Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Signature generation). Showing records 1 – 17 of 17 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Rice, Brandon. Automated snort signature generation.

Degree: 2014, James Madison University

 Network intrusion systems work on many models, but at their core they rely on algorithms to process data and determine if the network traffic is… (more)

Subjects/Keywords: snort; signature; generation; automated; IDS; IPS; intrusion; detection; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rice, B. (2014). Automated snort signature generation. (Masters Thesis). James Madison University. Retrieved from https://commons.lib.jmu.edu/master201019/301

Chicago Manual of Style (16th Edition):

Rice, Brandon. “Automated snort signature generation.” 2014. Masters Thesis, James Madison University. Accessed March 08, 2021. https://commons.lib.jmu.edu/master201019/301.

MLA Handbook (7th Edition):

Rice, Brandon. “Automated snort signature generation.” 2014. Web. 08 Mar 2021.

Vancouver:

Rice B. Automated snort signature generation. [Internet] [Masters thesis]. James Madison University; 2014. [cited 2021 Mar 08]. Available from: https://commons.lib.jmu.edu/master201019/301.

Council of Science Editors:

Rice B. Automated snort signature generation. [Masters Thesis]. James Madison University; 2014. Available from: https://commons.lib.jmu.edu/master201019/301


University of Michigan

2. Hu, Xin. Large Scale Malware Analysis, Detection and Signature Generation.

Degree: PhD, Computer Science & Engineering, 2011, University of Michigan

 As the primary vehicle for most organized cybercrimes, malicious software (or malware) has become one of the most serious threats to computer systems and the… (more)

Subjects/Keywords: Computer Security; Malware Analysis and Detection; Large-Scale Systems; Malware Clustering; Malware Signature Generation; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, X. (2011). Large Scale Malware Analysis, Detection and Signature Generation. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/89760

Chicago Manual of Style (16th Edition):

Hu, Xin. “Large Scale Malware Analysis, Detection and Signature Generation.” 2011. Doctoral Dissertation, University of Michigan. Accessed March 08, 2021. http://hdl.handle.net/2027.42/89760.

MLA Handbook (7th Edition):

Hu, Xin. “Large Scale Malware Analysis, Detection and Signature Generation.” 2011. Web. 08 Mar 2021.

Vancouver:

Hu X. Large Scale Malware Analysis, Detection and Signature Generation. [Internet] [Doctoral dissertation]. University of Michigan; 2011. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/2027.42/89760.

Council of Science Editors:

Hu X. Large Scale Malware Analysis, Detection and Signature Generation. [Doctoral Dissertation]. University of Michigan; 2011. Available from: http://hdl.handle.net/2027.42/89760

3. Silva, Raphael Campos [UNESP]. Malflow: um framework para geração automatizada de assinaturas de malwares baseado em fluxo de dados de rede.

Degree: 2017, Universidade Estadual Paulista

A garantia de segurança em ambientes computacionais é complexa, uma vez que a expertise dos atacantes e o número de ameaças têm aumentado. De forma… (more)

Subjects/Keywords: Malware; Análise dinâmica; Mecanismo de geração de assinatura; Geração automatizada de assinatura; Sistemas de detecção de intrusão baseados em rede; Dynamic analysis; Signature generation mechanism; Automated signature generation; Network intrusion detection systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Silva, R. C. [. (2017). Malflow: um framework para geração automatizada de assinaturas de malwares baseado em fluxo de dados de rede. (Thesis). Universidade Estadual Paulista. Retrieved from http://hdl.handle.net/11449/148745

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Silva, Raphael Campos [UNESP]. “Malflow: um framework para geração automatizada de assinaturas de malwares baseado em fluxo de dados de rede.” 2017. Thesis, Universidade Estadual Paulista. Accessed March 08, 2021. http://hdl.handle.net/11449/148745.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Silva, Raphael Campos [UNESP]. “Malflow: um framework para geração automatizada de assinaturas de malwares baseado em fluxo de dados de rede.” 2017. Web. 08 Mar 2021.

Vancouver:

Silva RC[. Malflow: um framework para geração automatizada de assinaturas de malwares baseado em fluxo de dados de rede. [Internet] [Thesis]. Universidade Estadual Paulista; 2017. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/11449/148745.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Silva RC[. Malflow: um framework para geração automatizada de assinaturas de malwares baseado em fluxo de dados de rede. [Thesis]. Universidade Estadual Paulista; 2017. Available from: http://hdl.handle.net/11449/148745

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Coutinho Canuto, Jânio. Biomechanical online signature modeling applied to verification : Modélisation biomécanique des signatures en ligne appliqué à la vérification.

Degree: Docteur es, Informatique, 2014, Evry, Institut national des télécommunications

Cette thèse porte sur la modélisation et vérification des signatures en ligne. La première partie a pour thème principal la modélisation biomécanique des mouvements de… (more)

Subjects/Keywords: Biométrique; Vérification des signatures; Modélisation; Jerk minimum; Infinity clipping; Complexité de Lempel-Ziv; Représentation symbolique; Génération de signatures; Biometrics; Signature verification; Modeling; Minimum jerk; Infinity clipping; Lempel-Ziv complexity; Symbolic representation; Signature generation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coutinho Canuto, J. (2014). Biomechanical online signature modeling applied to verification : Modélisation biomécanique des signatures en ligne appliqué à la vérification. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2014TELE0026

Chicago Manual of Style (16th Edition):

Coutinho Canuto, Jânio. “Biomechanical online signature modeling applied to verification : Modélisation biomécanique des signatures en ligne appliqué à la vérification.” 2014. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed March 08, 2021. http://www.theses.fr/2014TELE0026.

MLA Handbook (7th Edition):

Coutinho Canuto, Jânio. “Biomechanical online signature modeling applied to verification : Modélisation biomécanique des signatures en ligne appliqué à la vérification.” 2014. Web. 08 Mar 2021.

Vancouver:

Coutinho Canuto J. Biomechanical online signature modeling applied to verification : Modélisation biomécanique des signatures en ligne appliqué à la vérification. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2014. [cited 2021 Mar 08]. Available from: http://www.theses.fr/2014TELE0026.

Council of Science Editors:

Coutinho Canuto J. Biomechanical online signature modeling applied to verification : Modélisation biomécanique des signatures en ligne appliqué à la vérification. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2014. Available from: http://www.theses.fr/2014TELE0026

5. HUANG MINI. BIOINFORMATIC ANALYSIS OF PHYSICAL MUTATION SIGNATURES IN TUMORS TO INFER CARCINOGENIC PROCESSES AND EXPOSURES.

Degree: 2016, National University of Singapore

Subjects/Keywords: Next generation sequencing; Mutation signature; Microsatellite instability; Aristolochic acid exposure; Aflatoxin exposure; NMF

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MINI, H. (2016). BIOINFORMATIC ANALYSIS OF PHYSICAL MUTATION SIGNATURES IN TUMORS TO INFER CARCINOGENIC PROCESSES AND EXPOSURES. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/135174

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MINI, HUANG. “BIOINFORMATIC ANALYSIS OF PHYSICAL MUTATION SIGNATURES IN TUMORS TO INFER CARCINOGENIC PROCESSES AND EXPOSURES.” 2016. Thesis, National University of Singapore. Accessed March 08, 2021. http://scholarbank.nus.edu.sg/handle/10635/135174.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MINI, HUANG. “BIOINFORMATIC ANALYSIS OF PHYSICAL MUTATION SIGNATURES IN TUMORS TO INFER CARCINOGENIC PROCESSES AND EXPOSURES.” 2016. Web. 08 Mar 2021.

Vancouver:

MINI H. BIOINFORMATIC ANALYSIS OF PHYSICAL MUTATION SIGNATURES IN TUMORS TO INFER CARCINOGENIC PROCESSES AND EXPOSURES. [Internet] [Thesis]. National University of Singapore; 2016. [cited 2021 Mar 08]. Available from: http://scholarbank.nus.edu.sg/handle/10635/135174.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MINI H. BIOINFORMATIC ANALYSIS OF PHYSICAL MUTATION SIGNATURES IN TUMORS TO INFER CARCINOGENIC PROCESSES AND EXPOSURES. [Thesis]. National University of Singapore; 2016. Available from: http://scholarbank.nus.edu.sg/handle/10635/135174

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

6. Cai, Min. Distributed indexing and aggregation techniques for peer-to-peer and grid computing.

Degree: PhD, Computer Science, 2006, University of Southern California

 Peer-to-Peer (P2P) systems and Grids are emerging as two novel paradigms of distributed computing for wide-area resource sharing on the Internet. In these two paradigms,… (more)

Subjects/Keywords: distributed indexing; distributed aggregation; peer-to-peer computing; grid computing; worm signature generation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cai, M. (2006). Distributed indexing and aggregation techniques for peer-to-peer and grid computing. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/34426/rec/2049

Chicago Manual of Style (16th Edition):

Cai, Min. “Distributed indexing and aggregation techniques for peer-to-peer and grid computing.” 2006. Doctoral Dissertation, University of Southern California. Accessed March 08, 2021. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/34426/rec/2049.

MLA Handbook (7th Edition):

Cai, Min. “Distributed indexing and aggregation techniques for peer-to-peer and grid computing.” 2006. Web. 08 Mar 2021.

Vancouver:

Cai M. Distributed indexing and aggregation techniques for peer-to-peer and grid computing. [Internet] [Doctoral dissertation]. University of Southern California; 2006. [cited 2021 Mar 08]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/34426/rec/2049.

Council of Science Editors:

Cai M. Distributed indexing and aggregation techniques for peer-to-peer and grid computing. [Doctoral Dissertation]. University of Southern California; 2006. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/34426/rec/2049


Texas Medical Center

7. hu, Xin. INTEGRATIVE ANALYSIS OF OMICS DATA IN ADULT GLIOMA AND OTHER TCGA CANCERS TO GUIDE PRECISION MEDICINE.

Degree: PhD, 2017, Texas Medical Center

  Transcriptomic profiling and gene expression signatures have been widely applied as effective approaches for enhancing the molecular classification, diagnosis, prognosis or prediction of therapeutic… (more)

Subjects/Keywords: Cancer genomics; Omics data mining; Transcriptomics profiling; Gene signature; Risk prediction; Tumor microenvironment; Precision medicine; Glioma; Pan-cancer; Fusion transcripts; Genomic rearrangement; Next-generation sequencing; Prediction model; Disease Modeling; Health Information Technology; Medicine and Health Sciences; Translational Medical Research

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

hu, X. (2017). INTEGRATIVE ANALYSIS OF OMICS DATA IN ADULT GLIOMA AND OTHER TCGA CANCERS TO GUIDE PRECISION MEDICINE. (Doctoral Dissertation). Texas Medical Center. Retrieved from https://digitalcommons.library.tmc.edu/utgsbs_dissertations/729

Chicago Manual of Style (16th Edition):

hu, Xin. “INTEGRATIVE ANALYSIS OF OMICS DATA IN ADULT GLIOMA AND OTHER TCGA CANCERS TO GUIDE PRECISION MEDICINE.” 2017. Doctoral Dissertation, Texas Medical Center. Accessed March 08, 2021. https://digitalcommons.library.tmc.edu/utgsbs_dissertations/729.

MLA Handbook (7th Edition):

hu, Xin. “INTEGRATIVE ANALYSIS OF OMICS DATA IN ADULT GLIOMA AND OTHER TCGA CANCERS TO GUIDE PRECISION MEDICINE.” 2017. Web. 08 Mar 2021.

Vancouver:

hu X. INTEGRATIVE ANALYSIS OF OMICS DATA IN ADULT GLIOMA AND OTHER TCGA CANCERS TO GUIDE PRECISION MEDICINE. [Internet] [Doctoral dissertation]. Texas Medical Center; 2017. [cited 2021 Mar 08]. Available from: https://digitalcommons.library.tmc.edu/utgsbs_dissertations/729.

Council of Science Editors:

hu X. INTEGRATIVE ANALYSIS OF OMICS DATA IN ADULT GLIOMA AND OTHER TCGA CANCERS TO GUIDE PRECISION MEDICINE. [Doctoral Dissertation]. Texas Medical Center; 2017. Available from: https://digitalcommons.library.tmc.edu/utgsbs_dissertations/729


Brno University of Technology

8. Bláha, Lukáš. Analýza automatizovaného generování signatur s využitím Honeypotu: Analysis of Automated Generation of Signatures Using Honeypots.

Degree: 2019, Brno University of Technology

 In this paper, system of automatic processing of attacks using honeypots is discussed. The first goal of the thesis is to become familiar with the… (more)

Subjects/Keywords: Signatura; detekční profil; automatické generování signatur; honeypot; škodlivý software; systém detekce průniku; zero-day útok; buffer overflow útok.; Signature; detection profile; automatic generation of signatures; honeypot; malware; intrusion detection system; zero-day attack; buffer overflow attack.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bláha, L. (2019). Analýza automatizovaného generování signatur s využitím Honeypotu: Analysis of Automated Generation of Signatures Using Honeypots. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/53573

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bláha, Lukáš. “Analýza automatizovaného generování signatur s využitím Honeypotu: Analysis of Automated Generation of Signatures Using Honeypots.” 2019. Thesis, Brno University of Technology. Accessed March 08, 2021. http://hdl.handle.net/11012/53573.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bláha, Lukáš. “Analýza automatizovaného generování signatur s využitím Honeypotu: Analysis of Automated Generation of Signatures Using Honeypots.” 2019. Web. 08 Mar 2021.

Vancouver:

Bláha L. Analýza automatizovaného generování signatur s využitím Honeypotu: Analysis of Automated Generation of Signatures Using Honeypots. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/11012/53573.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bláha L. Analýza automatizovaného generování signatur s využitím Honeypotu: Analysis of Automated Generation of Signatures Using Honeypots. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/53573

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Wang, Xian. Enabling low cost test and tuning of difficult-to-measure device specifications: application to DC-DC converters and high speed devices.

Degree: PhD, Electrical and Computer Engineering, 2015, Georgia Tech

 Low-cost test and tuning methods for difficult-to-measure specifications are presented in this research from the following perspectives: 1)"Safe" test and self-tuning for power converters: To… (more)

Subjects/Keywords: Signature test; RF signal generation; Power converter test; Built-in test; DFT; Alternative testing

…x29; signature test. ...... 5 Figure 5: Overview of the alternative test procedure… …88 Figure 66: Block diagram of proposed band-limited channel interference generation with a… …100 xii Figure 69: Simulation on phase noise generation: (a) injected phase… …101 Figure 70: Simulation on minimum shift keying (MSK) waveform generation with… …112 Figure 81: Waveforms of entire RF signal generation process… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, X. (2015). Enabling low cost test and tuning of difficult-to-measure device specifications: application to DC-DC converters and high speed devices. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/53521

Chicago Manual of Style (16th Edition):

Wang, Xian. “Enabling low cost test and tuning of difficult-to-measure device specifications: application to DC-DC converters and high speed devices.” 2015. Doctoral Dissertation, Georgia Tech. Accessed March 08, 2021. http://hdl.handle.net/1853/53521.

MLA Handbook (7th Edition):

Wang, Xian. “Enabling low cost test and tuning of difficult-to-measure device specifications: application to DC-DC converters and high speed devices.” 2015. Web. 08 Mar 2021.

Vancouver:

Wang X. Enabling low cost test and tuning of difficult-to-measure device specifications: application to DC-DC converters and high speed devices. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/1853/53521.

Council of Science Editors:

Wang X. Enabling low cost test and tuning of difficult-to-measure device specifications: application to DC-DC converters and high speed devices. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/53521


University of Tennessee – Knoxville

10. Freeman, Elton Lewis. Validation of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation.

Degree: MS, Engineering Science, 2012, University of Tennessee – Knoxville

  Extremization of a weak form for the continuum energy conservation principle differential equation naturally implements fluid convection and radiation as flux Robin boundary conditions… (more)

Subjects/Keywords: Algorithms; Thermal Signature Generation; Finite Elements; Computer Engineering; Engineering Physics; Engineering Science and Materials; Fluid Dynamics; Mechanical Engineering; Numerical Analysis and Computation; Numerical Analysis and Scientific Computing; Ordinary Differential Equations and Applied Dynamics; Other Mathematics; Partial Differential Equations; Software Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Freeman, E. L. (2012). Validation of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/1377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Freeman, Elton Lewis. “Validation of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation.” 2012. Thesis, University of Tennessee – Knoxville. Accessed March 08, 2021. https://trace.tennessee.edu/utk_gradthes/1377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Freeman, Elton Lewis. “Validation of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation.” 2012. Web. 08 Mar 2021.

Vancouver:

Freeman EL. Validation of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation. [Internet] [Thesis]. University of Tennessee – Knoxville; 2012. [cited 2021 Mar 08]. Available from: https://trace.tennessee.edu/utk_gradthes/1377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Freeman EL. Validation of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation. [Thesis]. University of Tennessee – Knoxville; 2012. Available from: https://trace.tennessee.edu/utk_gradthes/1377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Miami University

11. Amjad, Meisam. Lightmap Generation and Parameterizationfor Real-Time 3D Infra-Red Scenes.

Degree: MS, Computer Science & Software Engineering, 2019, Miami University

 Having high resolution Infra-Red (IR) imagery in cluttered environment of battlespace iscrucial for capturing intelligence in search and target acquisition tasks such as whether or… (more)

Subjects/Keywords: Computer Science; lightmap parameterization; lightmap generation; dynamic scene; Real-Time scene; Infra-Red; 3D infra-Red Scene; lightmap for heat signature; lightmap for heat sources; 3D mesh to UV mesh parameterization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amjad, M. (2019). Lightmap Generation and Parameterizationfor Real-Time 3D Infra-Red Scenes. (Masters Thesis). Miami University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=miami1564675961391441

Chicago Manual of Style (16th Edition):

Amjad, Meisam. “Lightmap Generation and Parameterizationfor Real-Time 3D Infra-Red Scenes.” 2019. Masters Thesis, Miami University. Accessed March 08, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=miami1564675961391441.

MLA Handbook (7th Edition):

Amjad, Meisam. “Lightmap Generation and Parameterizationfor Real-Time 3D Infra-Red Scenes.” 2019. Web. 08 Mar 2021.

Vancouver:

Amjad M. Lightmap Generation and Parameterizationfor Real-Time 3D Infra-Red Scenes. [Internet] [Masters thesis]. Miami University; 2019. [cited 2021 Mar 08]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=miami1564675961391441.

Council of Science Editors:

Amjad M. Lightmap Generation and Parameterizationfor Real-Time 3D Infra-Red Scenes. [Masters Thesis]. Miami University; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=miami1564675961391441


University of Cincinnati

12. ABEYSINGHE, RUVINI PRADEEPA. SIGNATURE FILES FOR DOCUMENT MANAGEMENT.

Degree: MS, Engineering : Computer Science, 2001, University of Cincinnati

 A document management system, called SDMS (Signature-file Document Management System), has been designed and implemented. This system was designed based on the signature file method… (more)

Subjects/Keywords: Computer Science; SIGNATURE FILES; TEXT RETRIEVAL METHODS; INDEXING; DOCUMENT MANAGEMENT SYSTEM; PSEUDO RANDOM NUMBER GENERATION

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ABEYSINGHE, R. P. (2001). SIGNATURE FILES FOR DOCUMENT MANAGEMENT. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin990539054

Chicago Manual of Style (16th Edition):

ABEYSINGHE, RUVINI PRADEEPA. “SIGNATURE FILES FOR DOCUMENT MANAGEMENT.” 2001. Masters Thesis, University of Cincinnati. Accessed March 08, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin990539054.

MLA Handbook (7th Edition):

ABEYSINGHE, RUVINI PRADEEPA. “SIGNATURE FILES FOR DOCUMENT MANAGEMENT.” 2001. Web. 08 Mar 2021.

Vancouver:

ABEYSINGHE RP. SIGNATURE FILES FOR DOCUMENT MANAGEMENT. [Internet] [Masters thesis]. University of Cincinnati; 2001. [cited 2021 Mar 08]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin990539054.

Council of Science Editors:

ABEYSINGHE RP. SIGNATURE FILES FOR DOCUMENT MANAGEMENT. [Masters Thesis]. University of Cincinnati; 2001. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin990539054


University of Victoria

13. Elsayed, Mohamed Ahmed Seifeldin Mohamed. Blockchain-based containment of computer worms.

Degree: Department of Electrical and Computer Engineering, 2020, University of Victoria

 Information technology systems are essential for most businesses as they facilitate the handling and sharing of data and the execution of tasks. Due to connectivity… (more)

Subjects/Keywords: Worm Containment; Intrusion Response; Practical Byzantine Fault Tolerance (PBFT); Distributed Host-based Intrusion Prevention; Worm Signature Generation; Blockchain-based Containment; Dynamic Taint Analysis Detection; Vulnerability-based Worm Signatures; TLA+ Formal Method

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elsayed, M. A. S. M. (2020). Blockchain-based containment of computer worms. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/12492

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Elsayed, Mohamed Ahmed Seifeldin Mohamed. “Blockchain-based containment of computer worms.” 2020. Thesis, University of Victoria. Accessed March 08, 2021. http://hdl.handle.net/1828/12492.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Elsayed, Mohamed Ahmed Seifeldin Mohamed. “Blockchain-based containment of computer worms.” 2020. Web. 08 Mar 2021.

Vancouver:

Elsayed MASM. Blockchain-based containment of computer worms. [Internet] [Thesis]. University of Victoria; 2020. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/1828/12492.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Elsayed MASM. Blockchain-based containment of computer worms. [Thesis]. University of Victoria; 2020. Available from: http://hdl.handle.net/1828/12492

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


AUT University

14. Naidu, Vijay Jeevanantham. Identifying Polymorphic Malware Variants Using Biosequence Analysis Techniques .

Degree: AUT University

 Modern antivirus systems (AVSs) are not able to detect new polymorphic malware variants until they emerge, even when signatures of one or more variants belonging… (more)

Subjects/Keywords: Smith-Waterman algorithm; Dynamic programming; Polymorphic malware; Syntactic approach; Sequence alignment techniques; String matching algorithm; Biological sequences; Bioinformatics; Data mining; Automatic signature generation; Phylogenetics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naidu, V. J. (n.d.). Identifying Polymorphic Malware Variants Using Biosequence Analysis Techniques . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/12064

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Naidu, Vijay Jeevanantham. “Identifying Polymorphic Malware Variants Using Biosequence Analysis Techniques .” Thesis, AUT University. Accessed March 08, 2021. http://hdl.handle.net/10292/12064.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Naidu, Vijay Jeevanantham. “Identifying Polymorphic Malware Variants Using Biosequence Analysis Techniques .” Web. 08 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Naidu VJ. Identifying Polymorphic Malware Variants Using Biosequence Analysis Techniques . [Internet] [Thesis]. AUT University; [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10292/12064.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Naidu VJ. Identifying Polymorphic Malware Variants Using Biosequence Analysis Techniques . [Thesis]. AUT University; Available from: http://hdl.handle.net/10292/12064

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Brno University of Technology

15. Hrazdilová, Ivana. Analýza dat ze sekvenování příští generace ke studiu aktivity transposonů v nádorových buňkách: Analysis of NGS data for study of transposon activity in cancer cells.

Degree: 2018, Brno University of Technology

 Theoretical part of this diploma thesis gives a brief characteristic of human mobile elements (transposons), which represents nearly 50% of human genome. It provides basic… (more)

Subjects/Keywords: transposony; mobilní genetické elementy; LINE; L1; SINE; Alu; sekvenace nové generace; NGS; masivní paralelní sekvenování; RNA-seq; rakovina; single-end; paired-end; TopHat; Bowtie; transposons; mobile genetic elements; LINE; L1; SINE; Alu; next generation sequencing; NGS; massively paralell signature sequencing; RNA-seq; cancer; single-end; paired-end; TopHat; Bowtie

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hrazdilová, I. (2018). Analýza dat ze sekvenování příští generace ke studiu aktivity transposonů v nádorových buňkách: Analysis of NGS data for study of transposon activity in cancer cells. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/26155

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hrazdilová, Ivana. “Analýza dat ze sekvenování příští generace ke studiu aktivity transposonů v nádorových buňkách: Analysis of NGS data for study of transposon activity in cancer cells.” 2018. Thesis, Brno University of Technology. Accessed March 08, 2021. http://hdl.handle.net/11012/26155.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hrazdilová, Ivana. “Analýza dat ze sekvenování příští generace ke studiu aktivity transposonů v nádorových buňkách: Analysis of NGS data for study of transposon activity in cancer cells.” 2018. Web. 08 Mar 2021.

Vancouver:

Hrazdilová I. Analýza dat ze sekvenování příští generace ke studiu aktivity transposonů v nádorových buňkách: Analysis of NGS data for study of transposon activity in cancer cells. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/11012/26155.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hrazdilová I. Analýza dat ze sekvenování příští generace ke studiu aktivity transposonů v nádorových buňkách: Analysis of NGS data for study of transposon activity in cancer cells. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/26155

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Campbell, Keith A. Low-cost error detection through high-level synthesis.

Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign

 System-on-chip design is becoming increasingly complex as technology scaling enables more and more functionality on a chip. This scaling and complexity has resulted in a… (more)

Subjects/Keywords: High-level synthesis; Automation; error detection; scheduling; binding; compiler transformation; compiler optimization; pipelining; modulo arithmetic; logic optimization; state machine; datapath, control logic; shadow logic; low cost; high performance; electrical bugs; Aliasing; stuck-at faults; soft errors; timing errors; checkpointing; rollback; recovery; post-silicon validation; Accelerators; system on a chip; signature generation; execution signatures; execution hashing; logic bugs; nondeterministic bugs; masked errors; circuit reliability; hot spots; wear out; silent data corruption; observability; detection latency; mixed datapath; diversity; checkpoint corruption; error injection; error removal; Quick Error Detection (QED); Hybrid Quick Error Detection (H-QED); hybrid hardware/software; execution tracing; address conversion; undefined behavior; High-Level Synthesis (HLS) engine bugs; detection coverage

…resources. In Chapter 4, I propose the insertion of signature generation logic in a hardware… …design to create a heavily compressed signature stream that captures the internal behavior of… …identifying important variables to capture and enabling the sharing of expensive signature… …generation logic. Before these main chapters, I will provide some background on the reliability and… …dynamic values during hardware execution. An execution signature is a hashed trace of the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Campbell, K. A. (2015). Low-cost error detection through high-level synthesis. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/89068

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Campbell, Keith A. “Low-cost error detection through high-level synthesis.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed March 08, 2021. http://hdl.handle.net/2142/89068.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Campbell, Keith A. “Low-cost error detection through high-level synthesis.” 2015. Web. 08 Mar 2021.

Vancouver:

Campbell KA. Low-cost error detection through high-level synthesis. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/2142/89068.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Campbell KA. Low-cost error detection through high-level synthesis. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/89068

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Campbell, Keith A. Robust and reliable hardware accelerator design through high-level synthesis.

Degree: PhD, Electrical & Computer Engr, 2017, University of Illinois – Urbana-Champaign

 System-on-chip design is becoming increasingly complex as technology scaling enables more and more functionality on a chip. This scaling-driven complexity has resulted in a variety… (more)

Subjects/Keywords: High-level synthesis (HLS); Automation; Error detection; Scheduling; Binding; Compiler transformation; Compiler optimization; Pipelining; Modulo arithmetic; Modulo-3; Logic optimization; State machine; Datapath; Control logic; Shadow datapath; Modulo datapath; Low cost; High performance; Electrical bug; Aliasing; Stuck-at fault; Soft error; Timing error; Checkpointing; Rollback; Recovery; Pre-silicon validation; Post-silicon validation; Pre-silicon debug; Post-silicon debug; Accelerator; System on a chip; Signature generation; Execution signature; Execution hash; Logic bug; Nondeterministic bug; Masked error; Circuit reliability; Hot spot; Wear out; Silent data corruption; Observability; Detection latency; Mixed datapath; Diversity; Checkpoint corruption; Error injection; Error removal; Quick Error Detection (QED); Hybrid Quick Error Detection (H-QED); Instrumentation; Hybrid co-simulation; Hardware/software; Integration testing; Hybrid tracing; Hybrid hashing; Source-code localization; Software debugging tool; Valgrind; Clang sanitizer; Clang static analyzer; Cppcheck; Root cause analysis; Execution tracing; Realtime error detection; Simulation trigger; Nonintrusive; Address conversion; Undefined behavior; High-level synthesis (HLS) bug; Detection coverage; Gate-level architecture; Mersenne modulus; Full adder; Half adder; Quarter adder; Wraparound; Modulo reducer; Modulo adder; Modulo multiplier; Modulo comparator; Cross-layer; Algorithm; Instruction; Architecture; Logic synthesis; Physical design; Algorithm-based fault tolerance (ABFT); Error detection by duplicated instructions (EDDI); Parity; Flip-flop hardening; Layout design through error-aware transistor positioning dual interlocked storage cell (LEAP-DICE); Cost-effective; Place-and-route; Field programmable gate array (FPGA) emulation; Application specific integrated circuit (ASIC); Field programmable gate array (FPGA); Energy; Area; Latency

signature generation logic into a fabricated hardware design to create a heavily compressed… …variables to capture and enabling the sharing of expensive signature generation logic. In Chapter… …signature stream that captures the internal behavior of the design during post-silicon validation… …generation of these units. We show that the use of these new functional units reduces shadow… …execution. An execution signature is a hashed trace of the dynamic value of variables during… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Campbell, K. A. (2017). Robust and reliable hardware accelerator design through high-level synthesis. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/99294

Chicago Manual of Style (16th Edition):

Campbell, Keith A. “Robust and reliable hardware accelerator design through high-level synthesis.” 2017. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed March 08, 2021. http://hdl.handle.net/2142/99294.

MLA Handbook (7th Edition):

Campbell, Keith A. “Robust and reliable hardware accelerator design through high-level synthesis.” 2017. Web. 08 Mar 2021.

Vancouver:

Campbell KA. Robust and reliable hardware accelerator design through high-level synthesis. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2017. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/2142/99294.

Council of Science Editors:

Campbell KA. Robust and reliable hardware accelerator design through high-level synthesis. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2017. Available from: http://hdl.handle.net/2142/99294

.