Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
27625 open access dissertations and theses found for:
if(Deep packet inspection)  »   Refine Search
1.
Modeling Intention to Use Deep Packet Inspection Technology in the United Arab Emirates
by Miller, Alfred Howard, Ph.D.  Northcentral University. 2012: 325 pages; 3492475.
2.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
3.
Dynamic content generation for the evaluation of network applications
by Valgenti, Victor Craig, Ph.D.  Washington State University. 2012: 146 pages; 3517443.
5.
6.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
7.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
8.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
10.
Studies on Error Control of 3-D Zerotree Wavelet Video Streaming
by Zhao, Yi, Ph.D.  The Ohio State University. 2005: 136 pages; 10834938.
11.
Quality of service and channel-aware packet bundling for capacity improvement in cellular networks
by Kim, Jung Hwan, Ph.D.  University of Missouri - Kansas City. 2011: 97 pages; 3454577.
12.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
13.
Asynchronous optical packet routers
by Mack, John Patrick, Ph.D.  University of California, Santa Barbara. 2009: 223 pages; 3371661.
14.
Efficient Gain-Driven Routing-Assisted Mechanisms for Network-wide Traffic Monitoring
by Chang, Chia-Wei, Ph.D.  University of California, San Diego. 2011: 143 pages; 3487322.
15.
Synergistic network operations
by Raza, Saqib, Ph.D.  University of California, Davis. 2010: 173 pages; 3427427.
16.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
17.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
18.
19.
Programmable and Scalable Software-Defined Networking Controllers
by Voellmy, Andreas Richard, Ph.D.  Yale University. 2014: 219 pages; 3580888.
20.
Energy efficient hierarchical wireless routing protocol (EEHW routing protocol)
by Madapatha, Samira Anupama, M.S.  California State University, Long Beach. 2015: 65 pages; 1597778.
21.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
22.
The TESLA-alpha broadcast authentication protocol for building automation system
by Suwannarath, Songluk, M.S.  California State University, Long Beach. 2016: 122 pages; 10111196.
23.
Flexible and Scalable Systems for Network Management
by Gupta, Arpit, Ph.D.  Princeton University. 2018: 165 pages; 10935124.
25.
Abstractions and algorithms for control of extensible and heterogeneous virtualized network infrastructures
by Wiseman, Charles Gordon, Ph.D.  Washington University in St. Louis. 2010: 205 pages; 3412319.
26.
Energy and security aspects of wireless networks: Performance and tradeoffs
by Abuzainab, Nof, Ph.D.  University of Maryland, College Park. 2013: 207 pages; 3599933.
27.
Study of behavior of VoIP in DiffServ telephony service and Best-Effort service
by Chung, Hyunki, M.S.  California State University, Long Beach. 2010: 106 pages; 1493004.
28.
Acceleration of streaming applications on FPGAs from high level constructs
by Mitra, Abhishek, Ph.D.  University of California, Riverside. 2008: 192 pages; 3341851.
1 - 30 of 27625 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest