Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(distributed security). Showing records 1 – 30 of 197 total matches.

[1] [2] [3] [4] [5] [6] [7]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Universidade de Lisboa

1. Martins, Rui Miguel Coelho. Security features using a distributed file system.

Degree: 2011, Universidade de Lisboa

 Sensitive information such as firewall logs or data from intrusion detection systems, has to be stored for long periods of time for legal reasons or… (more)

Subjects/Keywords: distributed; performance; security; file system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martins, R. M. C. (2011). Security features using a distributed file system. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Martins, Rui Miguel Coelho. “Security features using a distributed file system.” 2011. Thesis, Universidade de Lisboa. Accessed June 17, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Martins, Rui Miguel Coelho. “Security features using a distributed file system.” 2011. Web. 17 Jun 2019.

Vancouver:

Martins RMC. Security features using a distributed file system. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2019 Jun 17]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Martins RMC. Security features using a distributed file system. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

2. Stirling, David. Enhancing Client Honeypots with Grid Services and Workflows.

Degree: 2009, Victoria University of Wellington

 Client honeypots are devices for detecting malicious servers on a network. They interact with potentially malicious servers and analyse the Web pages returned to assess… (more)

Subjects/Keywords: Honeypot (computing); Network security; Security; Distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stirling, D. (2009). Enhancing Client Honeypots with Grid Services and Workflows. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1177

Chicago Manual of Style (16th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Masters Thesis, Victoria University of Wellington. Accessed June 17, 2019. http://hdl.handle.net/10063/1177.

MLA Handbook (7th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Web. 17 Jun 2019.

Vancouver:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Internet] [Masters thesis]. Victoria University of Wellington; 2009. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/10063/1177.

Council of Science Editors:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Masters Thesis]. Victoria University of Wellington; 2009. Available from: http://hdl.handle.net/10063/1177

3. Rawat, Umashankar. Secure and efficient distributed cryptographic file systems;.

Degree: Computer Science Engineering, 2013, Jaypee University of Engineering and Technology, Guna

The need for data security emerges from the widespread deployment of shared file systems, greater mobility of computers and the rapid miniaturization of storage devices.… (more)

Subjects/Keywords: Cryptography; Data Security; Distributed System; Linux Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawat, U. (2013). Secure and efficient distributed cryptographic file systems;. (Thesis). Jaypee University of Engineering and Technology, Guna. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Thesis, Jaypee University of Engineering and Technology, Guna. Accessed June 17, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Web. 17 Jun 2019.

Vancouver:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Internet] [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. [cited 2019 Jun 17]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tennessee – Knoxville

4. Smith, Jared Michael. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.

Degree: MS, Computer Science, 2017, University of Tennessee – Knoxville

 In this work, we present Nyx, a system for mitigating Distributed Denial of Service (DDoS) attacks by routing critical traffic from known benign networks around… (more)

Subjects/Keywords: DDoS; security; network security; BGP; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, J. M. (2017). Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Thesis, University of Tennessee – Knoxville. Accessed June 17, 2019. https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Web. 17 Jun 2019.

Vancouver:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Internet] [Thesis]. University of Tennessee – Knoxville; 2017. [cited 2019 Jun 17]. Available from: https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Thesis]. University of Tennessee – Knoxville; 2017. Available from: https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

5. Conner, William G. Session Management for Accountability in Distributed Multimedia Services.

Degree: PhD, Computer Science, 2009, University of Illinois – Urbana-Champaign

 Internet-based multimedia applications (e.g., voice-over-IP, instant messaging, and video conferencing) are continuing to grow in importance as more people depend on such applications for personal… (more)

Subjects/Keywords: Session Initiation Protocol; security; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Conner, W. G. (2009). Session Management for Accountability in Distributed Multimedia Services. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/13146

Chicago Manual of Style (16th Edition):

Conner, William G. “Session Management for Accountability in Distributed Multimedia Services.” 2009. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed June 17, 2019. http://hdl.handle.net/2142/13146.

MLA Handbook (7th Edition):

Conner, William G. “Session Management for Accountability in Distributed Multimedia Services.” 2009. Web. 17 Jun 2019.

Vancouver:

Conner WG. Session Management for Accountability in Distributed Multimedia Services. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2009. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/2142/13146.

Council of Science Editors:

Conner WG. Session Management for Accountability in Distributed Multimedia Services. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2009. Available from: http://hdl.handle.net/2142/13146


Oklahoma State University

6. Parakh, Abhishek. New Information Dispersal Techniques for Trustworthy Computing.

Degree: Computer Science Department, 2011, Oklahoma State University

 Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for… (more)

Subjects/Keywords: cloud computing; data partitioning; data storage security; distributed secure data storage; distributed security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parakh, A. (2011). New Information Dispersal Techniques for Trustworthy Computing. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Thesis, Oklahoma State University. Accessed June 17, 2019. http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Web. 17 Jun 2019.

Vancouver:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Svensson, Benjamin. Servicing a Connected Car Service.

Degree: 2015, , Department of Computer Science and Engineering

  Increased wireless connectivity to vehicles invites both existing and new digital methods of attack, requiring the high prioritisation of security throughout the development of… (more)

Subjects/Keywords: Systems security; Network security; Distributed systems security; Penetration testing; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Svensson, B. (2015). Servicing a Connected Car Service. (Thesis). , Department of Computer Science and Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Svensson, Benjamin. “Servicing a Connected Car Service.” 2015. Thesis, , Department of Computer Science and Engineering. Accessed June 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Svensson, Benjamin. “Servicing a Connected Car Service.” 2015. Web. 17 Jun 2019.

Vancouver:

Svensson B. Servicing a Connected Car Service. [Internet] [Thesis]. , Department of Computer Science and Engineering; 2015. [cited 2019 Jun 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Svensson B. Servicing a Connected Car Service. [Thesis]. , Department of Computer Science and Engineering; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


East Carolina University

8. Asghary Karahroudy, Ali. Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System.

Degree: 2011, East Carolina University

 Cloud computing offers massive scalability, immediate availability, and low cost services as major benefits, but as with most new technologies, it introduces new risks and… (more)

Subjects/Keywords: Computer science; Computer engineering; Availability; Confidentiality; Distributed file system; Integrity; Security; Electronic data processing – Distributed processing; Cloud computing; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Asghary Karahroudy, A. (2011). Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System. (Thesis). East Carolina University. Retrieved from http://hdl.handle.net/10342/3630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Asghary Karahroudy, Ali. “Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System.” 2011. Thesis, East Carolina University. Accessed June 17, 2019. http://hdl.handle.net/10342/3630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Asghary Karahroudy, Ali. “Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System.” 2011. Web. 17 Jun 2019.

Vancouver:

Asghary Karahroudy A. Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System. [Internet] [Thesis]. East Carolina University; 2011. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/10342/3630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Asghary Karahroudy A. Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System. [Thesis]. East Carolina University; 2011. Available from: http://hdl.handle.net/10342/3630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

9. Mekonnen, Feyissa. MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY .

Degree: 2008, Addis Ababa University

 In today’s Information Society, distributed systems have a significant impact on how information communication between social, industrial, governmental and non governmental institutions is achieved. Dealing… (more)

Subjects/Keywords: Adaptation; Adapting; distributed system; Security; Adaptive security; monitoring system; Adaptive monitoring system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mekonnen, F. (2008). MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mekonnen, Feyissa. “MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY .” 2008. Thesis, Addis Ababa University. Accessed June 17, 2019. http://etd.aau.edu.et/dspace/handle/123456789/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mekonnen, Feyissa. “MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY .” 2008. Web. 17 Jun 2019.

Vancouver:

Mekonnen F. MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY . [Internet] [Thesis]. Addis Ababa University; 2008. [cited 2019 Jun 17]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mekonnen F. MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY . [Thesis]. Addis Ababa University; 2008. Available from: http://etd.aau.edu.et/dspace/handle/123456789/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Ontario

10. Ramachandran, Karthick. Trust based Privacy Policy Enforcement in Cloud Computing.

Degree: 2015, University of Western Ontario

 Cloud computing offers opportunities for organizations to reduce IT costs by using the computation and storage of a remote provider. Despite the benefits offered by… (more)

Subjects/Keywords: Trust; Privacy; Security; Cloud Computing; Distributed Systems; Information Security; OS and Networks; Systems Architecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramachandran, K. (2015). Trust based Privacy Policy Enforcement in Cloud Computing. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/2728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ramachandran, Karthick. “Trust based Privacy Policy Enforcement in Cloud Computing.” 2015. Thesis, University of Western Ontario. Accessed June 17, 2019. https://ir.lib.uwo.ca/etd/2728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ramachandran, Karthick. “Trust based Privacy Policy Enforcement in Cloud Computing.” 2015. Web. 17 Jun 2019.

Vancouver:

Ramachandran K. Trust based Privacy Policy Enforcement in Cloud Computing. [Internet] [Thesis]. University of Western Ontario; 2015. [cited 2019 Jun 17]. Available from: https://ir.lib.uwo.ca/etd/2728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ramachandran K. Trust based Privacy Policy Enforcement in Cloud Computing. [Thesis]. University of Western Ontario; 2015. Available from: https://ir.lib.uwo.ca/etd/2728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Ontario

11. Rajasinghe, Nadun. INSecS: An Intelligent Network Security System.

Degree: 2018, University of Western Ontario

 There are new challenges in network security, introduced by the nature of modern networks like IoT systems, Cloud systems, and other distributed systems. System resource… (more)

Subjects/Keywords: Intrusion Detection; Intrusion Datasets; Distributed Network Security; IoT and Cloud Security; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajasinghe, N. (2018). INSecS: An Intelligent Network Security System. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/5628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rajasinghe, Nadun. “INSecS: An Intelligent Network Security System.” 2018. Thesis, University of Western Ontario. Accessed June 17, 2019. https://ir.lib.uwo.ca/etd/5628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rajasinghe, Nadun. “INSecS: An Intelligent Network Security System.” 2018. Web. 17 Jun 2019.

Vancouver:

Rajasinghe N. INSecS: An Intelligent Network Security System. [Internet] [Thesis]. University of Western Ontario; 2018. [cited 2019 Jun 17]. Available from: https://ir.lib.uwo.ca/etd/5628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rajasinghe N. INSecS: An Intelligent Network Security System. [Thesis]. University of Western Ontario; 2018. Available from: https://ir.lib.uwo.ca/etd/5628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

12. Lorch, Markus. PRIMA - Privilege Management and Authorization in Grid Computing Environments.

Degree: PhD, Computer Science, 2004, Virginia Tech

 Computational grids and other heterogeneous, large-scale distributed systems require more powerful and more flexible authorization mechanisms to realize fine-grained access-control of resources. Computational grids are… (more)

Subjects/Keywords: Distributed Systems; Grid Security; Computer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lorch, M. (2004). PRIMA - Privilege Management and Authorization in Grid Computing Environments. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/26995

Chicago Manual of Style (16th Edition):

Lorch, Markus. “PRIMA - Privilege Management and Authorization in Grid Computing Environments.” 2004. Doctoral Dissertation, Virginia Tech. Accessed June 17, 2019. http://hdl.handle.net/10919/26995.

MLA Handbook (7th Edition):

Lorch, Markus. “PRIMA - Privilege Management and Authorization in Grid Computing Environments.” 2004. Web. 17 Jun 2019.

Vancouver:

Lorch M. PRIMA - Privilege Management and Authorization in Grid Computing Environments. [Internet] [Doctoral dissertation]. Virginia Tech; 2004. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/10919/26995.

Council of Science Editors:

Lorch M. PRIMA - Privilege Management and Authorization in Grid Computing Environments. [Doctoral Dissertation]. Virginia Tech; 2004. Available from: http://hdl.handle.net/10919/26995


Louisiana State University

13. Shan, Huasong. A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds.

Degree: PhD, Computer and Systems Architecture, 2017, Louisiana State University

Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend… (more)

Subjects/Keywords: long-tail latency; performance bottleneck; distributed system security; cloud security; web attack; DDoS attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shan, H. (2017). A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds. (Doctoral Dissertation). Louisiana State University. Retrieved from https://digitalcommons.lsu.edu/gradschool_dissertations/4145

Chicago Manual of Style (16th Edition):

Shan, Huasong. “A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds.” 2017. Doctoral Dissertation, Louisiana State University. Accessed June 17, 2019. https://digitalcommons.lsu.edu/gradschool_dissertations/4145.

MLA Handbook (7th Edition):

Shan, Huasong. “A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds.” 2017. Web. 17 Jun 2019.

Vancouver:

Shan H. A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds. [Internet] [Doctoral dissertation]. Louisiana State University; 2017. [cited 2019 Jun 17]. Available from: https://digitalcommons.lsu.edu/gradschool_dissertations/4145.

Council of Science Editors:

Shan H. A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds. [Doctoral Dissertation]. Louisiana State University; 2017. Available from: https://digitalcommons.lsu.edu/gradschool_dissertations/4145

14. Desai, Vikram R. Techniques for Detection of Malicious Packet Drops in Networks.

Degree: MS, Electrical & Computer Engineering, 2012, University of Massachusetts

  The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next-… (more)

Subjects/Keywords: Internet; Packet Drop; Distributed Detection; Controller; Security; Security Model; Digital Communications and Networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Desai, V. R. (2012). Techniques for Detection of Malicious Packet Drops in Networks. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/901

Chicago Manual of Style (16th Edition):

Desai, Vikram R. “Techniques for Detection of Malicious Packet Drops in Networks.” 2012. Masters Thesis, University of Massachusetts. Accessed June 17, 2019. https://scholarworks.umass.edu/theses/901.

MLA Handbook (7th Edition):

Desai, Vikram R. “Techniques for Detection of Malicious Packet Drops in Networks.” 2012. Web. 17 Jun 2019.

Vancouver:

Desai VR. Techniques for Detection of Malicious Packet Drops in Networks. [Internet] [Masters thesis]. University of Massachusetts; 2012. [cited 2019 Jun 17]. Available from: https://scholarworks.umass.edu/theses/901.

Council of Science Editors:

Desai VR. Techniques for Detection of Malicious Packet Drops in Networks. [Masters Thesis]. University of Massachusetts; 2012. Available from: https://scholarworks.umass.edu/theses/901


Unitec New Zealand

15. Kaur, Navneet. Security effectiveness of virtual DMZ in private clouds.

Degree: 2014, Unitec New Zealand

 Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT… (more)

Subjects/Keywords: virtual DMZ; cloud computing; computer security; 080303 Computer System Security; 080501 Distributed and Grid Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaur, N. (2014). Security effectiveness of virtual DMZ in private clouds. (Thesis). Unitec New Zealand. Retrieved from http://hdl.handle.net/10652/2582

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kaur, Navneet. “Security effectiveness of virtual DMZ in private clouds.” 2014. Thesis, Unitec New Zealand. Accessed June 17, 2019. http://hdl.handle.net/10652/2582.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kaur, Navneet. “Security effectiveness of virtual DMZ in private clouds.” 2014. Web. 17 Jun 2019.

Vancouver:

Kaur N. Security effectiveness of virtual DMZ in private clouds. [Internet] [Thesis]. Unitec New Zealand; 2014. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/10652/2582.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kaur N. Security effectiveness of virtual DMZ in private clouds. [Thesis]. Unitec New Zealand; 2014. Available from: http://hdl.handle.net/10652/2582

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Colorado

16. Dubey, Anurag. Timing and Latency Characteristics in Disaggregated Systems.

Degree: MS, 2017, University of Colorado

  In this dissertation, we evaluated two disaggregated systems - Software Defined Networks (SDNs) and Network Function Virtualization (NFVs) and explored the effects of disaggregation.… (more)

Subjects/Keywords: Design; Distributed; Networks; NFV; SDN; Security; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dubey, A. (2017). Timing and Latency Characteristics in Disaggregated Systems. (Masters Thesis). University of Colorado. Retrieved from https://scholar.colorado.edu/eeng_gradetds/22

Chicago Manual of Style (16th Edition):

Dubey, Anurag. “Timing and Latency Characteristics in Disaggregated Systems.” 2017. Masters Thesis, University of Colorado. Accessed June 17, 2019. https://scholar.colorado.edu/eeng_gradetds/22.

MLA Handbook (7th Edition):

Dubey, Anurag. “Timing and Latency Characteristics in Disaggregated Systems.” 2017. Web. 17 Jun 2019.

Vancouver:

Dubey A. Timing and Latency Characteristics in Disaggregated Systems. [Internet] [Masters thesis]. University of Colorado; 2017. [cited 2019 Jun 17]. Available from: https://scholar.colorado.edu/eeng_gradetds/22.

Council of Science Editors:

Dubey A. Timing and Latency Characteristics in Disaggregated Systems. [Masters Thesis]. University of Colorado; 2017. Available from: https://scholar.colorado.edu/eeng_gradetds/22


University of Toronto

17. Huang, Wei. UnityFS: A File System for the Unity Block Store.

Degree: 2013, University of Toronto

A large number of personal cloud storage systems have emerged in recent years, such as Dropbox, iCloud, Google Drive etc. A common limitation of these… (more)

Subjects/Keywords: Distributed File System; Cloud Computing; Computer Security; 0984

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, W. (2013). UnityFS: A File System for the Unity Block Store. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/42869

Chicago Manual of Style (16th Edition):

Huang, Wei. “UnityFS: A File System for the Unity Block Store.” 2013. Masters Thesis, University of Toronto. Accessed June 17, 2019. http://hdl.handle.net/1807/42869.

MLA Handbook (7th Edition):

Huang, Wei. “UnityFS: A File System for the Unity Block Store.” 2013. Web. 17 Jun 2019.

Vancouver:

Huang W. UnityFS: A File System for the Unity Block Store. [Internet] [Masters thesis]. University of Toronto; 2013. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/1807/42869.

Council of Science Editors:

Huang W. UnityFS: A File System for the Unity Block Store. [Masters Thesis]. University of Toronto; 2013. Available from: http://hdl.handle.net/1807/42869


Louisiana State University

18. Nadendla, Venkata Sriram Siddhardh. Secure distributed detection in wireless sensor networks via encryption of sensor decisions.

Degree: MSEE, Electrical and Computer Engineering, 2009, Louisiana State University

 We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Identical binary quantizers are used on the sensor's observations and the… (more)

Subjects/Keywords: Distributed Detection; Wireless Sensor Networks; Security; Cipher; Quasiconvexity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nadendla, V. S. S. (2009). Secure distributed detection in wireless sensor networks via encryption of sensor decisions. (Masters Thesis). Louisiana State University. Retrieved from etd-07092009-232534 ; https://digitalcommons.lsu.edu/gradschool_theses/3619

Chicago Manual of Style (16th Edition):

Nadendla, Venkata Sriram Siddhardh. “Secure distributed detection in wireless sensor networks via encryption of sensor decisions.” 2009. Masters Thesis, Louisiana State University. Accessed June 17, 2019. etd-07092009-232534 ; https://digitalcommons.lsu.edu/gradschool_theses/3619.

MLA Handbook (7th Edition):

Nadendla, Venkata Sriram Siddhardh. “Secure distributed detection in wireless sensor networks via encryption of sensor decisions.” 2009. Web. 17 Jun 2019.

Vancouver:

Nadendla VSS. Secure distributed detection in wireless sensor networks via encryption of sensor decisions. [Internet] [Masters thesis]. Louisiana State University; 2009. [cited 2019 Jun 17]. Available from: etd-07092009-232534 ; https://digitalcommons.lsu.edu/gradschool_theses/3619.

Council of Science Editors:

Nadendla VSS. Secure distributed detection in wireless sensor networks via encryption of sensor decisions. [Masters Thesis]. Louisiana State University; 2009. Available from: etd-07092009-232534 ; https://digitalcommons.lsu.edu/gradschool_theses/3619


Arizona State University

19. Cárdenas-Haro, José Antonio. Detecting Sybil Nodes in Static and Dynamic Networks.

Degree: PhD, Computer Science, 2010, Arizona State University

 Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake… (more)

Subjects/Keywords: Computer Science; Distributed Systems; Network security; Sybil attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cárdenas-Haro, J. A. (2010). Detecting Sybil Nodes in Static and Dynamic Networks. (Doctoral Dissertation). Arizona State University. Retrieved from http://repository.asu.edu/items/8797

Chicago Manual of Style (16th Edition):

Cárdenas-Haro, José Antonio. “Detecting Sybil Nodes in Static and Dynamic Networks.” 2010. Doctoral Dissertation, Arizona State University. Accessed June 17, 2019. http://repository.asu.edu/items/8797.

MLA Handbook (7th Edition):

Cárdenas-Haro, José Antonio. “Detecting Sybil Nodes in Static and Dynamic Networks.” 2010. Web. 17 Jun 2019.

Vancouver:

Cárdenas-Haro JA. Detecting Sybil Nodes in Static and Dynamic Networks. [Internet] [Doctoral dissertation]. Arizona State University; 2010. [cited 2019 Jun 17]. Available from: http://repository.asu.edu/items/8797.

Council of Science Editors:

Cárdenas-Haro JA. Detecting Sybil Nodes in Static and Dynamic Networks. [Doctoral Dissertation]. Arizona State University; 2010. Available from: http://repository.asu.edu/items/8797


Queensland University of Technology

20. Hauser, Christophe. A basis for instrusion detection in distributed systems using kernel-level data tainting.

Degree: 2013, Queensland University of Technology

This project was a step forward in developing intrusion detection systems in distributed environments such as web services. It investigates a new approach of detection based on so-called "taint-marking" techniques and introduces a theoretical framework along with its implementation in the Linux kernel.

Subjects/Keywords: Intrusion detection; Information security; Distributed systems; Linux Kernel; Anomaly detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hauser, C. (2013). A basis for instrusion detection in distributed systems using kernel-level data tainting. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/63526/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hauser, Christophe. “A basis for instrusion detection in distributed systems using kernel-level data tainting.” 2013. Thesis, Queensland University of Technology. Accessed June 17, 2019. https://eprints.qut.edu.au/63526/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hauser, Christophe. “A basis for instrusion detection in distributed systems using kernel-level data tainting.” 2013. Web. 17 Jun 2019.

Vancouver:

Hauser C. A basis for instrusion detection in distributed systems using kernel-level data tainting. [Internet] [Thesis]. Queensland University of Technology; 2013. [cited 2019 Jun 17]. Available from: https://eprints.qut.edu.au/63526/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hauser C. A basis for instrusion detection in distributed systems using kernel-level data tainting. [Thesis]. Queensland University of Technology; 2013. Available from: https://eprints.qut.edu.au/63526/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Chiang, Tsung-Chi. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.

Degree: Master, Communications Engineering, 2018, NSYSU

 In recent years, wireless sensor networks are widely used because they comprised a large number of low-cost, low-power and miniature sensors. In wireless sensor networks,… (more)

Subjects/Keywords: Wireless Sensor Networks; Eavesdropper; Distributed Detection; Physical-Layer Security; Channel Selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiang, T. (2018). Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiang, Tsung-Chi. “Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.” 2018. Thesis, NSYSU. Accessed June 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiang, Tsung-Chi. “Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers.” 2018. Web. 17 Jun 2019.

Vancouver:

Chiang T. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Jun 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiang T. Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-115509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

22. Tseng, Shih-Ming. Physical-Layer Security Design for Distributed Detection with Attackers.

Degree: Master, Communications Engineering, 2018, NSYSU

 Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the… (more)

Subjects/Keywords: wireless sensor networks; physical-layer security; eavedroppers; attackers; distributed detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2018). Physical-Layer Security Design for Distributed Detection with Attackers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Thesis, NSYSU. Accessed June 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Web. 17 Jun 2019.

Vancouver:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Jun 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cornell University

23. Vikram, Krishnaprasad. Building Distributed Systems With Information Flow Control .

Degree: 2015, Cornell University

 Computing technology has made recording and copying information cheap and convenient, resulting in numerous security problems: from accidental copying leading to confidentiality breaches to rapid… (more)

Subjects/Keywords: distributed systems, information flow; security, programming languages; web applications, covert channels

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vikram, K. (2015). Building Distributed Systems With Information Flow Control . (Thesis). Cornell University. Retrieved from http://hdl.handle.net/1813/40963

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vikram, Krishnaprasad. “Building Distributed Systems With Information Flow Control .” 2015. Thesis, Cornell University. Accessed June 17, 2019. http://hdl.handle.net/1813/40963.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vikram, Krishnaprasad. “Building Distributed Systems With Information Flow Control .” 2015. Web. 17 Jun 2019.

Vancouver:

Vikram K. Building Distributed Systems With Information Flow Control . [Internet] [Thesis]. Cornell University; 2015. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/1813/40963.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vikram K. Building Distributed Systems With Information Flow Control . [Thesis]. Cornell University; 2015. Available from: http://hdl.handle.net/1813/40963

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Otago

24. Chrobok, Natascha. Receiver Driven Email Delivery .

Degree: 2010, University of Otago

 Spam has become a serious problem to email users all over the world. Most of the daily email messages we are receiving consists of unwanted… (more)

Subjects/Keywords: security; spam prevention; email; distributed denial of service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chrobok, N. (2010). Receiver Driven Email Delivery . (Masters Thesis). University of Otago. Retrieved from http://hdl.handle.net/10523/397

Chicago Manual of Style (16th Edition):

Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Masters Thesis, University of Otago. Accessed June 17, 2019. http://hdl.handle.net/10523/397.

MLA Handbook (7th Edition):

Chrobok, Natascha. “Receiver Driven Email Delivery .” 2010. Web. 17 Jun 2019.

Vancouver:

Chrobok N. Receiver Driven Email Delivery . [Internet] [Masters thesis]. University of Otago; 2010. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/10523/397.

Council of Science Editors:

Chrobok N. Receiver Driven Email Delivery . [Masters Thesis]. University of Otago; 2010. Available from: http://hdl.handle.net/10523/397


Wayne State University

25. Garg, Nandan. Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach.

Degree: PhD, Computer Science, 2010, Wayne State University

  Most distributed systems comprise autonomous entities interacting with each other to achieve their objectives. These entities behave selfishly when making decisions. This behavior may… (more)

Subjects/Keywords: Distributed systems; Game theory; Networking; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garg, N. (2010). Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach. (Doctoral Dissertation). Wayne State University. Retrieved from https://digitalcommons.wayne.edu/oa_dissertations/161

Chicago Manual of Style (16th Edition):

Garg, Nandan. “Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach.” 2010. Doctoral Dissertation, Wayne State University. Accessed June 17, 2019. https://digitalcommons.wayne.edu/oa_dissertations/161.

MLA Handbook (7th Edition):

Garg, Nandan. “Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach.” 2010. Web. 17 Jun 2019.

Vancouver:

Garg N. Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach. [Internet] [Doctoral dissertation]. Wayne State University; 2010. [cited 2019 Jun 17]. Available from: https://digitalcommons.wayne.edu/oa_dissertations/161.

Council of Science Editors:

Garg N. Dealing With Misbehavior In Distributed Systems: A Game-Theoretic Approach. [Doctoral Dissertation]. Wayne State University; 2010. Available from: https://digitalcommons.wayne.edu/oa_dissertations/161


University of Melbourne

26. GUO, XIAOXI. Estimation in wireless sensor networks with security constraints.

Degree: 2016, University of Melbourne

 Due to sensors’ limited power budget and an open wireless media, energy constraints and security are two particularly challenging issues in wireless sensor networks (WSNs).… (more)

Subjects/Keywords: security; power allocation; wireless sensor networks; distributed estimation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

GUO, X. (2016). Estimation in wireless sensor networks with security constraints. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/91789

Chicago Manual of Style (16th Edition):

GUO, XIAOXI. “Estimation in wireless sensor networks with security constraints.” 2016. Doctoral Dissertation, University of Melbourne. Accessed June 17, 2019. http://hdl.handle.net/11343/91789.

MLA Handbook (7th Edition):

GUO, XIAOXI. “Estimation in wireless sensor networks with security constraints.” 2016. Web. 17 Jun 2019.

Vancouver:

GUO X. Estimation in wireless sensor networks with security constraints. [Internet] [Doctoral dissertation]. University of Melbourne; 2016. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/11343/91789.

Council of Science Editors:

GUO X. Estimation in wireless sensor networks with security constraints. [Doctoral Dissertation]. University of Melbourne; 2016. Available from: http://hdl.handle.net/11343/91789


McMaster University

27. Jaskolka, Jason. On the Modelling, Analysis, and Mitigation of Distributed Covert Channels.

Degree: PhD, 2015, McMaster University

Covert channels are means of communication that allow agents in a system to transfer information in a manner that violates the system’s security policy. Covert… (more)

Subjects/Keywords: distributed covert channels; security; communicating concurrent Kleene algebra; formal methods

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jaskolka, J. (2015). On the Modelling, Analysis, and Mitigation of Distributed Covert Channels. (Doctoral Dissertation). McMaster University. Retrieved from http://hdl.handle.net/11375/16872

Chicago Manual of Style (16th Edition):

Jaskolka, Jason. “On the Modelling, Analysis, and Mitigation of Distributed Covert Channels.” 2015. Doctoral Dissertation, McMaster University. Accessed June 17, 2019. http://hdl.handle.net/11375/16872.

MLA Handbook (7th Edition):

Jaskolka, Jason. “On the Modelling, Analysis, and Mitigation of Distributed Covert Channels.” 2015. Web. 17 Jun 2019.

Vancouver:

Jaskolka J. On the Modelling, Analysis, and Mitigation of Distributed Covert Channels. [Internet] [Doctoral dissertation]. McMaster University; 2015. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/11375/16872.

Council of Science Editors:

Jaskolka J. On the Modelling, Analysis, and Mitigation of Distributed Covert Channels. [Doctoral Dissertation]. McMaster University; 2015. Available from: http://hdl.handle.net/11375/16872


East Carolina University

28. Asghary, Karahroudy Ali. Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System.

Degree: 2011, East Carolina University

 Cloud computing offers massive scalability immediate availability and low cost services as major benefits but as with most new technologies it introduces new risks and… (more)

Subjects/Keywords: Electronic data processing – Distributed processing; Cloud computing; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Asghary, K. A. (2011). Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14530

Chicago Manual of Style (16th Edition):

Asghary, Karahroudy Ali. “Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System.” 2011. Masters Thesis, East Carolina University. Accessed June 17, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14530.

MLA Handbook (7th Edition):

Asghary, Karahroudy Ali. “Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System.” 2011. Web. 17 Jun 2019.

Vancouver:

Asghary KA. Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System. [Internet] [Masters thesis]. East Carolina University; 2011. [cited 2019 Jun 17]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14530.

Council of Science Editors:

Asghary KA. Security Analysis and Framework of Cloud Computing with Parity-Based Partially Distributed File System. [Masters Thesis]. East Carolina University; 2011. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14530


University of New Mexico

29. Nava, Edward J. Usage Management Enforcement in Cloud Computing Virtual Machines.

Degree: Electrical and Computer Engineering, 2015, University of New Mexico

 Many are interested in adopting cloud computing technology, but have concerns about the security of their data. This issue has motivated extensive research to address… (more)

Subjects/Keywords: Distributed Systems; Information Flow Controls; Information Security; Protection Mechanisms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nava, E. J. (2015). Usage Management Enforcement in Cloud Computing Virtual Machines. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/27883

Chicago Manual of Style (16th Edition):

Nava, Edward J. “Usage Management Enforcement in Cloud Computing Virtual Machines.” 2015. Doctoral Dissertation, University of New Mexico. Accessed June 17, 2019. http://hdl.handle.net/1928/27883.

MLA Handbook (7th Edition):

Nava, Edward J. “Usage Management Enforcement in Cloud Computing Virtual Machines.” 2015. Web. 17 Jun 2019.

Vancouver:

Nava EJ. Usage Management Enforcement in Cloud Computing Virtual Machines. [Internet] [Doctoral dissertation]. University of New Mexico; 2015. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/1928/27883.

Council of Science Editors:

Nava EJ. Usage Management Enforcement in Cloud Computing Virtual Machines. [Doctoral Dissertation]. University of New Mexico; 2015. Available from: http://hdl.handle.net/1928/27883


University of Illinois – Urbana-Champaign

30. Liu, Zhuotao. FlowPolice: enforcing congestion accountability to defend against DDoS attacks.

Degree: MS, Electrical & Computer Engr, 2015, University of Illinois – Urbana-Champaign

 Defending the Internet against distributed denial of service (DDoS) attacks is a fundamental problem. Despite over a decade of research, little progress has been made… (more)

Subjects/Keywords: Distributed Denial of Service (DDoS) Attacks; Internet Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Z. (2015). FlowPolice: enforcing congestion accountability to defend against DDoS attacks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/78589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed June 17, 2019. http://hdl.handle.net/2142/78589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Zhuotao. “FlowPolice: enforcing congestion accountability to defend against DDoS attacks.” 2015. Web. 17 Jun 2019.

Vancouver:

Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Jun 17]. Available from: http://hdl.handle.net/2142/78589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu Z. FlowPolice: enforcing congestion accountability to defend against DDoS attacks. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/78589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7]

.