Reports and Technical Reports
Network forensics lessons for industrial control systems
Remote boot of a diskless Linux client for operating system integrity.
Towards optimal orchestration of network control functions: an evolutionary approach
A Hidden Markov Model based Runtime Monitoring tool
Upper body tracking using the Polhemus Fastrak
A Field Study of an Iris Identification System
Behavior models for software architecture
Techniques for the detection of faulty packet header modifications
Use of Trusted Software Modules for High Integrity Data Display
Computer-aided Discovery of Formal Specification Behavioral Requirements and Requirement to Implementation Mappings
Refine By:
Advisor
Author
Date Issued
Degree
Department
-
Computer Science (206)