• Login
    Search 
    •   SMARTech Home
    • College of Computing (CoC)
    • College of Computing Theses and Dissertations
    • Search
    •   SMARTech Home
    • College of Computing (CoC)
    • College of Computing Theses and Dissertations
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-4 of 4

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Practical authentication in large-scale internet applications 

    Dacosta, Italo (Georgia Institute of Technology, 2012-07-03)
    Due to their massive user base and request load, large-scale Internet applications have mainly focused on goals such as performance and scalability. As a result, many of these applications rely on weaker but more efficient ...
    Thumbnail

    Semantic view re-creation for the secure monitoring of virtual machines 

    Carbone, Martim (Georgia Institute of Technology, 2012-06-28)
    The insecurity of modern-day software has created the need for security monitoring applications. Two serious deficiencies are commonly found in these applications. First, the absence of isolation from the system being ...
    Thumbnail

    Effective and scalable botnet detection in network traffic 

    Zhang, Junjie (Georgia Institute of Technology, 2012-07-03)
    Botnets represent one of the most serious threats against Internet security since they serve as platforms that are responsible for the vast majority of large-scale and coordinated cyber attacks, such as distributed denial ...
    Thumbnail

    Preventing abuse of online communities 

    Irani, Danesh (Georgia Institute of Technology, 2012-07-02)
    Online communities are growing at a phenomenal rate and with the large number of users these communities contain, attackers are drawn to exploit these users. Denial of information (DoI) attacks and information leakage ...

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CollectionDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Discover

    AuthorCarbone, Martim (1)Dacosta, Italo (1)Irani, Danesh (1)Zhang, Junjie (1)Subject
    Computer networks Security measures (4)
    Computer architecture (2)Network security (2)Botnet (1)Internet (1)Internet governance (1)Introspection (1)Intrusion detection (1)Man-in-the-middle attacks (1)Online privacy; security; social networks (1)... View MoreDate Issued
    2012 (4)
    Has File(s)Yes (4)
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology