{"218":0,"2429":0,"2430":0,"2432":0,"2433":0,"2434":0,"2435":0}
Site Home
Site Home
Drexel University Libraries
Drexel University
Contact Us
å
iDEA: DREXEL LIBRARIES E-REPOSITORY AND ARCHIVES
iDEA: DREXEL LIBRARIES E-REPOSITORY AND ARCHIVES
Main sections
Main menu
Home
Search
Collections
Names
Subjects
Titles
About
You are here
Home
/
Frank Fox Polish Poster Collection at Drexel University
(x)
/
Civil Engineering
(x)
/
Environmental Engineering
(x)
/
Educational Leadership and Management
(x)
/
Electrical Engineering
(x)
/
Computer Science
(x)
/
Computer security
(x)
/
College of Computing and Informatics
(x)
/
Search results
Search results
(1 - 5 of 5)
Title
Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment
Author(s)
Heverin, Thomas
Advisor(s)
Zach, Lisl
,
Unsworth, Kristene
Date
2014-06
Type
Thesis
Title
Behavioral Malware Detection and Classification using Windows Prefetch Files
Author(s)
Alsulami, Bander
Advisor(s)
Mancoridis, Spiros
Date
2019-03
Type
Thesis
Title
Bridging Distinct Domains in Privacy Related Learning Problems
Author(s)
Overdorf, Rebekah
Advisor(s)
Greenstadt, Rachel
Date
2017-09
Type
Thesis
Title
Authorship Verification
Author(s)
Stolerman, Ariel
Advisor(s)
Greenstadt, Rachel
Date
2015-04-01
Type
Thesis
Title
Stylometric Fingerprints and Privacy Behavior in Textual Data
Author(s)
Caliskan-Islam, Aylin
Advisor(s)
Greenstadt, Rachel
Date
2015-05-01
Type
Thesis
Search iDEA
All formats
Search by:
Keyword
Name
Subject
Title
Advanced Search
Sort Results
Title
Date
Refine Results
Collection
Theses, Dissertations, and Projects
(5)
+
-
Name
Greenstadt, Rachel
(3)
+
-
Alsulami, Bander
(1)
+
-
Caliskan-Islam, Aylin
(1)
+
-
Heverin, Thomas
(1)
+
-
Mancoridis, Spiros
(1)
+
-
Overdorf, Rebekah
(1)
+
-
Stolerman, Ariel
(1)
+
-
Unsworth, Kristene
(1)
+
-
Zach, Lisl
(1)
+
-
Type
Thesis
(5)
+
-
Subject
Computer science
(5)
+
-
Machine learning
(3)
+
-
Authorship
(1)
+
-
Internet
(1)
+
-
Malware (Computer software)
(1)
+
-
Microsoft Windows (Computer file)
(1)
+
-
Privacy
(1)
+
-
Privacy, Right of
(1)
+
-
Security measures
(1)
+
-
My Account
Login