Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Virginia Tech" +contributor:("Yao, Danfeng"). Showing records 1 – 30 of 46 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Virginia Tech

1. Wang, Xiangwen. Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks.

Degree: MS, Computer Science, 2018, Virginia Tech

 Taking advantage of the high anonymity of darknet, cybercriminals have set up underground trading websites such as darknet markets for trading illegal goods. To understand… (more)

Subjects/Keywords: Darknet Market; Sybil Detection; Image Analysis; Stylometry

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, X. (2018). Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83447

Chicago Manual of Style (16th Edition):

Wang, Xiangwen. “Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks.” 2018. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/83447.

MLA Handbook (7th Edition):

Wang, Xiangwen. “Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks.” 2018. Web. 25 Feb 2020.

Vancouver:

Wang X. Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/83447.

Council of Science Editors:

Wang X. Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83447


Virginia Tech

2. Chen, Mengsu. How Reliable is the Crowdsourced Knowledge of Security Implementation?.

Degree: MS, Computer Science, 2018, Virginia Tech

 Stack Overflow (SO), the most popular question and answer platform for programmers today, has accumulated and continues accumulating tremendous question and answer posts since its… (more)

Subjects/Keywords: Stack Overflow; crowdsourced knowledge; social dynamics; security implementation; clone detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, M. (2018). How Reliable is the Crowdsourced Knowledge of Security Implementation?. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86885

Chicago Manual of Style (16th Edition):

Chen, Mengsu. “How Reliable is the Crowdsourced Knowledge of Security Implementation?.” 2018. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/86885.

MLA Handbook (7th Edition):

Chen, Mengsu. “How Reliable is the Crowdsourced Knowledge of Security Implementation?.” 2018. Web. 25 Feb 2020.

Vancouver:

Chen M. How Reliable is the Crowdsourced Knowledge of Security Implementation?. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/86885.

Council of Science Editors:

Chen M. How Reliable is the Crowdsourced Knowledge of Security Implementation?. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/86885


Virginia Tech

3. Peng, Peng. A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives.

Degree: MS, Computer Science and Applications, 2020, Virginia Tech

 Phishing attack is the fraudulent attempt to lure the target users to give away sensitive information such as usernames, passwords and credit card details. Cybercriminals… (more)

Subjects/Keywords: Phishing; Measurement; Credential Sharing; Online Scan Engines

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peng, P. (2020). A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/96401

Chicago Manual of Style (16th Edition):

Peng, Peng. “A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives.” 2020. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/96401.

MLA Handbook (7th Edition):

Peng, Peng. “A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives.” 2020. Web. 25 Feb 2020.

Vancouver:

Peng P. A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/96401.

Council of Science Editors:

Peng P. A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/96401


Virginia Tech

4. Elsherbiny, Noha Ibrahim. Secure Digital Libraries.

Degree: MS, Computer Science, 2011, Virginia Tech

 Digital libraries are an integration of complex computer and information systems that could benefit from a formal approach to design. There are various design aspects… (more)

Subjects/Keywords: security; 5SL; 5S; digital libraries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elsherbiny, N. I. (2011). Secure Digital Libraries. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/33842

Chicago Manual of Style (16th Edition):

Elsherbiny, Noha Ibrahim. “Secure Digital Libraries.” 2011. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/33842.

MLA Handbook (7th Edition):

Elsherbiny, Noha Ibrahim. “Secure Digital Libraries.” 2011. Web. 25 Feb 2020.

Vancouver:

Elsherbiny NI. Secure Digital Libraries. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/33842.

Council of Science Editors:

Elsherbiny NI. Secure Digital Libraries. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/33842


Virginia Tech

5. Chitturi, Kiran. Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software.

Degree: MS, Computer Science, 2014, Virginia Tech

 When a crisis occurs, information flows rapidly in the Web through social media, blogs, and news articles. The shared information captures the reactions, impacts, and… (more)

Subjects/Keywords: Digital Library Services; CTRnet; Internet Archive; LucidWorks; Big Data; Crises; Archive-It

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chitturi, K. (2014). Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/46865

Chicago Manual of Style (16th Edition):

Chitturi, Kiran. “Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software.” 2014. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/46865.

MLA Handbook (7th Edition):

Chitturi, Kiran. “Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software.” 2014. Web. 25 Feb 2020.

Vancouver:

Chitturi K. Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/46865.

Council of Science Editors:

Chitturi K. Building CTRnet Digital Library Services using Archive-It and LucidWorks Big Data Software. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/46865


Virginia Tech

6. Deng, Yipan. DeviceGuard: External Device-Assisted System And Data Security.

Degree: MS, Computer Science, 2011, Virginia Tech

 This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such… (more)

Subjects/Keywords: Host Security; System Security; Data Security; Smartphone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deng, Y. (2011). DeviceGuard: External Device-Assisted System And Data Security. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76767

Chicago Manual of Style (16th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/76767.

MLA Handbook (7th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Web. 25 Feb 2020.

Vancouver:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/76767.

Council of Science Editors:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76767


Virginia Tech

7. Dunning, John Paul. Bluetooth Threat Taxonomy.

Degree: MS, Computer Science, 2010, Virginia Tech

 Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology… (more)

Subjects/Keywords: Intrusion Detection; Taxonomy; Security; Bluetooth; Exploit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dunning, J. P. (2010). Bluetooth Threat Taxonomy. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76883

Chicago Manual of Style (16th Edition):

Dunning, John Paul. “Bluetooth Threat Taxonomy.” 2010. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/76883.

MLA Handbook (7th Edition):

Dunning, John Paul. “Bluetooth Threat Taxonomy.” 2010. Web. 25 Feb 2020.

Vancouver:

Dunning JP. Bluetooth Threat Taxonomy. [Internet] [Masters thesis]. Virginia Tech; 2010. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/76883.

Council of Science Editors:

Dunning JP. Bluetooth Threat Taxonomy. [Masters Thesis]. Virginia Tech; 2010. Available from: http://hdl.handle.net/10919/76883


Virginia Tech

8. Wang, Chun. Empirical Analysis of User Passwords across Online Services.

Degree: MS, Computer Science, 2018, Virginia Tech

 Leaked passwords from data breaches can pose a serious threat if users reuse or slightly modify the passwords for other services. With more and more… (more)

Subjects/Keywords: Password Reuse; Empirical Measurements; Bayesian Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, C. (2018). Empirical Analysis of User Passwords across Online Services. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83471

Chicago Manual of Style (16th Edition):

Wang, Chun. “Empirical Analysis of User Passwords across Online Services.” 2018. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/83471.

MLA Handbook (7th Edition):

Wang, Chun. “Empirical Analysis of User Passwords across Online Services.” 2018. Web. 25 Feb 2020.

Vancouver:

Wang C. Empirical Analysis of User Passwords across Online Services. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/83471.

Council of Science Editors:

Wang C. Empirical Analysis of User Passwords across Online Services. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83471


Virginia Tech

9. Zhang, Jingyao. SUNSHINE: A Multi-Domain Sensor Network Simulator.

Degree: MS, Electrical and Computer Engineering, 2010, Virginia Tech

 Simulators are important tools for analyzing and evaluating different design options for wireless sensor networks (sensornets) and hence, have been intensively studied in the past… (more)

Subjects/Keywords: cross-domain simulator; hardware-software co-simulation; performance; Sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, J. (2010). SUNSHINE: A Multi-Domain Sensor Network Simulator. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/45146

Chicago Manual of Style (16th Edition):

Zhang, Jingyao. “SUNSHINE: A Multi-Domain Sensor Network Simulator.” 2010. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/45146.

MLA Handbook (7th Edition):

Zhang, Jingyao. “SUNSHINE: A Multi-Domain Sensor Network Simulator.” 2010. Web. 25 Feb 2020.

Vancouver:

Zhang J. SUNSHINE: A Multi-Domain Sensor Network Simulator. [Internet] [Masters thesis]. Virginia Tech; 2010. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/45146.

Council of Science Editors:

Zhang J. SUNSHINE: A Multi-Domain Sensor Network Simulator. [Masters Thesis]. Virginia Tech; 2010. Available from: http://hdl.handle.net/10919/45146

10. Barton, Daniel John Trevino. Usable Post-Classification Visualizations for Android Collusion Detection and Inspection.

Degree: MS, Computer Science, 2016, Virginia Tech

 Android malware collusion is a new threat model that occurs when multiple Android apps communicate in order to execute an attack. This threat model threatens… (more)

Subjects/Keywords: Android Malware; Security; Visualization; App Collusion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barton, D. J. T. (2016). Usable Post-Classification Visualizations for Android Collusion Detection and Inspection. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/72286

Chicago Manual of Style (16th Edition):

Barton, Daniel John Trevino. “Usable Post-Classification Visualizations for Android Collusion Detection and Inspection.” 2016. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/72286.

MLA Handbook (7th Edition):

Barton, Daniel John Trevino. “Usable Post-Classification Visualizations for Android Collusion Detection and Inspection.” 2016. Web. 25 Feb 2020.

Vancouver:

Barton DJT. Usable Post-Classification Visualizations for Android Collusion Detection and Inspection. [Internet] [Masters thesis]. Virginia Tech; 2016. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/72286.

Council of Science Editors:

Barton DJT. Usable Post-Classification Visualizations for Android Collusion Detection and Inspection. [Masters Thesis]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/72286

11. Kedrowitsch, Alexander Lee. Deceptive Environments for Cybersecurity Defense on Low-power Devices.

Degree: MS, Computer Science, 2017, Virginia Tech

 The ever-evolving nature of botnets have made constant malware collection an absolute necessity for security researchers in order to analyze and investigate the latest, nefarious… (more)

Subjects/Keywords: security; deception; honeypots; containers

…this case study was established on the Virginia Tech network and the honeypot was advertised… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kedrowitsch, A. L. (2017). Deceptive Environments for Cybersecurity Defense on Low-power Devices. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/86164

Chicago Manual of Style (16th Edition):

Kedrowitsch, Alexander Lee. “Deceptive Environments for Cybersecurity Defense on Low-power Devices.” 2017. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/86164.

MLA Handbook (7th Edition):

Kedrowitsch, Alexander Lee. “Deceptive Environments for Cybersecurity Defense on Low-power Devices.” 2017. Web. 25 Feb 2020.

Vancouver:

Kedrowitsch AL. Deceptive Environments for Cybersecurity Defense on Low-power Devices. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/86164.

Council of Science Editors:

Kedrowitsch AL. Deceptive Environments for Cybersecurity Defense on Low-power Devices. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/86164

12. Roth, Hannah Michelle. Smartphone Privacy in Citizen Science.

Degree: MS, Computer Science, 2017, Virginia Tech

 Group signature schemes enable anonymous-yet-accountable communications. Such a capability is extremely useful for modern applications such as smartphone-based crowdsensing and citizen science. A prototype named… (more)

Subjects/Keywords: Citizen Science; Security; Android Mobile Software; Crowdsourcing; Crowdsensing; Groupsensing; Privacy Guarantee; Group Signature Scheme; User Study

…graduate students at Virginia Tech. A total of 22 students participated in the user study. Each… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roth, H. M. (2017). Smartphone Privacy in Citizen Science. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78360

Chicago Manual of Style (16th Edition):

Roth, Hannah Michelle. “Smartphone Privacy in Citizen Science.” 2017. Masters Thesis, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/78360.

MLA Handbook (7th Edition):

Roth, Hannah Michelle. “Smartphone Privacy in Citizen Science.” 2017. Web. 25 Feb 2020.

Vancouver:

Roth HM. Smartphone Privacy in Citizen Science. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/78360.

Council of Science Editors:

Roth HM. Smartphone Privacy in Citizen Science. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78360

13. Yuce, Bilgiday. Fault Attacks on Embedded Software: New Directions in Modeling, Design, and Mitigation.

Degree: PhD, Electrical and Computer Engineering, 2018, Virginia Tech

 This research investigates an important class of hardware attacks against embedded software, which uses fault injection as a hacking tool. Fault attacks use well-chosen, targeted… (more)

Subjects/Keywords: Embedded Systems; Fault Attacks; Countermeasures; Fault Models; Fault Simulation; Fault Mitigation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuce, B. (2018). Fault Attacks on Embedded Software: New Directions in Modeling, Design, and Mitigation. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/81824

Chicago Manual of Style (16th Edition):

Yuce, Bilgiday. “Fault Attacks on Embedded Software: New Directions in Modeling, Design, and Mitigation.” 2018. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/81824.

MLA Handbook (7th Edition):

Yuce, Bilgiday. “Fault Attacks on Embedded Software: New Directions in Modeling, Design, and Mitigation.” 2018. Web. 25 Feb 2020.

Vancouver:

Yuce B. Fault Attacks on Embedded Software: New Directions in Modeling, Design, and Mitigation. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/81824.

Council of Science Editors:

Yuce B. Fault Attacks on Embedded Software: New Directions in Modeling, Design, and Mitigation. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/81824


Virginia Tech

14. Poston, Jeffrey Duane. ILoViT: Indoor Localization via Vibration Tracking.

Degree: PhD, Electrical Engineering, 2018, Virginia Tech

 Indoor localization remains an open problem in geolocation research, and once this is solved the localization enables counting and tracking of building occupants. This information… (more)

Subjects/Keywords: Accelerometer; Cyber-Physical System (CPS); Gait; Indoor Geolocation; Localization; Multilateration; Multi-Target Tracking (MTT); Multiple Hypothesis Tracking (MHT); Positioning; Seismic; Sensor Network; Smart Building; Vibration

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Poston, J. D. (2018). ILoViT: Indoor Localization via Vibration Tracking. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/82871

Chicago Manual of Style (16th Edition):

Poston, Jeffrey Duane. “ILoViT: Indoor Localization via Vibration Tracking.” 2018. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/82871.

MLA Handbook (7th Edition):

Poston, Jeffrey Duane. “ILoViT: Indoor Localization via Vibration Tracking.” 2018. Web. 25 Feb 2020.

Vancouver:

Poston JD. ILoViT: Indoor Localization via Vibration Tracking. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/82871.

Council of Science Editors:

Poston JD. ILoViT: Indoor Localization via Vibration Tracking. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/82871


Virginia Tech

15. Bhattarai, Sudeep. Spectrum Efficiency and Security in Dynamic Spectrum Sharing.

Degree: PhD, Electrical Engineering, 2018, Virginia Tech

 We are in the midst of a major paradigm shift in how we manage the radio spectrum. This paradigm shift in spectrum management from exclusive… (more)

Subjects/Keywords: Dynamic spectrum access; aggregate interference; dynamic exclusion zones; spectrum efficiency; 802.11ax; operational security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhattarai, S. (2018). Spectrum Efficiency and Security in Dynamic Spectrum Sharing. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/82872

Chicago Manual of Style (16th Edition):

Bhattarai, Sudeep. “Spectrum Efficiency and Security in Dynamic Spectrum Sharing.” 2018. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/82872.

MLA Handbook (7th Edition):

Bhattarai, Sudeep. “Spectrum Efficiency and Security in Dynamic Spectrum Sharing.” 2018. Web. 25 Feb 2020.

Vancouver:

Bhattarai S. Spectrum Efficiency and Security in Dynamic Spectrum Sharing. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/82872.

Council of Science Editors:

Bhattarai S. Spectrum Efficiency and Security in Dynamic Spectrum Sharing. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/82872


Virginia Tech

16. Anwar, Ali. Towards Efficient and Flexible Object Storage Using Resource and Functional Partitioning.

Degree: PhD, Computer Science, 2018, Virginia Tech

 Modern storage systems are designed to manage data without considering the dynamicity of user or resource requirements. This design approach does not consider the complexities… (more)

Subjects/Keywords: Object Stores; Key-Value Stores; Flexibility; Efficiency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anwar, A. (2018). Towards Efficient and Flexible Object Storage Using Resource and Functional Partitioning. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83508

Chicago Manual of Style (16th Edition):

Anwar, Ali. “Towards Efficient and Flexible Object Storage Using Resource and Functional Partitioning.” 2018. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/83508.

MLA Handbook (7th Edition):

Anwar, Ali. “Towards Efficient and Flexible Object Storage Using Resource and Functional Partitioning.” 2018. Web. 25 Feb 2020.

Vancouver:

Anwar A. Towards Efficient and Flexible Object Storage Using Resource and Functional Partitioning. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/83508.

Council of Science Editors:

Anwar A. Towards Efficient and Flexible Object Storage Using Resource and Functional Partitioning. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83508


Virginia Tech

17. Zhang, Hao. Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection.

Degree: PhD, Computer Science, 2015, Virginia Tech

 An increasing variety of malware, including spyware, worms, and bots, threatens data confidentiality and system integrity on computing devices ranging from backend servers to mobile… (more)

Subjects/Keywords: Network Security; Stealthy Malware; Anomaly Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2015). Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/64246

Chicago Manual of Style (16th Edition):

Zhang, Hao. “Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection.” 2015. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/64246.

MLA Handbook (7th Edition):

Zhang, Hao. “Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection.” 2015. Web. 25 Feb 2020.

Vancouver:

Zhang H. Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/64246.

Council of Science Editors:

Zhang H. Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/64246


Virginia Tech

18. Xu, Kui. Anomaly Detection Through System and Program Behavior Modeling.

Degree: PhD, Computer Science, 2014, Virginia Tech

 Various vulnerabilities in software applications become easy targets for attackers. The trend constantly being observed in the evolution of advanced modern exploits is their growing… (more)

Subjects/Keywords: Security; Anomaly Detection; Drive-by Download Detection; Program Analysis; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, K. (2014). Anomaly Detection Through System and Program Behavior Modeling. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/51140

Chicago Manual of Style (16th Edition):

Xu, Kui. “Anomaly Detection Through System and Program Behavior Modeling.” 2014. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/51140.

MLA Handbook (7th Edition):

Xu, Kui. “Anomaly Detection Through System and Program Behavior Modeling.” 2014. Web. 25 Feb 2020.

Vancouver:

Xu K. Anomaly Detection Through System and Program Behavior Modeling. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/51140.

Council of Science Editors:

Xu K. Anomaly Detection Through System and Program Behavior Modeling. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/51140


Virginia Tech

19. Shu, Xiaokui. Threat Detection in Program Execution and Data Movement: Theory and Practice.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Program attacks are one of the oldest and fundamental cyber threats. They compromise the confidentiality of data, the integrity of program logic, and the availability… (more)

Subjects/Keywords: Cybersecurity; Program Anomaly Detection; Data Leak Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shu, X. (2016). Threat Detection in Program Execution and Data Movement: Theory and Practice. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/71463

Chicago Manual of Style (16th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/71463.

MLA Handbook (7th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Web. 25 Feb 2020.

Vancouver:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/71463.

Council of Science Editors:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/71463


Virginia Tech

20. Sun, Maoyuan. Visual Analytics with Biclusters: Exploring Coordinated Relationships in Context.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Exploring coordinated relationships is an important task in data analytics. For example, an intelligence analyst may want to find three suspicious people who all visited… (more)

Subjects/Keywords: visual analytics; biclusters; coordinated relationship; edge bundling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, M. (2016). Visual Analytics with Biclusters: Exploring Coordinated Relationships in Context. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/72890

Chicago Manual of Style (16th Edition):

Sun, Maoyuan. “Visual Analytics with Biclusters: Exploring Coordinated Relationships in Context.” 2016. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/72890.

MLA Handbook (7th Edition):

Sun, Maoyuan. “Visual Analytics with Biclusters: Exploring Coordinated Relationships in Context.” 2016. Web. 25 Feb 2020.

Vancouver:

Sun M. Visual Analytics with Biclusters: Exploring Coordinated Relationships in Context. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/72890.

Council of Science Editors:

Sun M. Visual Analytics with Biclusters: Exploring Coordinated Relationships in Context. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/72890


Virginia Tech

21. Kumar, Vireshwar. Transmitter Authentication in Dynamic Spectrum Sharing.

Degree: PhD, Electrical and Computer Engineering, 2017, Virginia Tech

 Recent advances in spectrum access technologies, such as software-defined radios, have made dynamic spectrum sharing (DSS) a viable option for addressing the spectrum shortage problem.… (more)

Subjects/Keywords: Dynamic spectrum sharing; spectrum security and enforcement; privacy-preserving authentication; anonymous attestation; blind authentication.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, V. (2017). Transmitter Authentication in Dynamic Spectrum Sharing. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/74917

Chicago Manual of Style (16th Edition):

Kumar, Vireshwar. “Transmitter Authentication in Dynamic Spectrum Sharing.” 2017. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/74917.

MLA Handbook (7th Edition):

Kumar, Vireshwar. “Transmitter Authentication in Dynamic Spectrum Sharing.” 2017. Web. 25 Feb 2020.

Vancouver:

Kumar V. Transmitter Authentication in Dynamic Spectrum Sharing. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/74917.

Council of Science Editors:

Kumar V. Transmitter Authentication in Dynamic Spectrum Sharing. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/74917


Virginia Tech

22. Aysu, Aydin. Resource-constrained and Resource-efficient Modern Cryptosystem Design.

Degree: PhD, Electrical and ComputerEngineering, 2016, Virginia Tech

 In the context of a system design, resource-constraints refer to severe restrictions on allowable resources, while resource-efficiency is the capability to achieve a desired performance… (more)

Subjects/Keywords: Embedded Systems; Lightweight Cryptography; Post-quantum Cryptography; Physical Unclonable Functions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aysu, A. (2016). Resource-constrained and Resource-efficient Modern Cryptosystem Design. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78469

Chicago Manual of Style (16th Edition):

Aysu, Aydin. “Resource-constrained and Resource-efficient Modern Cryptosystem Design.” 2016. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/78469.

MLA Handbook (7th Edition):

Aysu, Aydin. “Resource-constrained and Resource-efficient Modern Cryptosystem Design.” 2016. Web. 25 Feb 2020.

Vancouver:

Aysu A. Resource-constrained and Resource-efficient Modern Cryptosystem Design. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/78469.

Council of Science Editors:

Aysu A. Resource-constrained and Resource-efficient Modern Cryptosystem Design. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/78469


Virginia Tech

23. Butler, Patrick Julian Carey. Knowledge Discovery in Intelligence Analysis.

Degree: PhD, Computer Science, 2014, Virginia Tech

 Intelligence analysts today are faced with many challenges, chief among them being the need to fuse disparate streams of data, as well as rapidly arrive… (more)

Subjects/Keywords: Data mining; intelligence analysis; deshredding; forecasting

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Butler, P. J. C. (2014). Knowledge Discovery in Intelligence Analysis. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/48422

Chicago Manual of Style (16th Edition):

Butler, Patrick Julian Carey. “Knowledge Discovery in Intelligence Analysis.” 2014. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/48422.

MLA Handbook (7th Edition):

Butler, Patrick Julian Carey. “Knowledge Discovery in Intelligence Analysis.” 2014. Web. 25 Feb 2020.

Vancouver:

Butler PJC. Knowledge Discovery in Intelligence Analysis. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/48422.

Council of Science Editors:

Butler PJC. Knowledge Discovery in Intelligence Analysis. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/48422


Virginia Tech

24. Yan, Qiben. Security Enhanced Communications in Cognitive Networks.

Degree: PhD, Computer Science, 2014, Virginia Tech

 With the advent of ubiquitous computing and Internet of Things (IoT), potentially billions of devices will create a broad range of data services and applications,… (more)

Subjects/Keywords: cognitive network security; cognitive radio network; reactive jamming attack; network monitoring; botnet detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yan, Q. (2014). Security Enhanced Communications in Cognitive Networks. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49704

Chicago Manual of Style (16th Edition):

Yan, Qiben. “Security Enhanced Communications in Cognitive Networks.” 2014. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/49704.

MLA Handbook (7th Edition):

Yan, Qiben. “Security Enhanced Communications in Cognitive Networks.” 2014. Web. 25 Feb 2020.

Vancouver:

Yan Q. Security Enhanced Communications in Cognitive Networks. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/49704.

Council of Science Editors:

Yan Q. Security Enhanced Communications in Cognitive Networks. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49704

25. Gao, Bo. Coexistence of Wireless Networks for Shared Spectrum Access.

Degree: PhD, Electrical and Computer Engineering, 2014, Virginia Tech

 The radio frequency spectrum is not being efficiently utilized partly due to the current policy of allocating the frequency bands to specific services and users.… (more)

Subjects/Keywords: Opportunistic Spectrum Access; Cognitive Radio Networks; White Space Networks; Shared Spectrum Access; Spectrum Sharing; Network Coexistence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, B. (2014). Coexistence of Wireless Networks for Shared Spectrum Access. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/50525

Chicago Manual of Style (16th Edition):

Gao, Bo. “Coexistence of Wireless Networks for Shared Spectrum Access.” 2014. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/50525.

MLA Handbook (7th Edition):

Gao, Bo. “Coexistence of Wireless Networks for Shared Spectrum Access.” 2014. Web. 25 Feb 2020.

Vancouver:

Gao B. Coexistence of Wireless Networks for Shared Spectrum Access. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/50525.

Council of Science Editors:

Gao B. Coexistence of Wireless Networks for Shared Spectrum Access. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/50525


Virginia Tech

26. Lerner, Lee Wilmoth. Trustworthy Embedded Computing for Cyber-Physical Control.

Degree: PhD, Electrical and Computer Engineering, 2015, Virginia Tech

 A cyber-physical controller (CPC) uses computing to control a physical process. Example CPCs can be found in self-driving automobiles, unmanned aerial vehicles, and other autonomous… (more)

Subjects/Keywords: Trustworthy Computing; Secure Computing; Autonomic Computing; Cybersecurity; Embedded Systems; Cyber-Physical Systems; Process Control Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lerner, L. W. (2015). Trustworthy Embedded Computing for Cyber-Physical Control. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/51545

Chicago Manual of Style (16th Edition):

Lerner, Lee Wilmoth. “Trustworthy Embedded Computing for Cyber-Physical Control.” 2015. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/51545.

MLA Handbook (7th Edition):

Lerner, Lee Wilmoth. “Trustworthy Embedded Computing for Cyber-Physical Control.” 2015. Web. 25 Feb 2020.

Vancouver:

Lerner LW. Trustworthy Embedded Computing for Cyber-Physical Control. [Internet] [Doctoral dissertation]. Virginia Tech; 2015. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/51545.

Council of Science Editors:

Lerner LW. Trustworthy Embedded Computing for Cyber-Physical Control. [Doctoral Dissertation]. Virginia Tech; 2015. Available from: http://hdl.handle.net/10919/51545


Virginia Tech

27. Almohri, Hussain. High Assurance Models for Secure Systems.

Degree: PhD, Computer Science, 2013, Virginia Tech

 Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service… (more)

Subjects/Keywords: Systems Security; Authentication; Mathematical Programming; Optimization; Security Risk

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almohri, H. (2013). High Assurance Models for Secure Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/22030

Chicago Manual of Style (16th Edition):

Almohri, Hussain. “High Assurance Models for Secure Systems.” 2013. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/22030.

MLA Handbook (7th Edition):

Almohri, Hussain. “High Assurance Models for Secure Systems.” 2013. Web. 25 Feb 2020.

Vancouver:

Almohri H. High Assurance Models for Secure Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/22030.

Council of Science Editors:

Almohri H. High Assurance Models for Secure Systems. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/22030


Virginia Tech

28. Xiong, Huijun. Secure Data Service Outsourcing with Untrusted Cloud.

Degree: PhD, Computer Science, 2013, Virginia Tech

 Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on… (more)

Subjects/Keywords: Cloud Computing; Outsource Data Security; Proxy Re-encryption; Content Delivery Network; Key Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiong, H. (2013). Secure Data Service Outsourcing with Untrusted Cloud. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/23191

Chicago Manual of Style (16th Edition):

Xiong, Huijun. “Secure Data Service Outsourcing with Untrusted Cloud.” 2013. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/23191.

MLA Handbook (7th Edition):

Xiong, Huijun. “Secure Data Service Outsourcing with Untrusted Cloud.” 2013. Web. 25 Feb 2020.

Vancouver:

Xiong H. Secure Data Service Outsourcing with Untrusted Cloud. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/23191.

Council of Science Editors:

Xiong H. Secure Data Service Outsourcing with Untrusted Cloud. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/23191


Virginia Tech

29. Wang, Ting. Wireless Network Physical Layer Security with Smart Antenna.

Degree: PhD, Electrical and Computer Engineering, 2013, Virginia Tech

 Smart antenna technique has emerged as one of the leading technologies for enhancing the quality of service in wireless networks. Because of its ability to… (more)

Subjects/Keywords: Wireless Network Security; Localization; Location privacy; Anti-eavesdropping; Smart Antenna; Beamforming; Location Spoofing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, T. (2013). Wireless Network Physical Layer Security with Smart Antenna. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/23243

Chicago Manual of Style (16th Edition):

Wang, Ting. “Wireless Network Physical Layer Security with Smart Antenna.” 2013. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/23243.

MLA Handbook (7th Edition):

Wang, Ting. “Wireless Network Physical Layer Security with Smart Antenna.” 2013. Web. 25 Feb 2020.

Vancouver:

Wang T. Wireless Network Physical Layer Security with Smart Antenna. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/23243.

Council of Science Editors:

Wang T. Wireless Network Physical Layer Security with Smart Antenna. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/23243


Virginia Tech

30. Lu, Peng. Resilire: Achieving High Availability Through Virtual Machine Live Migration.

Degree: PhD, Electrical and Computer Engineering, 2013, Virginia Tech

 High availability is a critical feature of data centers, cloud, and cluster computing environments. Replication is a classical approach to increase service availability by providing… (more)

Subjects/Keywords: High Availability; Virtual Machine; Live Migration; Checkpointing; Load Balancing; Downtime; Xen; Hypervisor

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, P. (2013). Resilire: Achieving High Availability Through Virtual Machine Live Migration. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/25434

Chicago Manual of Style (16th Edition):

Lu, Peng. “Resilire: Achieving High Availability Through Virtual Machine Live Migration.” 2013. Doctoral Dissertation, Virginia Tech. Accessed February 25, 2020. http://hdl.handle.net/10919/25434.

MLA Handbook (7th Edition):

Lu, Peng. “Resilire: Achieving High Availability Through Virtual Machine Live Migration.” 2013. Web. 25 Feb 2020.

Vancouver:

Lu P. Resilire: Achieving High Availability Through Virtual Machine Live Migration. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2020 Feb 25]. Available from: http://hdl.handle.net/10919/25434.

Council of Science Editors:

Lu P. Resilire: Achieving High Availability Through Virtual Machine Live Migration. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/25434

[1] [2]

.