Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( Cyber Security). Showing records 1 – 30 of 372 total matches.

[1] [2] [3] [4] [5] … [13]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


California State University – Sacramento

1. Vyas, Mruga. Security issues in distributed energy resources (DER) in smart grid.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 One of the main goals of smart grid is to create a decentralized and consumer controlled power system which can increase efficiency, reliability and reduce… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vyas, M. (2011). Security issues in distributed energy resources (DER) in smart grid. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1229

Chicago Manual of Style (16th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Masters Thesis, California State University – Sacramento. Accessed February 21, 2020. http://hdl.handle.net/10211.9/1229.

MLA Handbook (7th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Web. 21 Feb 2020.

Vancouver:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10211.9/1229.

Council of Science Editors:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1229


Cranfield University

2. Humphrey, Mike. Identifying the critical success factors to improve information security incident reporting.

Degree: PhD, 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627

Chicago Manual of Style (16th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Doctoral Dissertation, Cranfield University. Accessed February 21, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

MLA Handbook (7th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 21 Feb 2020.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2020 Feb 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627


Cranfield University

3. Lewis, P S. The global vulnerability discovery and disclosure system: a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system: a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665

Chicago Manual of Style (16th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed February 21, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

MLA Handbook (7th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Web. 21 Feb 2020.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2020 Feb 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665


Cranfield University

4. Humphrey, M. Identifying the critical success factors to improve information security incident reporting.

Degree: 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Thesis). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Thesis, Cranfield University. Accessed February 21, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 21 Feb 2020.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Thesis]. Cranfield University; 2017. [cited 2020 Feb 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Thesis]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

5. Gordon, Richard. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.

Degree: 2014, Victoria University of Wellington

Cyber-attacks present significant challenges to a modern, globalised world. Progressively used by criminal and terrorist organisations to attack or victimise non-state actors, governments are increasingly… (more)

Subjects/Keywords: Cyber; Privacy; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gordon, R. (2014). Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/3565

Chicago Manual of Style (16th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Masters Thesis, Victoria University of Wellington. Accessed February 21, 2020. http://hdl.handle.net/10063/3565.

MLA Handbook (7th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Web. 21 Feb 2020.

Vancouver:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Internet] [Masters thesis]. Victoria University of Wellington; 2014. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10063/3565.

Council of Science Editors:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Masters Thesis]. Victoria University of Wellington; 2014. Available from: http://hdl.handle.net/10063/3565

6. Puttaroo, Mohammad Ally Rehaz. A behavioural study in runtime analysis environments and drive-by download attacks.

Degree: PhD, 2017, University of West London

 In the information age, the growth in availability of both technology and exploit kits have continuously contributed in a large volume of websites being compromised… (more)

Subjects/Keywords: Cyber security; Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puttaroo, M. A. R. (2017). A behavioural study in runtime analysis environments and drive-by download attacks. (Doctoral Dissertation). University of West London. Retrieved from https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802

Chicago Manual of Style (16th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Doctoral Dissertation, University of West London. Accessed February 21, 2020. https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

MLA Handbook (7th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Web. 21 Feb 2020.

Vancouver:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Internet] [Doctoral dissertation]. University of West London; 2017. [cited 2020 Feb 21]. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

Council of Science Editors:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Doctoral Dissertation]. University of West London; 2017. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802


Texas State University – San Marcos

7. Siddique, Khan. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.

Degree: MS, Engineering, 2018, Texas State University – San Marcos

Cyber-Physical Systems (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered systems that integrate embedded computing technologies (cyber part)… (more)

Subjects/Keywords: Game theory; Cyber physical system; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Siddique, K. (2018). A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/9284

Chicago Manual of Style (16th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Masters Thesis, Texas State University – San Marcos. Accessed February 21, 2020. https://digital.library.txstate.edu/handle/10877/9284.

MLA Handbook (7th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Web. 21 Feb 2020.

Vancouver:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Internet] [Masters thesis]. Texas State University – San Marcos; 2018. [cited 2020 Feb 21]. Available from: https://digital.library.txstate.edu/handle/10877/9284.

Council of Science Editors:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Masters Thesis]. Texas State University – San Marcos; 2018. Available from: https://digital.library.txstate.edu/handle/10877/9284

8. Mitchell, Scott. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.

Degree: Doctoral Thesis, Cyber Security, 2018, Abertay University

 A steganographic method was developed based on the temporal redundancies present in digital video streams, these redundancies are utilised by the H.264 encoding standard to… (more)

Subjects/Keywords: Cyber Security; Steganography; Digital Video

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mitchell, S. (2018). H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. (Thesis). Abertay University. Retrieved from https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Thesis, Abertay University. Accessed February 21, 2020. https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Web. 21 Feb 2020.

Vancouver:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Internet] [Thesis]. Abertay University; 2018. [cited 2020 Feb 21]. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Thesis]. Abertay University; 2018. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

9. McLaughlin, Stephen Elliot. Specification-based Attacks and Defenses in Sequential Control Systems.

Degree: PhD, Computer Science and Engineering, 2014, Penn State University

Cyber physical systems, such as control systems use general purpose computation to govern the behavior of physical systems in the manufacturing, transportation, and energy sectors.… (more)

Subjects/Keywords: Security; Cyber-Physical; Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McLaughlin, S. E. (2014). Specification-based Attacks and Defenses in Sequential Control Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/21556

Chicago Manual of Style (16th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Doctoral Dissertation, Penn State University. Accessed February 21, 2020. https://etda.libraries.psu.edu/catalog/21556.

MLA Handbook (7th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Web. 21 Feb 2020.

Vancouver:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Internet] [Doctoral dissertation]. Penn State University; 2014. [cited 2020 Feb 21]. Available from: https://etda.libraries.psu.edu/catalog/21556.

Council of Science Editors:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Doctoral Dissertation]. Penn State University; 2014. Available from: https://etda.libraries.psu.edu/catalog/21556


University of Oxford

10. Smith, Matthew. Measuring operational realities of security and privacy for deployed avionics.

Degree: PhD, 2018, University of Oxford

 Despite being renowned as an exceptionally safety-conscious industry, aviation has been slow to address the cyber security threat. A critical point has been reached whereby… (more)

Subjects/Keywords: Cyber security; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, M. (2018). Measuring operational realities of security and privacy for deployed avionics. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629

Chicago Manual of Style (16th Edition):

Smith, Matthew. “Measuring operational realities of security and privacy for deployed avionics.” 2018. Doctoral Dissertation, University of Oxford. Accessed February 21, 2020. http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629.

MLA Handbook (7th Edition):

Smith, Matthew. “Measuring operational realities of security and privacy for deployed avionics.” 2018. Web. 21 Feb 2020.

Vancouver:

Smith M. Measuring operational realities of security and privacy for deployed avionics. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2020 Feb 21]. Available from: http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629.

Council of Science Editors:

Smith M. Measuring operational realities of security and privacy for deployed avionics. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629

11. Ridderman, Lindsey. The Effects of a Factory Reset on an iPhone 8 Plus.

Degree: 2018, Ferris State University

 With the rapid evolution of the Apple iPhone and the high rate of cybercrime it seems impossible to keep up on the everchanging security features… (more)

Subjects/Keywords: iPhone; Cyber security.; Factory reset.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ridderman, L. (2018). The Effects of a Factory Reset on an iPhone 8 Plus. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ridderman, Lindsey. “The Effects of a Factory Reset on an iPhone 8 Plus.” 2018. Thesis, Ferris State University. Accessed February 21, 2020. http://hdl.handle.net/2323/6377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ridderman, Lindsey. “The Effects of a Factory Reset on an iPhone 8 Plus.” 2018. Web. 21 Feb 2020.

Vancouver:

Ridderman L. The Effects of a Factory Reset on an iPhone 8 Plus. [Internet] [Thesis]. Ferris State University; 2018. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2323/6377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ridderman L. The Effects of a Factory Reset on an iPhone 8 Plus. [Thesis]. Ferris State University; 2018. Available from: http://hdl.handle.net/2323/6377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Tan, Song. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.

Degree: PhD, Computer Science, 2016, Georgia State University

  A Smart Grid is a digitally enabled electric power grid that integrates the computation and communication technologies from cyber world with the sensors and… (more)

Subjects/Keywords: Cyber Security; Testbed; Smart Grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, S. (2016). On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_diss/103

Chicago Manual of Style (16th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Doctoral Dissertation, Georgia State University. Accessed February 21, 2020. https://scholarworks.gsu.edu/cs_diss/103.

MLA Handbook (7th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Web. 21 Feb 2020.

Vancouver:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Internet] [Doctoral dissertation]. Georgia State University; 2016. [cited 2020 Feb 21]. Available from: https://scholarworks.gsu.edu/cs_diss/103.

Council of Science Editors:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Doctoral Dissertation]. Georgia State University; 2016. Available from: https://scholarworks.gsu.edu/cs_diss/103


Royal Holloway, University of London

13. Haggman, Andreas. Cyber wargaming : finding, designing, and playing wargames for cyber security education.

Degree: PhD, 2019, Royal Holloway, University of London

 This thesis investigates, and contributes to, the use of wargaming in cyber security education. Wargaming has a rich history of pedagogic use, but little work… (more)

Subjects/Keywords: cyber security; wargaming; education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Haggman, A. (2019). Cyber wargaming : finding, designing, and playing wargames for cyber security education. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934

Chicago Manual of Style (16th Edition):

Haggman, Andreas. “Cyber wargaming : finding, designing, and playing wargames for cyber security education.” 2019. Doctoral Dissertation, Royal Holloway, University of London. Accessed February 21, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934.

MLA Handbook (7th Edition):

Haggman, Andreas. “Cyber wargaming : finding, designing, and playing wargames for cyber security education.” 2019. Web. 21 Feb 2020.

Vancouver:

Haggman A. Cyber wargaming : finding, designing, and playing wargames for cyber security education. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2019. [cited 2020 Feb 21]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934.

Council of Science Editors:

Haggman A. Cyber wargaming : finding, designing, and playing wargames for cyber security education. [Doctoral Dissertation]. Royal Holloway, University of London; 2019. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934


University of Sydney

14. Andal, Stephenie Lois. Cyber Sovereignty: A New Vision in China .

Degree: 2018, University of Sydney

 Research on China’s strategy of cyber sovereignty to date has been inadequate, conceiving of the blueprint as a domestic Party censorship and surveillance mechanism, effectively… (more)

Subjects/Keywords: China; cyber sovereignty; Internet governance; cyber security; Hong Kong; cyber governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andal, S. L. (2018). Cyber Sovereignty: A New Vision in China . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Thesis, University of Sydney. Accessed February 21, 2020. http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Web. 21 Feb 2020.

Vancouver:

Andal SL. Cyber Sovereignty: A New Vision in China . [Internet] [Thesis]. University of Sydney; 2018. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andal SL. Cyber Sovereignty: A New Vision in China . [Thesis]. University of Sydney; 2018. Available from: http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

15. Verkerke, A.T. Towards a cyber approach for large organisations:.

Degree: 2015, Delft University of Technology

 Participation in cyberspace is of key importance for large organisations (and the functioning of our society), but to participate responsibly a comprehensive cyber approach is… (more)

Subjects/Keywords: cyber security; standards; cyber resilience; cyber governance; risk management; situational awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verkerke, A. T. (2015). Towards a cyber approach for large organisations:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

Chicago Manual of Style (16th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Masters Thesis, Delft University of Technology. Accessed February 21, 2020. http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

MLA Handbook (7th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Web. 21 Feb 2020.

Vancouver:

Verkerke AT. Towards a cyber approach for large organisations:. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2020 Feb 21]. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

Council of Science Editors:

Verkerke AT. Towards a cyber approach for large organisations:. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

16. Van De Sandt, Erik. Deviant security : the technical computer security practices of cyber criminals.

Degree: PhD, 2019, University of Bristol

 The dominant academic and practitioners' perspective on security evolves around law-abiding referent objects of security who are under attack by law-breaking threat agents. This study… (more)

Subjects/Keywords: cyber crime; cyber security; cyber criminals; deviant security; investigations; police; law-enforcement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van De Sandt, E. (2019). Deviant security : the technical computer security practices of cyber criminals. (Doctoral Dissertation). University of Bristol. Retrieved from http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb

Chicago Manual of Style (16th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Doctoral Dissertation, University of Bristol. Accessed February 21, 2020. http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

MLA Handbook (7th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Web. 21 Feb 2020.

Vancouver:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

Council of Science Editors:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Doctoral Dissertation]. University of Bristol; 2019. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb


Luleå University of Technology

17. Fumudoh, Samar. Exploring the Relationship between Online Privacy on Cyber Security.

Degree: 2014, Luleå University of Technology

The aim of this research is to explore the relationship between online privacy and cybersecurity. With the birth of the internet and the recent… (more)

Subjects/Keywords: Technology; Privacy; Security; Cyber; Online privacy and cyber security; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fumudoh, S. (2014). Exploring the Relationship between Online Privacy on Cyber Security. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Thesis, Luleå University of Technology. Accessed February 21, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Web. 21 Feb 2020.

Vancouver:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Internet] [Thesis]. Luleå University of Technology; 2014. [cited 2020 Feb 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Thesis]. Luleå University of Technology; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

18. Pakalniškis, S. What factors explain why there is not a common and comprehensive global response to cyber threats?.

Degree: 2012, Leiden University

Analysis of the main causes why there is not a comprehensive global response to cyber threats. Analysis focuses on state interactions in the UN and CoE. Advisors/Committee Members: Chalmers, Dr. A.W (advisor), Hosli, Prof.dr. M.O (advisor).

Subjects/Keywords: cyber security; cyber threats; united nations; council of europe; cybercrime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pakalniškis, S. (2012). What factors explain why there is not a common and comprehensive global response to cyber threats?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/19509

Chicago Manual of Style (16th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Masters Thesis, Leiden University. Accessed February 21, 2020. http://hdl.handle.net/1887/19509.

MLA Handbook (7th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Web. 21 Feb 2020.

Vancouver:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Internet] [Masters thesis]. Leiden University; 2012. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1887/19509.

Council of Science Editors:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Masters Thesis]. Leiden University; 2012. Available from: http://hdl.handle.net/1887/19509


Rochester Institute of Technology

19. Bean, Jordan. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.

Degree: MS, Computer Engineering, 2009, Rochester Institute of Technology

  On secure networks, even sophisticated cyber hackers must perform multiple steps to implement attacks on sensitive data and critical servers hidden behind layers of… (more)

Subjects/Keywords: Attack track; Cyber alert attribute analysis; Cyber security; Longest common subsequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bean, J. (2009). CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9095

Chicago Manual of Style (16th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed February 21, 2020. https://scholarworks.rit.edu/theses/9095.

MLA Handbook (7th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Web. 21 Feb 2020.

Vancouver:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2020 Feb 21]. Available from: https://scholarworks.rit.edu/theses/9095.

Council of Science Editors:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9095


Delft University of Technology

20. Zhu, Y. Attack pattern ontology: A common language for attack information sharing between organizations :.

Degree: 2015, Delft University of Technology

Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks.… (more)

Subjects/Keywords: cyber security; information sharing; cyber attack; attack pattern; ontology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2015). Attack pattern ontology: A common language for attack information sharing between organizations :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46

Chicago Manual of Style (16th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Masters Thesis, Delft University of Technology. Accessed February 21, 2020. http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

MLA Handbook (7th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Web. 21 Feb 2020.

Vancouver:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2020 Feb 21]. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

Council of Science Editors:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46


University of Wisconsin – Milwaukee

21. Xiang, Yingmeng. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.

Degree: PhD, Engineering, 2017, University of Wisconsin – Milwaukee

  With the smart grid initiatives in recent years, the electric power grid is rapidly evolving into a complicated and interconnected cyber-physical system. Unfortunately, the… (more)

Subjects/Keywords: Cyber-physical System; Smart Grid Cyber Security; Electrical and Electronics; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiang, Y. (2017). Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. (Doctoral Dissertation). University of Wisconsin – Milwaukee. Retrieved from https://dc.uwm.edu/etd/1725

Chicago Manual of Style (16th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Doctoral Dissertation, University of Wisconsin – Milwaukee. Accessed February 21, 2020. https://dc.uwm.edu/etd/1725.

MLA Handbook (7th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Web. 21 Feb 2020.

Vancouver:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Internet] [Doctoral dissertation]. University of Wisconsin – Milwaukee; 2017. [cited 2020 Feb 21]. Available from: https://dc.uwm.edu/etd/1725.

Council of Science Editors:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Doctoral Dissertation]. University of Wisconsin – Milwaukee; 2017. Available from: https://dc.uwm.edu/etd/1725


University of South Florida

22. Johnson, Kim. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.

Degree: 2018, University of South Florida

 Information security is of vital importance to organizations. Breaches in security very often stem from behaviors of the system operator. Cyber misbehaviors on the part… (more)

Subjects/Keywords: cyber risk; cyber safety; cybersecurity; information security; Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johnson, K. (2018). Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/7630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Johnson, Kim. “Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.” 2018. Thesis, University of South Florida. Accessed February 21, 2020. https://scholarcommons.usf.edu/etd/7630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Johnson, Kim. “Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.” 2018. Web. 21 Feb 2020.

Vancouver:

Johnson K. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. [Internet] [Thesis]. University of South Florida; 2018. [cited 2020 Feb 21]. Available from: https://scholarcommons.usf.edu/etd/7630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Johnson K. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. [Thesis]. University of South Florida; 2018. Available from: https://scholarcommons.usf.edu/etd/7630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

23. Davis, Sarah. Cyber-Physical Security Strategies.

Degree: MSEE, Electrical and Computer Engineering, 2014, Louisiana State University

Cyber-physical security describes the protection of systems with close relationships between computational functions and physical ones and addresses the issue of vulnerability to attack through… (more)

Subjects/Keywords: cyber-physical security; control sytem security; sensor network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, S. (2014). Cyber-Physical Security Strategies. (Masters Thesis). Louisiana State University. Retrieved from etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147

Chicago Manual of Style (16th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Masters Thesis, Louisiana State University. Accessed February 21, 2020. etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

MLA Handbook (7th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Web. 21 Feb 2020.

Vancouver:

Davis S. Cyber-Physical Security Strategies. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2020 Feb 21]. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

Council of Science Editors:

Davis S. Cyber-Physical Security Strategies. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147


Royal Holloway, University of London

24. Hersee, Steven. The cyber security dilemma and the securitisation of cyberspace.

Degree: PhD, 2019, Royal Holloway, University of London

 This thesis analyses the different securitisations of cyberspace by the Digital Rights Community (DRC) and the British state. It considers both the internal and external… (more)

Subjects/Keywords: Cyber Security; Encryption; Digital Rights; Security Dilemma; Securitisation; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hersee, S. (2019). The cyber security dilemma and the securitisation of cyberspace. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904

Chicago Manual of Style (16th Edition):

Hersee, Steven. “The cyber security dilemma and the securitisation of cyberspace.” 2019. Doctoral Dissertation, Royal Holloway, University of London. Accessed February 21, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904.

MLA Handbook (7th Edition):

Hersee, Steven. “The cyber security dilemma and the securitisation of cyberspace.” 2019. Web. 21 Feb 2020.

Vancouver:

Hersee S. The cyber security dilemma and the securitisation of cyberspace. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2019. [cited 2020 Feb 21]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904.

Council of Science Editors:

Hersee S. The cyber security dilemma and the securitisation of cyberspace. [Doctoral Dissertation]. Royal Holloway, University of London; 2019. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904


Rochester Institute of Technology

25. Imhof, Robert. Cyber crime and telecommunications law.

Degree: 2010, Rochester Institute of Technology

Cyber crime is a new and emerging area of concern for technology professionals, business leaders, and heads of government. This research takes a look at… (more)

Subjects/Keywords: Cyber crime; Hacker; Information; Law; Security; Sociology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Imhof, R. (2010). Cyber crime and telecommunications law. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Thesis, Rochester Institute of Technology. Accessed February 21, 2020. https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Web. 21 Feb 2020.

Vancouver:

Imhof R. Cyber crime and telecommunications law. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2020 Feb 21]. Available from: https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Imhof R. Cyber crime and telecommunications law. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

26. Waithaka, Samuel W. Factors Affecting Cyber Security In National Government Ministries In Kenya .

Degree: 2016, University of Nairobi

 The main justification of e-government systems is to offer public services conveniently and continuously over open and distributed networks. Security reliability of information connected over… (more)

Subjects/Keywords: Cyber Security In National Government Ministries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waithaka, S. W. (2016). Factors Affecting Cyber Security In National Government Ministries In Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Thesis, University of Nairobi. Accessed February 21, 2020. http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Web. 21 Feb 2020.

Vancouver:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Internet] [Thesis]. University of Nairobi; 2016. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Thesis]. University of Nairobi; 2016. Available from: http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

27. Al Majali, Anas. A function-based methodology for evaluating resilience in smart grids.

Degree: PhD, Computer Engineering, 2014, University of Southern California

 Utilizing communication, control and computation technologies in the modern smart grid can enhance the reliability of the smart grid, reduce electricity costs and provide new… (more)

Subjects/Keywords: resilience; smart grids; cyber-physical security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Majali, A. (2014). A function-based methodology for evaluating resilience in smart grids. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197

Chicago Manual of Style (16th Edition):

Al Majali, Anas. “A function-based methodology for evaluating resilience in smart grids.” 2014. Doctoral Dissertation, University of Southern California. Accessed February 21, 2020. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197.

MLA Handbook (7th Edition):

Al Majali, Anas. “A function-based methodology for evaluating resilience in smart grids.” 2014. Web. 21 Feb 2020.

Vancouver:

Al Majali A. A function-based methodology for evaluating resilience in smart grids. [Internet] [Doctoral dissertation]. University of Southern California; 2014. [cited 2020 Feb 21]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197.

Council of Science Editors:

Al Majali A. A function-based methodology for evaluating resilience in smart grids. [Doctoral Dissertation]. University of Southern California; 2014. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197

28. Barnes, John. Capstone Project: Cyber Security Analysis for IKANOW .

Degree: 2017, California State University – San Marcos

This paper utilizes a plethora of resources to evaluate the cyber security firm IKANOW???s position in the market. Advisors/Committee Members: Grooms, David (advisor), Oskoorouchi, Mohammad (committeemember).

Subjects/Keywords: Cyber security Market research; IKANOW; Evaluation Resources

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barnes, J. (2017). Capstone Project: Cyber Security Analysis for IKANOW . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.3/194703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barnes, John. “Capstone Project: Cyber Security Analysis for IKANOW .” 2017. Thesis, California State University – San Marcos. Accessed February 21, 2020. http://hdl.handle.net/10211.3/194703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barnes, John. “Capstone Project: Cyber Security Analysis for IKANOW .” 2017. Web. 21 Feb 2020.

Vancouver:

Barnes J. Capstone Project: Cyber Security Analysis for IKANOW . [Internet] [Thesis]. California State University – San Marcos; 2017. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10211.3/194703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barnes J. Capstone Project: Cyber Security Analysis for IKANOW . [Thesis]. California State University – San Marcos; 2017. Available from: http://hdl.handle.net/10211.3/194703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

29. Guymon, Daniel Wade. Cyber-physical Algorithms for Enhancing Collaboration.

Degree: MS, Electrical and Computer Engineering, 2012, Virginia Tech

 The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people.… (more)

Subjects/Keywords: cyber-physical systems; mobile computing; smartphones; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guymon, D. W. (2012). Cyber-physical Algorithms for Enhancing Collaboration. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/31919

Chicago Manual of Style (16th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Masters Thesis, Virginia Tech. Accessed February 21, 2020. http://hdl.handle.net/10919/31919.

MLA Handbook (7th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Web. 21 Feb 2020.

Vancouver:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Internet] [Masters thesis]. Virginia Tech; 2012. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10919/31919.

Council of Science Editors:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Masters Thesis]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/31919


California State University – Channel Islands

30. Agarwal, Geetanjali. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .

Degree: 2018, California State University – Channel Islands

 Digital imaging has experienced tremendous growth in recent decades, and have been used in a growing number of applications. With such increasing popularity and the… (more)

Subjects/Keywords: Image recognition; Cyber security; Computer Science thesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Agarwal, G. (2018). Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . (Thesis). California State University – Channel Islands. Retrieved from http://hdl.handle.net/10211.3/207494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Agarwal, Geetanjali. “Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .” 2018. Thesis, California State University – Channel Islands. Accessed February 21, 2020. http://hdl.handle.net/10211.3/207494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Agarwal, Geetanjali. “Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .” 2018. Web. 21 Feb 2020.

Vancouver:

Agarwal G. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . [Internet] [Thesis]. California State University – Channel Islands; 2018. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10211.3/207494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Agarwal G. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . [Thesis]. California State University – Channel Islands; 2018. Available from: http://hdl.handle.net/10211.3/207494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [13]

.