• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6801
  • 683
  • 671
  • 671
  • 671
  • 671
  • 671
  • 671
  • 184
  • 62
  • 16
  • 7
  • 2
  • 2
  • 2
  • Tagged with
  • 10985
  • 10985
  • 6699
  • 1946
  • 989
  • 862
  • 543
  • 533
  • 524
  • 508
  • 506
  • 468
  • 458
  • 448
  • 403
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Cold Boot Attack and Countermeasures on Systems with Non-Volatile Caches

Rudolph, Spencer Alan January 2016 (has links)
No description available.
272

Comparative Analysis of Low-Power Wireless Protocols for Biomedical Sensor Applications

Stohs, Nathan 08 September 2011 (has links)
No description available.
273

Parallelizing Particle Filtering and Enabling WCET Analysis on Multi-Core Architectures for Hard Real-Time Systems

Gong, Peng 26 June 2012 (has links)
No description available.
274

Architecture Evaluation of a Search Engine (ResearchIQ) Affecting Usability

Srivastava, Ankush 18 December 2012 (has links)
No description available.
275

Context-driven systems for improved security and awareness on mobile platforms

Zungur, Onur 31 May 2022 (has links)
Over recent years, the mobile device ecosystem has seen a surge in mobile applications, with Google’s Android hosting in excess of 2.5 million apps alone, and generating over $7 billion in global revenue. Unfortunately, the rapid expansion of the ecosystem brought its unique challenges in preserving of application security and data privacy through policy enforcement systems. Modern apps, in general, are an amalgamation of developer-authored (i.e., first-party) and “external” (i.e., third party) library code, both of which can generate network traffic, and hence making it difficult to attribute distinct libraries to network communications for policy enforcement purposes. Another challenge is the identification of additional functionalities that are attached to library functions. Seemingly inconspicuous background functionalities, bundled with other library functions, often leads to unintended data flows from end-user devices. Researchers have developed a variety of systems and policies to restrict communications, monitor application utilization, and ensure application security. However, such solutions are constrained by the lack of fine-grained on-device data to generate mobile-specific and efficient policies. In this thesis, we propose an array of mobile-specific data analysis and enforcement frameworks to bridge the gap between fine-grained contextual data and policy enforcement. We first present Libspector, which demonstrates accurate attribution of network data to specific app libraries, to measure the prevalence of third-party library activities across real-world apps. Our results show that a quarter of network data belongs to advertisement and tracking libraries. We then present BorderPatrol, which uses the association of libraries and methods to app functions, to selectively enforce fine-grained policies on specific application functionalities. We successfully demonstrate decoupling of common functions such as account login and analytical data transmission. Our third framework, Janus, presents a novel methodology to create optimized mobile-specific network blocking policies for widely deployed browser-based enforcement systems. We achieve up to 3.6 times better policy coverage on network blocking, only with 5% of the size of similar policies. Finally, we present AppJitsu, a measurement system to detect applications’ adherence to platform-wide security policies and self-resiliency against malicious techniques. Through our system, we conduct an analysis of security-focused apps and observe that most apps lack self-resiliency against known attacks. In summary, by providing attribution of network packets to third-party libraries, we increase contextual awareness, and demonstrate an improved security posture along fine-grained policy enforcement on app functionalities. We further apply the principles of contextual awareness to app domain and measure implementations of app-security policies, and finally provide contextual enforcement on the network with a mobile-specific focus. / 2023-05-31T00:00:00Z
276

Towards design of power-effcient and cost-effective optical interconnect for short-reach applications

Moayedi Pour Fard, Monireh January 2018 (has links)
No description available.
277

Computer security for the era of connected vehicles

Hussain, Mohammad Shabbir January 2018 (has links)
No description available.
278

Action recognition: A low-dimensional encoding approach

Smith, Michael January 2018 (has links)
No description available.
279

VHDL implementation of a modified reed-solomon coding algorithm with considerably reduced latency for short-reach optical communications

Zheng, Bo January 2018 (has links)
No description available.
280

Computer-aided design of electrical machines: the role of robustness and application of statistical analysis techniques in multi-objective design optimization

Salimi, Armin January 2018 (has links)
No description available.

Page generated in 0.1257 seconds