Virginia Tech® home

Dissertations & Thesis

List for Ph.D.

Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense

Chris Morrell, PhD, Electrical and Computer Engineering

May 2016


Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses

Matthew Dunlop, PhD, Electrical and Computer Engineering

May 2012

ETD | Full Text: PDF


Battery-Sensing Intrusion Protection System (B-SIPS)

Timothy Buennemeyer, PhD, Electrical and Computer Engineering

December 2008

ETD | Full Text: PDF


Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols

David Raymond, PhD, Electrical and Computer Engineering

May 2008

ETD | Full Text: PDF


Network Anomaly Detection with Incomplete Audit Data

Animesh Patcha, PhD, Electrical and Computer Engineering

May 2006

ETD | Full Text: PDF


Thwarting Network Stealth Worms in Computer Networks through Biological Epidemiology

Kristopher Hall, PhD, Electrical and Computer Engineering

May 2006

ETD | Full Text: PDF


Energy-efficient Wireless Sensor Network MAC Protocol

Michael Brownfield, PhD, Electrical and Computer Engineering

May 2006

ETD | Full Text: PDF


A Framework for Deriving Verification and Validation Strategies to Assess Software Security

Anil Bazaz, PhD, Computer Science

May 2006

ETD | Full Text: PDF


Battery-Based Intrusion Detection

Grant Jacoby, PhD, Electrical and Computer Engineering

May 2005

ETD | Full Text: PDF


A Taxonomy of Computer Attacks with Applications to Wireless Networks

Daniel Lough, PhD, Electrical and Computer Engineering

May 2001

ETD | Full Text: PDF


List for Masters

Strengthening MT6D Defenses with Darknet and Honeypot Capabilities

Dileep Basam, Master of Science, Electrical Engineering

December, 2015

ETD | Full Text: PDF


Micro-Moving Target IPv6 Defense for 6LoWPAN and the Internet

Matthew Sherburne, Master of Science, Electrical Engineering

April, 2015

ETD | Full Text: PDF


An Optimized Alert System Based on Geospatial Location Data

Kimberly Zeitz, Master of Science, Computer Science and Applications

May, 2014

ETD | Full Text: PDF


Evaluation of Moving Target Defense and Distributed Denial of Service Defenses

Peter DiMarco, Master of Science, Electrical and Computer Engineering

November 2013

ETD | Full Text: PDF


Evaluating Standard and Custom Applications in IPv6 Within a Simulation Framework

Brittany Clore, Master of Science, Electrical and Computer Engineering

July 2012

ETD | Full Text: PDF


Privacy and Security in IPv6 Addressing

Stephen Groat, Master of Science, Electrical and Computer Engineering

May 2011

ETD | Full Text: PDF


Securing Software Intellectual Property on Commodity and Legacy Embedded Systems

Michael Gora, Master of Engineering, Electrical and Computer Engineering

May 2010

ETD | Full Text: PDF


Assessing Security Vulnerabilities: An Application of Partial and End-Game Verification and Validation

Edward Frazier, Master of Science, Electrical and Computer Engineering

May 2010

ETD | Full Text: PDF


Bluetooth Threat Taxonomy

John Dunning, Master of Science, Computer Science

December 2010

ETD | Full Text: PDF


Multi-Vector Portable Intrusion Detection System

Benjamin Moyers, Master of Science, Computer Engineering

May 2009

ETD | Full Text: PDF


Security Requirements for the Prevention of Modern Software Vulnerabilities and a Process for Incorporation into Classic Software Development Lifecycles

Lee Clagett II, Master of Science, Computer Science

December 2009

ETD | Full Text: PDF


Optimizations of Battery-Based Intrusion Protection Systems

Theresa Nelson, Master of Science, Electrical and Computer Engineering

May 2008

ETD | Full Text: PDF


Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles

Timothy McNevin, Master of Science, Electrical and Computer Engineering

May 2005

ETD | Full Text: PDF


Using Plant Epidemiological Methods to Track Computer Network Worms

Rishikesh Pande, Master of Science, Computer Science

May 2004

ETD | Full Text: PDF