learning Neural Network; Action; Intent; Intent Log; Hidden Markov Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ma, Z. (2014). Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/25238

Chicago Manual of Style (16th Edition):

Ma, Zhongmin. “Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection.” 2014. Masters Thesis, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/25238.

MLA Handbook (7th Edition):

Ma, Zhongmin. “Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection.” 2014. Web. 20 Sep 2019.

Vancouver:

Ma Z. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/25238.

Council of Science Editors:

Ma Z. Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/25238

6. Tate, Jeremy. Security Weaknesses of the Android Advertising Ecosystem.

Degree: MS, Electrical and Computer Engineering, 2015, Virginia Tech

 Mobile device security is becoming increasingly important as the number of devices that are used continues to grow and has surpassed one billion active devices… (more)

Subjects/Keywords: Android; Cyber Security; Advertising Network

Virginia Tech Arlington Research Center where the tests were conducted. . . . . . . . . . . 70… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tate, J. (2015). Security Weaknesses of the Android Advertising Ecosystem. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/51231

Chicago Manual of Style (16th Edition):

Tate, Jeremy. “Security Weaknesses of the Android Advertising Ecosystem.” 2015. Masters Thesis, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/51231.

MLA Handbook (7th Edition):

Tate, Jeremy. “Security Weaknesses of the Android Advertising Ecosystem.” 2015. Web. 20 Sep 2019.

Vancouver:

Tate J. Security Weaknesses of the Android Advertising Ecosystem. [Internet] [Masters thesis]. Virginia Tech; 2015. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/51231.

Council of Science Editors:

Tate J. Security Weaknesses of the Android Advertising Ecosystem. [Masters Thesis]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/51231


Virginia Tech

7. Dou, Yanzhi. Toward Privacy-Preserving and Secure Dynamic Spectrum Access.

Degree: PhD, Electrical and Computer Engineering, 2018, Virginia Tech

 Dynamic spectrum access (DSA) technique has been widely accepted as a crucial solution to mitigate the potential spectrum scarcity problem. Spectrum sharing between the government… (more)

Subjects/Keywords: Dynamic spectrum access; Cognitive radio; Privacy-preserving system; Malware detection; Machine learning; Homomorphic encryption; Proxy re-encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dou, Y. (2018). Toward Privacy-Preserving and Secure Dynamic Spectrum Access. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/81882

Chicago Manual of Style (16th Edition):

Dou, Yanzhi. “Toward Privacy-Preserving and Secure Dynamic Spectrum Access.” 2018. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/81882.

MLA Handbook (7th Edition):

Dou, Yanzhi. “Toward Privacy-Preserving and Secure Dynamic Spectrum Access.” 2018. Web. 20 Sep 2019.

Vancouver:

Dou Y. Toward Privacy-Preserving and Secure Dynamic Spectrum Access. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/81882.

Council of Science Editors:

Dou Y. Toward Privacy-Preserving and Secure Dynamic Spectrum Access. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/81882


Virginia Tech

8. Du, Changlai. Exploring the Sensing Capability of Wireless Signals.

Degree: PhD, Computer Science, 2018, Virginia Tech

 Wireless communications are ubiquitous nowadays, especially in the new era of Internet of Things (IoT). Most of IoT devices access the Internet via some kind… (more)

Subjects/Keywords: wireless security; wireless localization; motion sensing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Du, C. (2018). Exploring the Sensing Capability of Wireless Signals. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83880

Chicago Manual of Style (16th Edition):

Du, Changlai. “Exploring the Sensing Capability of Wireless Signals.” 2018. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/83880.

MLA Handbook (7th Edition):

Du, Changlai. “Exploring the Sensing Capability of Wireless Signals.” 2018. Web. 20 Sep 2019.

Vancouver:

Du C. Exploring the Sensing Capability of Wireless Signals. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/83880.

Council of Science Editors:

Du C. Exploring the Sensing Capability of Wireless Signals. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83880


Virginia Tech

9. Sun, Wenhai. Towards Secure Outsourced Data Services in the Public Cloud.

Degree: PhD, Computer Science, 2018, Virginia Tech

 Past few years have witnessed a dramatic shift for IT infrastructures from a self-sustained model to a centralized and multi-tenant elastic computing paradigm  – Cloud… (more)

Subjects/Keywords: Cloud Computing; Privacy-preserving Keyword Search; Verifiable Computation; Secure Genomic Computation; Secure Data Deduplication; Trusted Hardware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, W. (2018). Towards Secure Outsourced Data Services in the Public Cloud. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/84396

Chicago Manual of Style (16th Edition):

Sun, Wenhai. “Towards Secure Outsourced Data Services in the Public Cloud.” 2018. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/84396.

MLA Handbook (7th Edition):

Sun, Wenhai. “Towards Secure Outsourced Data Services in the Public Cloud.” 2018. Web. 20 Sep 2019.

Vancouver:

Sun W. Towards Secure Outsourced Data Services in the Public Cloud. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/84396.

Council of Science Editors:

Sun W. Towards Secure Outsourced Data Services in the Public Cloud. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/84396


Virginia Tech

10. Shahriar, Chowdhury MR. Resilient Waveform Design for OFDM-MIMO Communication Systems.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto'… (more)

Subjects/Keywords: Physical-Layer Security; Communications Security; OFDM; MIMO; Jamming; Antijam; Equalization Attack; Pilot Attack; LTE; WiMAX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahriar, C. M. (2015). Resilient Waveform Design for OFDM-MIMO Communication Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/56973

Chicago Manual of Style (16th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/56973.

MLA Handbook (7th Edition):

Shahriar, Chowdhury MR. “Resilient Waveform Design for OFDM-MIMO Communication Systems.” 2015. Web. 20 Sep 2019.

Vancouver:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/56973.

Council of Science Editors:

Shahriar CM. Resilient Waveform Design for OFDM-MIMO Communication Systems. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/56973


Virginia Tech

11. Zhang, Hao. Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection.

Degree: PhD, Computer Science, 2015, Virginia Tech

 An increasing variety of malware, including spyware, worms, and bots, threatens data confidentiality and system integrity on computing devices ranging from backend servers to mobile… (more)

Subjects/Keywords: Network Security; Stealthy Malware; Anomaly Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2015). Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/64246

Chicago Manual of Style (16th Edition):

Zhang, Hao. “Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/64246.

MLA Handbook (7th Edition):

Zhang, Hao. “Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection.” 2015. Web. 20 Sep 2019.

Vancouver:

Zhang H. Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/64246.

Council of Science Editors:

Zhang H. Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/64246


Virginia Tech

12. Xu, Kui. Anomaly Detection Through System and Program Behavior Modeling.

Degree: PhD, Computer Science, 2014, Virginia Tech

 Various vulnerabilities in software applications become easy targets for attackers. The trend constantly being observed in the evolution of advanced modern exploits is their growing… (more)

Subjects/Keywords: Security; Anomaly Detection; Drive-by Download Detection; Program Analysis; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, K. (2014). Anomaly Detection Through System and Program Behavior Modeling. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/51140

Chicago Manual of Style (16th Edition):

Xu, Kui. “Anomaly Detection Through System and Program Behavior Modeling.” 2014. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/51140.

MLA Handbook (7th Edition):

Xu, Kui. “Anomaly Detection Through System and Program Behavior Modeling.” 2014. Web. 20 Sep 2019.

Vancouver:

Xu K. Anomaly Detection Through System and Program Behavior Modeling. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/51140.

Council of Science Editors:

Xu K. Anomaly Detection Through System and Program Behavior Modeling. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/51140


Virginia Tech

13. Chen, Feng. Efficient Algorithms for Mining Large Spatio-Temporal Data.

Degree: PhD, Computer Science, 2013, Virginia Tech

 Knowledge discovery on spatio-temporal datasets has attracted growing interests. Recent advances on remote sensing technology mean that massive amounts of spatio-temporal data are being collected,… (more)

Subjects/Keywords: Spatio-Temporal Analysis; Outlier Detection; Robust Prediction; Energy Disaggregation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, F. (2013). Efficient Algorithms for Mining Large Spatio-Temporal Data. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/19220

Chicago Manual of Style (16th Edition):

Chen, Feng. “Efficient Algorithms for Mining Large Spatio-Temporal Data.” 2013. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/19220.

MLA Handbook (7th Edition):

Chen, Feng. “Efficient Algorithms for Mining Large Spatio-Temporal Data.” 2013. Web. 20 Sep 2019.

Vancouver:

Chen F. Efficient Algorithms for Mining Large Spatio-Temporal Data. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/19220.

Council of Science Editors:

Chen F. Efficient Algorithms for Mining Large Spatio-Temporal Data. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/19220


Virginia Tech

14. Zuo, Yiming. Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery.

Degree: PhD, Electrical and Computer Engineering, 2017, Virginia Tech

 Recent advances in high-throughput technique enables the generation of a large amount of omic data such as genomics, transcriptomics, proteomics, metabolomics, glycomics etc. Typically, differential… (more)

Subjects/Keywords: differential expression analysis; differential network analysis; cancer biomarker discovery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zuo, Y. (2017). Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78217

Chicago Manual of Style (16th Edition):

Zuo, Yiming. “Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/78217.

MLA Handbook (7th Edition):

Zuo, Yiming. “Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery.” 2017. Web. 20 Sep 2019.

Vancouver:

Zuo Y. Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/78217.

Council of Science Editors:

Zuo Y. Differential Network Analysis based on Omic Data for Cancer Biomarker Discovery. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78217


Virginia Tech

15. Yan, Qiben. Security Enhanced Communications in Cognitive Networks.

Degree: PhD, Computer Science, 2014, Virginia Tech

 With the advent of ubiquitous computing and Internet of Things (IoT), potentially billions of devices will create a broad range of data services and applications,… (more)

Subjects/Keywords: cognitive network security; cognitive radio network; reactive jamming attack; network monitoring; botnet detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yan, Q. (2014). Security Enhanced Communications in Cognitive Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49704

Chicago Manual of Style (16th Edition):

Yan, Qiben. “Security Enhanced Communications in Cognitive Networks.” 2014. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/49704.

MLA Handbook (7th Edition):

Yan, Qiben. “Security Enhanced Communications in Cognitive Networks.” 2014. Web. 20 Sep 2019.

Vancouver:

Yan Q. Security Enhanced Communications in Cognitive Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/49704.

Council of Science Editors:

Yan Q. Security Enhanced Communications in Cognitive Networks. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49704


Virginia Tech

16. Bao, Fenye. Dynamic Trust Management for Mobile Networks and Its Applications.

Degree: PhD, Computer Science, 2013, Virginia Tech

 Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research,… (more)

Subjects/Keywords: mobile networks; trust management; adaptive control; optimization; secure routing; intrusion detection; performance analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bao, F. (2013). Dynamic Trust Management for Mobile Networks and Its Applications. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/23157

Chicago Manual of Style (16th Edition):

Bao, Fenye. “Dynamic Trust Management for Mobile Networks and Its Applications.” 2013. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/23157.

MLA Handbook (7th Edition):

Bao, Fenye. “Dynamic Trust Management for Mobile Networks and Its Applications.” 2013. Web. 20 Sep 2019.

Vancouver:

Bao F. Dynamic Trust Management for Mobile Networks and Its Applications. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/23157.

Council of Science Editors:

Bao F. Dynamic Trust Management for Mobile Networks and Its Applications. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/23157


Virginia Tech

17. Xiong, Huijun. Secure Data Service Outsourcing with Untrusted Cloud.

Degree: PhD, Computer Science, 2013, Virginia Tech

 Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on… (more)

Subjects/Keywords: Cloud Computing; Outsource Data Security; Proxy Re-encryption; Content Delivery Network; Key Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiong, H. (2013). Secure Data Service Outsourcing with Untrusted Cloud. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/23191

Chicago Manual of Style (16th Edition):

Xiong, Huijun. “Secure Data Service Outsourcing with Untrusted Cloud.” 2013. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/23191.

MLA Handbook (7th Edition):

Xiong, Huijun. “Secure Data Service Outsourcing with Untrusted Cloud.” 2013. Web. 20 Sep 2019.

Vancouver:

Xiong H. Secure Data Service Outsourcing with Untrusted Cloud. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/23191.

Council of Science Editors:

Xiong H. Secure Data Service Outsourcing with Untrusted Cloud. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/23191

18. Elish, Karim Omar Mahmoud. User-Intention Based Program Analysis for Android Security.

Degree: PhD, Computer Science, 2015, Virginia Tech

 The number of mobile applications (i.e., apps) is rapidly growing, as the mobile computing becomes an integral part of the modern user experience. Malicious apps… (more)

Subjects/Keywords: Android Malware; Application Collusion; User-Intention; Program Analysis; Inter-Component Communication (ICC); Mobile Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elish, K. O. M. (2015). User-Intention Based Program Analysis for Android Security. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/54943

Chicago Manual of Style (16th Edition):

Elish, Karim Omar Mahmoud. “User-Intention Based Program Analysis for Android Security.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/54943.

MLA Handbook (7th Edition):

Elish, Karim Omar Mahmoud. “User-Intention Based Program Analysis for Android Security.” 2015. Web. 20 Sep 2019.

Vancouver:

Elish KOM. User-Intention Based Program Analysis for Android Security. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/54943.

Council of Science Editors:

Elish KOM. User-Intention Based Program Analysis for Android Security. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/54943

19. Liu, Fang. Mining Security Risks from Massive Datasets.

Degree: PhD, Computer Science, 2017, Virginia Tech

 Cyber security risk has been a problem ever since the appearance of telecommunication and electronic computers. In the recent 30 years, researchers have developed various… (more)

Subjects/Keywords: Cyber Security; Big Data Security; Mobile Security; Data Leakage Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, F. (2017). Mining Security Risks from Massive Datasets. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78684

Chicago Manual of Style (16th Edition):

Liu, Fang. “Mining Security Risks from Massive Datasets.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/78684.

MLA Handbook (7th Edition):

Liu, Fang. “Mining Security Risks from Massive Datasets.” 2017. Web. 20 Sep 2019.

Vancouver:

Liu F. Mining Security Risks from Massive Datasets. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/78684.

Council of Science Editors:

Liu F. Mining Security Risks from Massive Datasets. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78684


Virginia Tech

20. Jalaian, Brian Alexander. On Programmable Control and Optimization for Multi-Hop Wireless Networks.

Degree: PhD, Electrical and ComputerEngineering, 2016, Virginia Tech

 Traditionally, achieving good performance for a multi-hop wireless network is known to be difficult. The main approach to control the operation of such a network… (more)

Subjects/Keywords: wireless network; optimization; cross-layer design; multi-hop; programmable network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jalaian, B. A. (2016). On Programmable Control and Optimization for Multi-Hop Wireless Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/82841

Chicago Manual of Style (16th Edition):

Jalaian, Brian Alexander. “On Programmable Control and Optimization for Multi-Hop Wireless Networks.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/82841.

MLA Handbook (7th Edition):

Jalaian, Brian Alexander. “On Programmable Control and Optimization for Multi-Hop Wireless Networks.” 2016. Web. 20 Sep 2019.

Vancouver:

Jalaian BA. On Programmable Control and Optimization for Multi-Hop Wireless Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/82841.

Council of Science Editors:

Jalaian BA. On Programmable Control and Optimization for Multi-Hop Wireless Networks. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/82841


Virginia Tech

21. Zeng, Kexiong. Threat and Application of Frequency-Agile Radio Systems.

Degree: PhD, Electrical and Computer Engineering, 2018, Virginia Tech

 As traditional wireless systems that only operate on fixed frequency bands are reaching their capacity limits, advanced frequency-agile radio systems are developed for more efficient… (more)

Subjects/Keywords: GPS Spoofing; Road Navigation; Cognitive Radio; White Space Radio; Maritime Mesh Network; Energy Harvesting

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zeng, K. (2018). Threat and Application of Frequency-Agile Radio Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/89059

Chicago Manual of Style (16th Edition):

Zeng, Kexiong. “Threat and Application of Frequency-Agile Radio Systems.” 2018. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/89059.

MLA Handbook (7th Edition):

Zeng, Kexiong. “Threat and Application of Frequency-Agile Radio Systems.” 2018. Web. 20 Sep 2019.

Vancouver:

Zeng K. Threat and Application of Frequency-Agile Radio Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/89059.

Council of Science Editors:

Zeng K. Threat and Application of Frequency-Agile Radio Systems. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/89059


Virginia Tech

22. Yuan, Xu. Efficient Sharing of Radio Spectrum for Wireless Networks.

Degree: PhD, Electrical and Computer Engineering, 2016, Virginia Tech

 The radio spectrum that can be used for wireless communications is a finite but extremely valuable resource. During the past two decades, with the proliferation… (more)

Subjects/Keywords: Spectrum sharing; coexistence; primary network; secondary network; modeling and optimization; algorithm design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuan, X. (2016). Efficient Sharing of Radio Spectrum for Wireless Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/71771

Chicago Manual of Style (16th Edition):

Yuan, Xu. “Efficient Sharing of Radio Spectrum for Wireless Networks.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/71771.

MLA Handbook (7th Edition):

Yuan, Xu. “Efficient Sharing of Radio Spectrum for Wireless Networks.” 2016. Web. 20 Sep 2019.

Vancouver:

Yuan X. Efficient Sharing of Radio Spectrum for Wireless Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/71771.

Council of Science Editors:

Yuan X. Efficient Sharing of Radio Spectrum for Wireless Networks. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/71771


Virginia Tech

23. Zeng, Huacheng. On Interference Management for Wireless Networks.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 Interference is a fundamental problem in wireless networks. An effective solution to this problem usually calls for a cross-layer approach. Although there exist a large… (more)

Subjects/Keywords: Wireless networks; interference cancellation; interference alignment; interference neutralization; modeling and optimization; algorithm design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zeng, H. (2015). On Interference Management for Wireless Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/72265

Chicago Manual of Style (16th Edition):

Zeng, Huacheng. “On Interference Management for Wireless Networks.” 2015. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/72265.

MLA Handbook (7th Edition):

Zeng, Huacheng. “On Interference Management for Wireless Networks.” 2015. Web. 20 Sep 2019.

Vancouver:

Zeng H. On Interference Management for Wireless Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/72265.

Council of Science Editors:

Zeng H. On Interference Management for Wireless Networks. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/72265

24. Zhang, Ning. Attack and Defense with Hardware-Aided Security.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Riding on recent advances in computing and networking, our society is now experiencing the evolution into the age of information. While the development of these… (more)

Subjects/Keywords: Trusted Execution Environment; Hardware-Assisted Security; Secure Execution; Cache; Rootkit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, N. (2016). Attack and Defense with Hardware-Aided Security. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/72855

Chicago Manual of Style (16th Edition):

Zhang, Ning. “Attack and Defense with Hardware-Aided Security.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/72855.

MLA Handbook (7th Edition):

Zhang, Ning. “Attack and Defense with Hardware-Aided Security.” 2016. Web. 20 Sep 2019.

Vancouver:

Zhang N. Attack and Defense with Hardware-Aided Security. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/72855.

Council of Science Editors:

Zhang N. Attack and Defense with Hardware-Aided Security. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/72855

25. Qin, Xiaoqi. Exploring Performance Limits of Wireless Networks with Advanced Communication Technologies.

Degree: PhD, Electrical and Computer Engineering, 2016, Virginia Tech

 Over the past decade, wireless data communication has experienced a phenomenal growth, which is driven by the popularity of wireless devices and the growing number… (more)

Subjects/Keywords: Wireless network; MIMO; interference cancellation; full duplex; mmWave communication; modeling and optimization; algorithm design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Qin, X. (2016). Exploring Performance Limits of Wireless Networks with Advanced Communication Technologies. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/73215

Chicago Manual of Style (16th Edition):

Qin, Xiaoqi. “Exploring Performance Limits of Wireless Networks with Advanced Communication Technologies.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/73215.

MLA Handbook (7th Edition):

Qin, Xiaoqi. “Exploring Performance Limits of Wireless Networks with Advanced Communication Technologies.” 2016. Web. 20 Sep 2019.

Vancouver:

Qin X. Exploring Performance Limits of Wireless Networks with Advanced Communication Technologies. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/73215.

Council of Science Editors:

Qin X. Exploring Performance Limits of Wireless Networks with Advanced Communication Technologies. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/73215


Virginia Tech

26. Zheng, Yao. Privacy Preservation for Cloud-Based Data Sharing and Data Analytics.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Data privacy is a globally recognized human right for individuals to control the access to their personal information, and bar the negative consequences from the… (more)

Subjects/Keywords: information privacy; cryptography; machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zheng, Y. (2016). Privacy Preservation for Cloud-Based Data Sharing and Data Analytics. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/73796

Chicago Manual of Style (16th Edition):

Zheng, Yao. “Privacy Preservation for Cloud-Based Data Sharing and Data Analytics.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/73796.

MLA Handbook (7th Edition):

Zheng, Yao. “Privacy Preservation for Cloud-Based Data Sharing and Data Analytics.” 2016. Web. 20 Sep 2019.

Vancouver:

Zheng Y. Privacy Preservation for Cloud-Based Data Sharing and Data Analytics. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/73796.

Council of Science Editors:

Zheng Y. Privacy Preservation for Cloud-Based Data Sharing and Data Analytics. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/73796


Virginia Tech

27. Xie, Liguang. Modeling and Optimization of Rechargeable Sensor Networks.

Degree: PhD, Electrical and Computer Engineering, 2013, Virginia Tech

 Over the past fifteen years, advances in Micro-Electro-Mechanical Systems (MEMS) technology have enabled rapid development of wireless sensor networks (WSNs). A WSN consists of a… (more)

Subjects/Keywords: Wireless Sensor Networks; Wireless Energy Transfer; Energy; Networking; Modeling; Optimization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, L. (2013). Modeling and Optimization of Rechargeable Sensor Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/52243

Chicago Manual of Style (16th Edition):

Xie, Liguang. “Modeling and Optimization of Rechargeable Sensor Networks.” 2013. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/52243.

MLA Handbook (7th Edition):

Xie, Liguang. “Modeling and Optimization of Rechargeable Sensor Networks.” 2013. Web. 20 Sep 2019.

Vancouver:

Xie L. Modeling and Optimization of Rechargeable Sensor Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/52243.

Council of Science Editors:

Xie L. Modeling and Optimization of Rechargeable Sensor Networks. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/52243

28. Wang, Yating. Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization Goals.

Degree: PhD, Computer Science, 2016, Virginia Tech

 With the proliferation of fairly powerful mobile devices and ubiquitous wireless technology, traditional mobile ad hoc networks (MANETs) now migrate into a new era of… (more)

Subjects/Keywords: Trust; Logistic Regression; Service Management; Mobile Ad Hoc Networks; Multi-Objective Optimization; Service Composition; Task Assignment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2016). Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization Goals. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/70965

Chicago Manual of Style (16th Edition):

Wang, Yating. “Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization Goals.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/70965.

MLA Handbook (7th Edition):

Wang, Yating. “Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization Goals.” 2016. Web. 20 Sep 2019.

Vancouver:

Wang Y. Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization Goals. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/70965.

Council of Science Editors:

Wang Y. Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization Goals. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/70965

29. Wang, Xiao. Computational Modeling for Differential Analysis of RNA-seq and Methylation data.

Degree: PhD, Electrical and Computer Engineering, 2016, Virginia Tech

 Computational systems biology is an inter-disciplinary field that aims to develop computational approaches for a system-level understanding of biological systems. Advances in high-throughput biotechnology offer… (more)

Subjects/Keywords: Differential Analysis; Bayesian Modeling; Markov Random Field; RNA-seq Data Analysis; Markov Chain Monte Carlo (MCMC)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, X. (2016). Computational Modeling for Differential Analysis of RNA-seq and Methylation data. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/72271

Chicago Manual of Style (16th Edition):

Wang, Xiao. “Computational Modeling for Differential Analysis of RNA-seq and Methylation data.” 2016. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/72271.

MLA Handbook (7th Edition):

Wang, Xiao. “Computational Modeling for Differential Analysis of RNA-seq and Methylation data.” 2016. Web. 20 Sep 2019.

Vancouver:

Wang X. Computational Modeling for Differential Analysis of RNA-seq and Methylation data. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/72271.

Council of Science Editors:

Wang X. Computational Modeling for Differential Analysis of RNA-seq and Methylation data. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/72271

30. Mitchell III, Robert Raymond. Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems.

Degree: PhD, Computer Science, 2013, Virginia Tech

 In this dissertation research we aim to design and validate intrusion detection system (IDS) protocols for a cyber physical system (CPS) comprising sensors, actuators, control… (more)

Subjects/Keywords: Intrusion Detection Systems; Cyber Physical Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mitchell III, R. R. (2013). Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/19338

Chicago Manual of Style (16th Edition):

Mitchell III, Robert Raymond. “Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems.” 2013. Doctoral Dissertation, Virginia Tech. Accessed September 20, 2019. http://hdl.handle.net/10919/19338.

MLA Handbook (7th Edition):

Mitchell III, Robert Raymond. “Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems.” 2013. Web. 20 Sep 2019.

Vancouver:

Mitchell III RR. Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2019 Sep 20]. Available from: http://hdl.handle.net/10919/19338.

Council of Science Editors:

Mitchell III RR. Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/19338

[1] [2]

.