ISU Electrical and Computer Engineering Archives

Subject: Computer Networking and Security


Number of records: 76.

Wei, Yawen (2011) Secure Location-aware Communications in Energy-constrained Wireless Networks. PhD thesis, Iowa State University.

Guan, Yong and Ying, Lei and Ramamoorthy, Aditya (2010) An Ising-based approach for tracking illegal P2P content distributors. Masters thesis, Iowa State University.

Edwards, Brian M. (2010) Integrating modern business methodologies and behavior factors to better apply information technology security practices within the organization. Masters thesis, Iowa State University.

Abichar, Zakhia (2010) Medium access control and network planning in wireless networks. PhD thesis, Iowa State University.

Prasad, Ramanahally Siddalinga (2010) Sensor Augmented Large Interactive Surfaces. Masters thesis, Iowa State University.

Wang, Wei (2010) A graph oriented approach for network forensic analysis. PhD thesis, Iowa State University.

Paustian, Wade David (2010) Differentiating Ethernet devices using the Normal Link Pulse with efficient computation and the impacts on performance. Masters thesis, Iowa State University.

Chang, Su (2010) Securing Enterprise Networks with Statistical Node Behavior Profiling. PhD thesis, Iowa State University.

Jackson, Adam (2010) A low-cost, connection aware, load-balancing solution for distributing Gigabit Ethernet traffic between two intrusion detection systems. Masters thesis, Iowa State University.

YANG, GUANQUN (2010) Energy-efficient coverage with wireless sensors. PhD thesis, Iowa State University.

Anderson, Benjamin (2010) Xen Worlds: Creating a virtual laboratory environment for use in education. Masters thesis, Iowa State University.

Zhou, Wei (2009) Protocol Design and Optimization for QoS Provisioning in Wireless Mesh Networks. PhD thesis, Iowa State University.

Al-Kofahi, Osameh (2009) Network coding-based survivability techniques for multi-hop wireless networks. PhD thesis, Iowa State University.

Baumgarten, Alex (2009) Preventing integrated circuit piracy using reconfigurable logic barriers. Masters thesis, Iowa State University.

Evans, Nathaniel (2009) Information technology social engineering: an academic definition and study of social engineering - analyzing the human firewall. PhD thesis, Iowa State University.

Blasi, Michael (2009) Techniques for detecting zero day phishing websites. Masters thesis, Iowa State University.

GADDAM, NISHANTH (2009) Network coding in wireless networks. Masters thesis, Iowa State University.

Erbskorn, Jason W. (2009) Detection of intrusions at layer one: A preliminary performance analysis of the IEEE 802.3 normal link pulse as a means of host-to-network authentication and a survey of environmental effects. Masters thesis, Iowa State University.

Luse, Andrew (2009) Exploring Utilization of Visualization for Computer and Network Security. PhD thesis, Iowa State University.

Al-Mefleh, Haithem (2009) Design and Analysis of MAC Protocols for Wireless Networks. PhD thesis, Iowa State University.

Gao, Chunwang and Yu, Zhen and Wei, Yawen and Russell, Steve and Guan, Yong (2009) A Statistical Indoor Localization method for SupportingLocation-based Access Control. Masters thesis, Iowa State University.

Yu, Zhen (2009) Practical security scheme design for resource-constrained wireless networks. PhD thesis, Iowa State University.

Zhang, Linfeng (2008) Effective techniques for detecting and attributing cyber criminals. PhD thesis, Iowa State University.

Kulseng, Lars (2008) Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems. Masters thesis, Iowa State University.

Ray, Souvik (2008) Design and Analysis of Anonymous Communications for Emerging Applications. PhD thesis, Iowa State University.

Harkness, Daniel (2008) Crawler 2.0: a search tool to assist law enforcement with investigations. Masters thesis, Iowa State University.

Fraiwan, Mohammad (2008) Overlay networks monitoring. PhD thesis, Iowa State University.

Lu, Song (2008) Auto Red Team: A Network Attack Automation Framework based on Decision Tree. Masters thesis, Iowa State University.

Ramkumar, Bhuvaneswari (2008) Encrypted Mal-ware Detection. Masters thesis, Iowa State University.

Gomathisankaran, Mahadevan and Keung, Ka-Ming and Tyagi, Akhilesh (2008) REBEL: Reconfigurable Block Encryption Logic. Institute for Systems and Technologies for Information, Control and Communication, Lisbon, Portugal.

Gattani, Shantanu (2008) Reference models for network trace anonymization. Masters thesis, Iowa State University.

Maughan, Jason (2008) CONDENSER: A custom tool for capturing and summarizing network traffic for AVALANCHE and ISEAGE. Masters thesis, Iowa State University.

Zhang, Linfeng and Guan, Yong (2008) Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks. Iowa State University, Ames, IA.

Shukla, Vinod (2007) A false injection-resilient scheme to monitor time-variant phenomenon in wireless sensor networks. Masters thesis, Iowa State University.

Gillispie, Thad (2007) Internet Scale Endpoint Masquerading. Masters thesis, Iowa State University.

Tang, Yongping (2007) Techniques in Placing Network Monitors. PhD thesis, Iowa State University.

Bierbaum, Aron (2007) Maestro: A remote execution tool for visualization clusters. Masters thesis, Iowa State University.

Banerjee, Pubali (2007) Performance and security of clustering protocols for sensor networks. PhD thesis, Iowa State University.

Cormode, Graham and Srikanta, Tirthapura and Bojian, Xu (2007) Time-Decaying Sketches for Sensor Data Aggregation. Publisher UNSPECIFIED, Ames, Iowa, U.S.A..

Almasaeid, Hisham (2007) Data Delivery in Fragmented Wireless Sensor Networks Using Mobile Agents. Masters thesis, Iowa State University.

Pudar, Srdjan (2007) A pragmatic method for integrated modeling of security attacks and countermeasures. Masters thesis, Iowa State University.

Paustian, Shane (2007) Designing an interactive visualization for intrusion detection systems with video game theory and technology. Masters thesis, Iowa State University.

Karstens, Nathan Lyle (2007) DeepFreeze: a management interface for ISEAGE. Masters thesis, Iowa State University.

Hoernecke, Andrew T. (2007) Security Integrated Messaging: A protocol for secure electronic mail. Masters thesis, Iowa State University.

Buschbom, Andrew (2007) Restricting wireless network access within the classroom. Masters thesis, Iowa State University.

Wilden, Matthew (2007) The Intrusion Collector and Emulator. Masters thesis, Iowa State University.

Howard, Sean (2007) Customization and automation in the future of digital forensics: Live OS forensics with FENIX (forensic examiner unix). Masters thesis, Iowa State University.

Ray, Souvik and Zhang, Zhao and Slutzki, Giora (2007) Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. Publisher UNSPECIFIED.

Balasubramanian, Srivatsan (2006) Design and Protection Algorithms for Path Level Aggregation of Traffic in WDM Metro Optical Networks. Publisher UNSPECIFIED.

Rathje, Ryan (2006) ISECUBE - A Portable ISEAGE. Masters thesis, Iowa State University.

Rathje, Ryan (2006) ISECUBE - A Portable ISEAGE. Masters thesis, Iowa State University.

Kepke Gerdes, Ryan Michael/RMG (2006) Differentiation of Ethernet devices through SNR maximization. Masters thesis, Iowa State University.

He, Wensheng (2006) Survivable design in WDM mesh networks. PhD thesis, Iowa State University.

Qureshi, Hassan (2006) Generating background network traffic for network security testbeds. Masters thesis, Iowa State University.

Hahn, Adam (2006) Advanced Packet Obfuscation and Control program (Apoc). Masters thesis, Iowa State University.

Jackson, Edward Alan (2006) Detecting intrusions at layer one: device fingerprinting for network access authorization. Masters thesis, Iowa State University.

Metzger, Joseph (2006) Network services for large scale distributed science instruments. Masters thesis, Iowa State University.

Ray, Souvik and Zhang, Zhao (2006) SCUBE: A DoS Resistant Distributed Search Protocol. Publisher UNSPECIFIED.

Al-Mefleh, Haithem and Chang, Morris (2006) High-Performance Distributed Coordination Function (HDCF) for Wireless LANs. Publisher UNSPECIFIED.

Persaud, Anthony G. (2006) The use of wavelet watermarking and statistical classification techniques for collusion detection and identification in multimedia forensics. Masters thesis, Iowa State University.

Houghton, Douglas Christopher (2005) Design and development of Network Traffic Simulator. Masters thesis, Iowa State University.

Martins, Olawale A. (2005) Affecting IP Traceback with Recent Internet Topology Maps. Masters thesis, Iowa State University.

Perkins, Michael C. (2005) Hiding out in plaintext : covert messaging with bitwsie summations. Masters thesis, Iowa State University.

Al-Duwairi, Basheer (2005) Mitigation and traceback countermeasures for DDoS attacks. PhD thesis, Iowa State University.

Li, Yan (2005) Secure group communication protocol and its implementation for JetMeeting, an application based on P2P. Masters thesis, Iowa State University.

Openshaw, Pascal (2005) A Modular Architecture for Security Tools. Masters thesis, Iowa State University.

Ong, Yana (2005) Iowa State Optical Simulator (ISTOS): Design, Architectures and Features. Masters thesis, Iowa State University.

Liverpool, Rimike Y. (2004) Monitor placement for network attack attribution using information theory metrics. Masters thesis, Iowa State University.

Zhang, Linfeng and Persaud, Anthony and Johnson, Alan and Guan, Yong (2004) Stepping Stone Attack Attribution in Non-Cooperative IP Networks. Publisher UNSPECIFIED.

Abichar, Zakhia G. and Chang, J. Morris (2004) CCR: A Novel MAC Scheme with Constant-Time Contention Resolution for WLAN. Iowa State University, Ames, Iowa 50011.

Brian Blietz, B.B. (2004) Software tamper resistance through dynamic monitoring. Masters thesis, Iowa State University.

Myers, Brett (2004) The design and development of SNIP: Simple Network Imitator Program. Masters thesis, Iowa State University.

Al-Karaki, Jamal N. (2004) Infrastructureless wireless networks: Cluster-based architectures and protocols. PhD thesis, Iowa State University.

Ryon, Luke E. (2004) A method for classifying attack implementations based upon its primary objective. Masters thesis, Iowa State University.

Al-Karaki, Jamal N. (2004) Infrastructerless wireless networks: Cluster-based architectures and protocols. PhD thesis, Iowa State University.

Wang, Hao-Li (2004) MAC-layer approaches for security and performance enhancement in IEEE 802.11. PhD thesis, Iowa State University.

This list was generated on Tue Jul 29 12:10:10 CDT 2014.