Browse Graduate Dissertations and Theses at Illinois by Contributor "Caesar, Matthew"

  • Khan, Hassan Shahid (2017-04-19)
    Networks are traditionally configured manually by operators who can potentially introduce misconfigurations, exposing the network to security risks. Furthermore, as network complexity grows it becomes harder to track anomalous ...

    application/pdf

    application/pdfPDF (1MB)Restricted Access
  • Douglas, Frederick E (2017-07-10)
    Internet censorship of one form or another affects on the order of half of all internet users. Previous work has studied this censorship, and proposed techniques for circumventing it, ranging from making proxy servers ...

    application/pdf

    application/pdfPDF (13MB)
  • Dong, Mo (2017-04-20)
    The part of TCP software stack that controls how fast a data sender transfers packets is usually referred as congestion control, because it was originally introduced to avoid network congestion of multiple competing flows. ...

    application/pdf

    application/pdfPDF (2MB)Restricted Access
  • Wan, Zhichun (2019-04-23)
    Internet of Things (IoT) is an active area of research in both academia and industry. It has attracted a large amount of interest due to its potential of revolutionizing different industries by “giving intelligence” to ...

    application/pdf

    application/pdfPDF (1MB)Restricted Access
  • Zhou, Wenxuan (2017-12-05)
    In the past decades, the world has witnessed how essential modern networks, such as data centers and enterprise networks, have become in our daily lives. However, on the other hand, configuring and maintaining a modern ...

    application/pdf

    application/pdfPDF (3MB)Restricted Access
  • Jalaparti, Virajith (2015-07-14)
    To handle millions of user requests every second and process hundreds of terabytes of data each day, many organizations have turned to large datacenter-scale computing systems. The applications running in these datacenters ...

    application/pdf

    application/pdfPDF (3MB)
  • Juen, Joshua Paul Joseph (2015-08-18)
    Mobile devices contain sensors which allow continuous recording of a user's motion allowing the development of activity, fitness and health applications. With varied applications, the motion sensors present new privacy ...

    application/pdf

    application/pdfPDF (6MB)
  • Chaudhry, Gohar Irfan (2018-04-24)
    Securely operating large-scale networks is a non-trivial task involving interactions between various hardware devices, protocols, and configurations, all of which need to work in tandem for the network to be secure and in ...

    application/pdf

    application/pdfPDF (10MB)Restricted Access
  • Nguyen, Giang Truong Khoa (2017-07-12)
    The Internet has become an integral part of modern life. At the same time, as we spend increasingly more time online, our digital trails, including the identities of the websites we visit, can reveal sensitive personal ...

    application/pdf

    application/pdfPDF (823kB)
  • Tahir, Rashid (2018-04-13)
    Modern day commercial clouds are subject to various forms of infrastructural abuse. Whether it is SaaS, PaaS or IaaS model, attackers and cybercriminals are exploiting clouds to service their needs and using them as a ...

    application/pdf

    application/pdfPDF (6MB)Restricted Access
  • Li, Qingxi (2016-04-13)
    Short flows are highly valuable in the modern Internet and are widely used by applications in the form of web requests or with user interactions. These kinds of applications are extremely sensitive to latency. A small ...

    application/pdf

    application/pdfPDF (2MB)
  • Hong, Chi-Yao (2015-01-21)
    We advocate a software defined transport (SDT) architecture in which a transport controller schedules and dynamically re-schedules the flow sending rates based on current network conditions and the network operator's goals. ...

    application/pdf

    application/pdfPDF (3MB)
  • Chen, Yongli (2017-07-17)
    Understanding router software performance is crucial for organizations which demand the optimal network quality. Because processing capability has heavy influence to communication networks [1], we need a benchmark for network ...

    application/pdf

    application/pdfPDF (507kB)
  • Croft, Jason (2017-12-05)
    Traditional computer networks require manual configuration of potentially hundreds of forwarding devices. To ease this configuration burden, software-defined networking (SDN) provides centralized, programmatic control of ...

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Das, Anupam (2016-07-01)
    The widespread use of smartphones in our everyday life gives rise to privacy concerns. Fingerprinting smartphones can jeopardize user privacy by enabling remote identification of users without users' awareness. In this ...

    application/pdf

    application/pdfPDF (13MB)