Login | Register

Items where Division is "Concordia Institute for Information Systems Engineering" and Year is 2014

Group by: Authors | Item Type | No Grouping
Jump to: A | C | D | E | F | G | H | J | K | L | M | N | O | R | S | T | W | X | Z
Number of items: 35.

A

AZAB, TAHER (2014) DIFFERENTIALLY PRIVATE TRAFFIC PADDING FOR WEB APPLICATIONS. Masters thesis, Concordia University.

Alrabaee, Saed, Saleem, Noman, Preda, Stere, Wang, Lingyu and Debbabi, Mourad (2014) OBA2: An Onion approach to Binary Code Authorship Attribution. Digital Investigation, 11 (1). S94-S103. ISSN http://dx.doi.org/10.1016/j.diin.2014.03.012

Asgariazad, Maryam (2014) Game theory and network security: Economic incentives and barriers. Masters thesis, Concordia University.

C

Cheng, Jie Chao (2014) The comparison of the methods based on Wavelet Transform and Hilbert-Huang Transform in fault diagnosis of rotating machinery. Masters thesis, Concordia University.

D

Ding, Steven H. H. (2014) Authorship Identification and Writeprint Visualization. Masters thesis, Concordia University.

Dinh, Tran Thai Son (2014) Mining Cyber Security Intelligence from Spam Data. Masters thesis, Concordia University.

Duarte Arenas, Patricia (2014) Quality costs analysis in the service sector: an empirical study of the Colombian banking system. Masters thesis, Concordia University.

de Carné de Carnavalet, Xavier (2014) A Large-Scale Evaluation of High-Impact Password Strength Meters. Masters thesis, Concordia University.

de Carné de Carnavalet, Xavier and Mannan, Mohammad (2014) Challenges and Implications of Verifiable Builds for Security-Critical Open-Source Software. In: Annual Computer Security Applications Conference (ACSAC) 2014. (In Press)

de Carné de Carnavalet, Xavier and Mannan, Mohammad (2014) Challenges and Implications of Verifiable Builds for Security-Critical Open-Source Software. In: Annual Computer Security Applications Conference (ACSAC) 2014. (In Press)

de Carné de Carnavalet, Xavier and Mannan, Mohammad (2014) From Very Weak to Very Strong: Analyzing Password-Strength Meters. In: Network and Distributed System Security (NDSS) Symposium 2014. (In Press)

E

Ebadi, Ashkan (2014) Impact of Funding on Scientific Output and Collaboration. PhD thesis, Concordia University.

F

Fallatah, Hiba (2014) Social network-Based Framework for Users and Web Services Discovery. Masters thesis, Concordia University.

G

Ghadiri Mohghaddam, Danial (2014) Framework for Integrating Bridge Inspection Data with Bridge Information Model. Masters thesis, Concordia University.

Glitho, Roch (2014) Cloudifying the 3GPP IP Multimedia Subsystem: Why and How? In: 6th International Conference on New Technologies, Mobility and Security (NTMS).

H

Huo, Wei (2014) Employing Opportunistic Diversity for Detecting Injection Attacks in Web Applications. Masters thesis, Concordia University.

J

Jariwala, Dhruv (2014) Identification of Malicious Android Applications using Kernel Level System Calls. Masters thesis, Concordia University.

K

Khundker, Nafisa (2014) Preventing confidential information leakage in supply chains through trust-based heuristic supplier selection. Masters thesis, Concordia University.

L

Lakhdari, Nour-Eddine (2014) FINGERPRINTING MALICIOUS IP TRAFFIC. Masters thesis, Concordia University.

Liu, Wen Ming (2014) Preserving Privacy Against Side-Channel Leaks. PhD thesis, Concordia University.

M

Majumdar, Suryadipta (2014) On End-to-end encryption for Cloud-based Services. Masters thesis, Concordia University.

N

Nejaty Jahromi, Ali (2014) Geo-visual Analytics of Canada-U.S. Transborder Traffic Data. Masters thesis, Concordia University.

O

Oberoi, Saurabh (2014) AndroSAT: Security Analysis Tool for Android Applications. Masters thesis, Concordia University.

R

Rafiee, Mahsa (2014) Improving Indoor Security Surveillance by Fusing Data from BIM, UWB and Video. Masters thesis, Concordia University.

Rahimian, Ashkan, Ziarati, Raha, Preda, Stere and Debbabi, Mourad (2014) On the Reverse Engineering of the Citadel Botnet. In: Foundations and Practice of Security. Lecture Notes in Computer Science, 8352 . Springer International Publishing, pp. 408-425. ISBN 978-3-319-05302-8

Rahimian, Ashkan, Ziarati, Raha, Preda, Stere and Debbabi, Mourad (2014) On the Reverse Engineering of the Citadel Botnet. In: Foundations and Practice of Security. Lecture Notes in Computer Science, 8352 . Springer International Publishing, pp. 408-425. ISBN 978-3-319-05302-8

Rema, Sawan (2014) Modeling Cost of Quality in the Construction Industry A closer look at the Procurement Process using System Dynamics. Masters thesis, Concordia University.

S

Saberi Pirouz, Atieh, Rabotka, Vladimir and Mannan, Mohammad (2014) FriendlyMail: Confidential and Verified Emails among Friends. Technical Report. UNSPECIFIED. (Unpublished)

Siddiqui, Hassaan (2014) UWB RTLS for Construction Equipment Localization: Experimental Performance Analysis and Fusion with Video Data. Masters thesis, Concordia University.

Song, Weilong (2014) a framework for automated similarity analysis of malware. Masters thesis, Concordia University.

T

Taheri, Flora, George, Jerry, Belqasmi, Fatna, kara, Nadjia and Glitho, Roch (2014) A Cloud Infrastructure for Scalable and Elastic Multimedia Conferencing Applications. In: Conference on Network and Service Management.

W

Wei, Wei (2014) Performance Measurement of Manufacturing Supply Chain. Masters thesis, Concordia University.

X

Xu, Xu (2014) Analysis on Mental Stress/Workload Using Heart Rate Variability and Galvanic Skin Response during Design Process. Masters thesis, Concordia University.

Z

Zamzami, Nuha E. (2014) Evaluating the Dynamics of Knowledge-Based Network Through Simulation: The Case of Canadian Nanotechnology Industry. Masters thesis, Concordia University.

Zhang, Min (2014) Using Six Sigma to Achieve Sustainable Manufacturing: A Case Study in Aviation Company. Masters thesis, Concordia University.

This list was generated on Tue Dec 3 03:03:56 2024 EST.
Back to top Back to top