Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( Data leak prevention). Showing records 1 – 30 of 38113 total matches.

[1] [2] [3] [4] [5] … [1271]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


Clemson University

1. Zhao, Lianyu. Semantic Similarity Detection in Natural Language Documents.

Degree: MS, Computer Engineering, 2012, Clemson University

Data leak prevention (DLP) solutions monitor and control data flow. Current techniques find data that matches user defined syntactic patterns. Unfortunately, large classes of DLP… (more)

Subjects/Keywords: data leak prevention; HMM; PCFG; semantic similarity; SVD; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhao, L. (2012). Semantic Similarity Detection in Natural Language Documents. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/1526

Chicago Manual of Style (16th Edition):

Zhao, Lianyu. “Semantic Similarity Detection in Natural Language Documents.” 2012. Masters Thesis, Clemson University. Accessed December 19, 2018. https://tigerprints.clemson.edu/all_theses/1526.

MLA Handbook (7th Edition):

Zhao, Lianyu. “Semantic Similarity Detection in Natural Language Documents.” 2012. Web. 19 Dec 2018.

Vancouver:

Zhao L. Semantic Similarity Detection in Natural Language Documents. [Internet] [Masters thesis]. Clemson University; 2012. [cited 2018 Dec 19]. Available from: https://tigerprints.clemson.edu/all_theses/1526.

Council of Science Editors:

Zhao L. Semantic Similarity Detection in Natural Language Documents. [Masters Thesis]. Clemson University; 2012. Available from: https://tigerprints.clemson.edu/all_theses/1526


Brno University of Technology

2. Smejkal, Adam. Nástroj pro ochranu výkresů AutoCAD .

Degree: 2017, Brno University of Technology

 Cílem práce je vytvořit nástroj, který umožní chránit citlivá data výkresů tvořených v programu AutoCAD 2016 pomocí principů využívaných systémy pro správu přístupových práv k… (more)

Subjects/Keywords: Prevence úniku citlivých dat; DLP; AutoCAD; správa přístupových práv k informacím; IRM; AD RMS; Data leak prevention; DLP; AutoCAD; information rights management; IRM; AD RMS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smejkal, A. (2017). Nástroj pro ochranu výkresů AutoCAD . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69858

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smejkal, Adam. “Nástroj pro ochranu výkresů AutoCAD .” 2017. Thesis, Brno University of Technology. Accessed December 19, 2018. http://hdl.handle.net/11012/69858.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smejkal, Adam. “Nástroj pro ochranu výkresů AutoCAD .” 2017. Web. 19 Dec 2018.

Vancouver:

Smejkal A. Nástroj pro ochranu výkresů AutoCAD . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/11012/69858.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smejkal A. Nástroj pro ochranu výkresů AutoCAD . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/69858

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

3. Shu, Xiaokui. Threat Detection in Program Execution and Data Movement: Theory and Practice.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Program attacks are one of the oldest and fundamental cyber threats. They compromise the confidentiality of data, the integrity of program logic, and the availability… (more)

Subjects/Keywords: Cybersecurity; Program Anomaly Detection; Data Leak Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shu, X. (2016). Threat Detection in Program Execution and Data Movement: Theory and Practice. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/71463

Chicago Manual of Style (16th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Doctoral Dissertation, Virginia Tech. Accessed December 19, 2018. http://hdl.handle.net/10919/71463.

MLA Handbook (7th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Web. 19 Dec 2018.

Vancouver:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/10919/71463.

Council of Science Editors:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/71463


Iowa State University

4. Singh, Damanjit. Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux.

Degree: 2014, Iowa State University

 Analysis of inter-procedural data flow (IDF) is a commonly encountered challenge for verifying safety and security properties of large software. In order to address this… (more)

Subjects/Keywords: Computer Engineering; Empirical Study; Inter-procedural Data Flow; Linux; Memory Leak; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singh, D. (2014). Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/14270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Singh, Damanjit. “Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux.” 2014. Thesis, Iowa State University. Accessed December 19, 2018. https://lib.dr.iastate.edu/etd/14270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Singh, Damanjit. “Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux.” 2014. Web. 19 Dec 2018.

Vancouver:

Singh D. Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux. [Internet] [Thesis]. Iowa State University; 2014. [cited 2018 Dec 19]. Available from: https://lib.dr.iastate.edu/etd/14270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Singh D. Empirical study of inter-procedural data flow (IDF) patterns for memory leak analysis in Linux. [Thesis]. Iowa State University; 2014. Available from: https://lib.dr.iastate.edu/etd/14270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Edinburgh

5. Greenwell, Joel. Do organisations in the UK have a legal right to implement Data Loss Prevention technology with respect to employee’s personal devices?.

Degree: 2013, University of Edinburgh

 There are two technology paradigms that have become predominant within the past few years, which are converging upon each other much like two huge cargo… (more)

Subjects/Keywords: data loss prevention; personal devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Greenwell, J. (2013). Do organisations in the UK have a legal right to implement Data Loss Prevention technology with respect to employee’s personal devices?. (Thesis). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/9387

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Greenwell, Joel. “Do organisations in the UK have a legal right to implement Data Loss Prevention technology with respect to employee’s personal devices?.” 2013. Thesis, University of Edinburgh. Accessed December 19, 2018. http://hdl.handle.net/1842/9387.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Greenwell, Joel. “Do organisations in the UK have a legal right to implement Data Loss Prevention technology with respect to employee’s personal devices?.” 2013. Web. 19 Dec 2018.

Vancouver:

Greenwell J. Do organisations in the UK have a legal right to implement Data Loss Prevention technology with respect to employee’s personal devices?. [Internet] [Thesis]. University of Edinburgh; 2013. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/1842/9387.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Greenwell J. Do organisations in the UK have a legal right to implement Data Loss Prevention technology with respect to employee’s personal devices?. [Thesis]. University of Edinburgh; 2013. Available from: http://hdl.handle.net/1842/9387

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Nyarko, Richard. Security of Big Data: Focus on Data Leakage Prevention (DLP).

Degree: Electrical and Space Engineering, 2018, Luleå University of Technology

Data has become an indispensable part of our daily lives in this era of information age. The amount of data which is generated is… (more)

Subjects/Keywords: Big data; big data security; data leakage prevention; data leakage prevention system; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyarko, R. (2018). Security of Big Data: Focus on Data Leakage Prevention (DLP). (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nyarko, Richard. “Security of Big Data: Focus on Data Leakage Prevention (DLP).” 2018. Thesis, Luleå University of Technology. Accessed December 19, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nyarko, Richard. “Security of Big Data: Focus on Data Leakage Prevention (DLP).” 2018. Web. 19 Dec 2018.

Vancouver:

Nyarko R. Security of Big Data: Focus on Data Leakage Prevention (DLP). [Internet] [Thesis]. Luleå University of Technology; 2018. [cited 2018 Dec 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nyarko R. Security of Big Data: Focus on Data Leakage Prevention (DLP). [Thesis]. Luleå University of Technology; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

7. Moors, J. Model-based leak localization in small water supply networks:.

Degree: 2016, Delft University of Technology

 Small leaks in water supply networks often remain undiscovered, resulting in large amounts of lost water. Moreover, small leaks can grow larger over time and… (more)

Subjects/Keywords: automatic leak localization; DMA; leak detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moors, J. (2016). Model-based leak localization in small water supply networks:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:25aa7faa-8111-4198-a247-6eb84a5e49ef

Chicago Manual of Style (16th Edition):

Moors, J. “Model-based leak localization in small water supply networks:.” 2016. Masters Thesis, Delft University of Technology. Accessed December 19, 2018. http://resolver.tudelft.nl/uuid:25aa7faa-8111-4198-a247-6eb84a5e49ef.

MLA Handbook (7th Edition):

Moors, J. “Model-based leak localization in small water supply networks:.” 2016. Web. 19 Dec 2018.

Vancouver:

Moors J. Model-based leak localization in small water supply networks:. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2018 Dec 19]. Available from: http://resolver.tudelft.nl/uuid:25aa7faa-8111-4198-a247-6eb84a5e49ef.

Council of Science Editors:

Moors J. Model-based leak localization in small water supply networks:. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:25aa7faa-8111-4198-a247-6eb84a5e49ef


Universidade do Rio Grande do Norte

8. Araujo, Gabriell John Medeiros de. Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos .

Degree: 2012, Universidade do Rio Grande do Norte

 In February 2011, the National Agency of Petroleum, Natural Gas and Biofuels (ANP) has published a new Technical Rules for Handling Land Pipeline Petroleum and… (more)

Subjects/Keywords: detecção de vazamentos; sistema de aquisição de dados; arquitetura SCADA; processamento digital de sinais; transiente de pressão; leak detection; data acquisition system; SCADA architecture; digital signal; processing; pressure transient

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Araujo, G. J. M. d. (2012). Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos . (Masters Thesis). Universidade do Rio Grande do Norte. Retrieved from http://repositorio.ufrn.br/handle/123456789/18536

Chicago Manual of Style (16th Edition):

Araujo, Gabriell John Medeiros de. “Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos .” 2012. Masters Thesis, Universidade do Rio Grande do Norte. Accessed December 19, 2018. http://repositorio.ufrn.br/handle/123456789/18536.

MLA Handbook (7th Edition):

Araujo, Gabriell John Medeiros de. “Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos .” 2012. Web. 19 Dec 2018.

Vancouver:

Araujo GJMd. Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos . [Internet] [Masters thesis]. Universidade do Rio Grande do Norte; 2012. [cited 2018 Dec 19]. Available from: http://repositorio.ufrn.br/handle/123456789/18536.

Council of Science Editors:

Araujo GJMd. Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos . [Masters Thesis]. Universidade do Rio Grande do Norte; 2012. Available from: http://repositorio.ufrn.br/handle/123456789/18536


Universidade do Rio Grande do Norte

9. Araujo, Gabriell John Medeiros de. Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos .

Degree: 2012, Universidade do Rio Grande do Norte

 In February 2011, the National Agency of Petroleum, Natural Gas and Biofuels (ANP) has published a new Technical Rules for Handling Land Pipeline Petroleum and… (more)

Subjects/Keywords: detecção de vazamentos; sistema de aquisição de dados; arquitetura SCADA; processamento digital de sinais; transiente de pressão; leak detection; data acquisition system; SCADA architecture; digital signal; processing; pressure transient

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Araujo, G. J. M. d. (2012). Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos . (Thesis). Universidade do Rio Grande do Norte. Retrieved from http://repositorio.ufrn.br/handle/123456789/18536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Araujo, Gabriell John Medeiros de. “Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos .” 2012. Thesis, Universidade do Rio Grande do Norte. Accessed December 19, 2018. http://repositorio.ufrn.br/handle/123456789/18536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Araujo, Gabriell John Medeiros de. “Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos .” 2012. Web. 19 Dec 2018.

Vancouver:

Araujo GJMd. Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos . [Internet] [Thesis]. Universidade do Rio Grande do Norte; 2012. [cited 2018 Dec 19]. Available from: http://repositorio.ufrn.br/handle/123456789/18536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Araujo GJMd. Sistema de aquisição de dados para estudos de transiente de pressão e detecção de vazamentos em oleodutos . [Thesis]. Universidade do Rio Grande do Norte; 2012. Available from: http://repositorio.ufrn.br/handle/123456789/18536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

10. László, Peter. Monitoring a analýza uživatelů systémem DLP .

Degree: 2011, Brno University of Technology

 Cílem této práce je seznámit čtenáře s tzv. Data Loss Prevention systémy, popsat jednotlivé části těchto systémů a jejich výhody a nevýhody. Dokument obsahuje potřebné… (more)

Subjects/Keywords: Data Loss Prevention; mini-filter; ovladač; IRP; jádro; Data Loss Prevention; mini-filter; driver; IRP; kernel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

László, P. (2011). Monitoring a analýza uživatelů systémem DLP . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/55738

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

László, Peter. “Monitoring a analýza uživatelů systémem DLP .” 2011. Thesis, Brno University of Technology. Accessed December 19, 2018. http://hdl.handle.net/11012/55738.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

László, Peter. “Monitoring a analýza uživatelů systémem DLP .” 2011. Web. 19 Dec 2018.

Vancouver:

László P. Monitoring a analýza uživatelů systémem DLP . [Internet] [Thesis]. Brno University of Technology; 2011. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/11012/55738.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

László P. Monitoring a analýza uživatelů systémem DLP . [Thesis]. Brno University of Technology; 2011. Available from: http://hdl.handle.net/11012/55738

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

11. Rudafshani, Masoomeh. Detection and Diagnosis of Memory Leaks in Web Applications.

Degree: 2015, University of Waterloo

 Memory leaks  – the existence of unused memory on the heap of applications  – result in low performance and may, in the worst case, cause… (more)

Subjects/Keywords: Memory Leak; JavaScript; Dynamic Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rudafshani, M. (2015). Detection and Diagnosis of Memory Leaks in Web Applications. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/9431

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rudafshani, Masoomeh. “Detection and Diagnosis of Memory Leaks in Web Applications.” 2015. Thesis, University of Waterloo. Accessed December 19, 2018. http://hdl.handle.net/10012/9431.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rudafshani, Masoomeh. “Detection and Diagnosis of Memory Leaks in Web Applications.” 2015. Web. 19 Dec 2018.

Vancouver:

Rudafshani M. Detection and Diagnosis of Memory Leaks in Web Applications. [Internet] [Thesis]. University of Waterloo; 2015. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/10012/9431.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rudafshani M. Detection and Diagnosis of Memory Leaks in Web Applications. [Thesis]. University of Waterloo; 2015. Available from: http://hdl.handle.net/10012/9431

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

12. Ghimire, Bishwas. Modeling formation resistivity changes during Leak-Off Tests (LOT’s).

Degree: Petroleum and Geosystems Engineering, 2015, University of Texas – Austin

Leak-Off-Tests (LOT’s) are performed shortly after drilling into the new formation below a cased interval in order to determine the strength of the formation below… (more)

Subjects/Keywords: Leak-Off Test; Formation resistivity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghimire, B. (2015). Modeling formation resistivity changes during Leak-Off Tests (LOT’s). (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63890

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghimire, Bishwas. “Modeling formation resistivity changes during Leak-Off Tests (LOT’s).” 2015. Thesis, University of Texas – Austin. Accessed December 19, 2018. http://hdl.handle.net/2152/63890.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghimire, Bishwas. “Modeling formation resistivity changes during Leak-Off Tests (LOT’s).” 2015. Web. 19 Dec 2018.

Vancouver:

Ghimire B. Modeling formation resistivity changes during Leak-Off Tests (LOT’s). [Internet] [Thesis]. University of Texas – Austin; 2015. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/2152/63890.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghimire B. Modeling formation resistivity changes during Leak-Off Tests (LOT’s). [Thesis]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/63890

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

13. Song, Chengyu. Preventing exploits against memory corruption vulnerabilities.

Degree: PhD, Computer Science, 2016, Georgia Tech

 The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely… (more)

Subjects/Keywords: Memory corruption; Exploit prevention; Code injection; Privilege escalation; Data-flow integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, C. (2016). Preventing exploits against memory corruption vulnerabilities. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/55651

Chicago Manual of Style (16th Edition):

Song, Chengyu. “Preventing exploits against memory corruption vulnerabilities.” 2016. Doctoral Dissertation, Georgia Tech. Accessed December 19, 2018. http://hdl.handle.net/1853/55651.

MLA Handbook (7th Edition):

Song, Chengyu. “Preventing exploits against memory corruption vulnerabilities.” 2016. Web. 19 Dec 2018.

Vancouver:

Song C. Preventing exploits against memory corruption vulnerabilities. [Internet] [Doctoral dissertation]. Georgia Tech; 2016. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/1853/55651.

Council of Science Editors:

Song C. Preventing exploits against memory corruption vulnerabilities. [Doctoral Dissertation]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/55651


Central Connecticut State University

14. Rivera, Edwin, 1978-. Anti-money laundering behavior : reducing the number of non-productive alerts in structuring through effective data mining.

Degree: Department of Mathematical Sciences, 2012, Central Connecticut State University

 With the rules and regulations the federal government has put in place, financial institutions must consistently improve their anti-money laundering programs. Financial institutions use alert… (more)

Subjects/Keywords: Money laundering  – Prevention; Money laundering investigation  – Technological innovations; Data mining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rivera, Edwin, 1. (2012). Anti-money laundering behavior : reducing the number of non-productive alerts in structuring through effective data mining. (Thesis). Central Connecticut State University. Retrieved from http://content.library.ccsu.edu/u?/ccsutheses,1774

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rivera, Edwin, 1978-. “Anti-money laundering behavior : reducing the number of non-productive alerts in structuring through effective data mining.” 2012. Thesis, Central Connecticut State University. Accessed December 19, 2018. http://content.library.ccsu.edu/u?/ccsutheses,1774.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rivera, Edwin, 1978-. “Anti-money laundering behavior : reducing the number of non-productive alerts in structuring through effective data mining.” 2012. Web. 19 Dec 2018.

Vancouver:

Rivera, Edwin 1. Anti-money laundering behavior : reducing the number of non-productive alerts in structuring through effective data mining. [Internet] [Thesis]. Central Connecticut State University; 2012. [cited 2018 Dec 19]. Available from: http://content.library.ccsu.edu/u?/ccsutheses,1774.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rivera, Edwin 1. Anti-money laundering behavior : reducing the number of non-productive alerts in structuring through effective data mining. [Thesis]. Central Connecticut State University; 2012. Available from: http://content.library.ccsu.edu/u?/ccsutheses,1774

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

15. Hallford, Abby Jane Swanson. Analysis of Bullying Legislation Among Various States.

Degree: School of Teaching and Curriculum Leadership, 2009, Oklahoma State University

 The purpose of this study is to understand the existing state legislation concerning bullying in schools to determine whether the development, structure, and content of… (more)

Subjects/Keywords: bullying; discipline data; prevention; safe schools; state laws; violence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hallford, A. J. S. (2009). Analysis of Bullying Legislation Among Various States. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/7421

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hallford, Abby Jane Swanson. “Analysis of Bullying Legislation Among Various States.” 2009. Thesis, Oklahoma State University. Accessed December 19, 2018. http://hdl.handle.net/11244/7421.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hallford, Abby Jane Swanson. “Analysis of Bullying Legislation Among Various States.” 2009. Web. 19 Dec 2018.

Vancouver:

Hallford AJS. Analysis of Bullying Legislation Among Various States. [Internet] [Thesis]. Oklahoma State University; 2009. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/11244/7421.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hallford AJS. Analysis of Bullying Legislation Among Various States. [Thesis]. Oklahoma State University; 2009. Available from: http://hdl.handle.net/11244/7421

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

16. Imrich, Martin. Nasazení kontextového DLP systému v rámci zavádění ISMS .

Degree: 2015, Brno University of Technology

 Diplomová práce se zabývá nasazením DLP systému do vybrané společnosti. Práce obsahuje analýzu současné situace společnosti a na základě zjištění poskytuje rozhodnutí pro výběr nejvhodnějšího… (more)

Subjects/Keywords: DLP; kontextové DLP; Data Loss Prevention; bezpečnost informací; ICT bezpečnost; ISMS; DLP; context DLP; Data Loss Prevention; data security; ICT security; ISMS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Imrich, M. (2015). Nasazení kontextového DLP systému v rámci zavádění ISMS . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/39317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Imrich, Martin. “Nasazení kontextového DLP systému v rámci zavádění ISMS .” 2015. Thesis, Brno University of Technology. Accessed December 19, 2018. http://hdl.handle.net/11012/39317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Imrich, Martin. “Nasazení kontextového DLP systému v rámci zavádění ISMS .” 2015. Web. 19 Dec 2018.

Vancouver:

Imrich M. Nasazení kontextového DLP systému v rámci zavádění ISMS . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/11012/39317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Imrich M. Nasazení kontextového DLP systému v rámci zavádění ISMS . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/39317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

17. Jaquire, Victor John. Best practice strategy framework for developing countries to secure cyberspace.

Degree: 2015, University of Johannesburg

M.Com. (Informatics)

Cyber issues are global phenomena in a world of inter-related systems, and as such, the discussion on cybersecurity frameworks, policies and strategies inevitably… (more)

Subjects/Keywords: Computer networks - Security measures; Data encryption (Computer science); Cyberspace - Security measures; Cyberterrorism - Prevention; Information warfare - Prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jaquire, V. J. (2015). Best practice strategy framework for developing countries to secure cyberspace. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/15091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jaquire, Victor John. “Best practice strategy framework for developing countries to secure cyberspace.” 2015. Thesis, University of Johannesburg. Accessed December 19, 2018. http://hdl.handle.net/10210/15091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jaquire, Victor John. “Best practice strategy framework for developing countries to secure cyberspace.” 2015. Web. 19 Dec 2018.

Vancouver:

Jaquire VJ. Best practice strategy framework for developing countries to secure cyberspace. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/10210/15091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jaquire VJ. Best practice strategy framework for developing countries to secure cyberspace. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/15091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Ângelo, Gonçalo Filipe Nunes Ribeira. Estudo da prevalência da utilização de protetores bucais em praticantes da arte marcial Muay Thai.

Degree: 2013, Universidade Fernando Pessoa

Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Medicina Dentária

INTRODUÇÃO: A prevenção de… (more)

Subjects/Keywords: Martial Arts; Mouth Protectors; Facial Injuries/prevention & control; Tooth Injuries; Prevention and control; Athletic Injuries; Prevention and control; Mouth Protectors/classification; Mouth Protectors/statistics and numerical data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ângelo, G. F. N. R. (2013). Estudo da prevalência da utilização de protetores bucais em praticantes da arte marcial Muay Thai. (Thesis). Universidade Fernando Pessoa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:bdigital.ufp.pt:10284/4118

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ângelo, Gonçalo Filipe Nunes Ribeira. “Estudo da prevalência da utilização de protetores bucais em praticantes da arte marcial Muay Thai.” 2013. Thesis, Universidade Fernando Pessoa. Accessed December 19, 2018. http://www.rcaap.pt/detail.jsp?id=oai:bdigital.ufp.pt:10284/4118.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ângelo, Gonçalo Filipe Nunes Ribeira. “Estudo da prevalência da utilização de protetores bucais em praticantes da arte marcial Muay Thai.” 2013. Web. 19 Dec 2018.

Vancouver:

Ângelo GFNR. Estudo da prevalência da utilização de protetores bucais em praticantes da arte marcial Muay Thai. [Internet] [Thesis]. Universidade Fernando Pessoa; 2013. [cited 2018 Dec 19]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:bdigital.ufp.pt:10284/4118.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ângelo GFNR. Estudo da prevalência da utilização de protetores bucais em praticantes da arte marcial Muay Thai. [Thesis]. Universidade Fernando Pessoa; 2013. Available from: http://www.rcaap.pt/detail.jsp?id=oai:bdigital.ufp.pt:10284/4118

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Lu, Kangjie. Securing software systems by preventing information leaks.

Degree: PhD, Computer Science, 2017, Georgia Tech

 Foundational software systems such as operating systems and web servers are implemented in unsafe programming languages for efficiency, and system designers often prioritize performance over… (more)

Subjects/Keywords: System security; Vulnerability; Control-flow attack; Information leak; ASLR; Re-randomization; Replicated execution; Uninitialized-data use

…35 4 List of new kernel uninitialized data leak vulnerabilities discovered by U NI S AN… …Most leaks are caused by uninitialized data read. . . . . . 11 2 New kernel leak in the x25… …to our cyber world; their two typical goals are to leak sensitive data in victim systems… …control attacks) and to leak the sensitive data in victim systems (i.e., data leaks… …x5B;2] that typically require extensive runtime checks, information-leak prevention can… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, K. (2017). Securing software systems by preventing information leaks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58749

Chicago Manual of Style (16th Edition):

Lu, Kangjie. “Securing software systems by preventing information leaks.” 2017. Doctoral Dissertation, Georgia Tech. Accessed December 19, 2018. http://hdl.handle.net/1853/58749.

MLA Handbook (7th Edition):

Lu, Kangjie. “Securing software systems by preventing information leaks.” 2017. Web. 19 Dec 2018.

Vancouver:

Lu K. Securing software systems by preventing information leaks. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/1853/58749.

Council of Science Editors:

Lu K. Securing software systems by preventing information leaks. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/58749

20. Joakim, Kävrestad. DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD.

Degree: Informatics, 2014, University of Skövde

  Frauds conducted online are crimes that are and has been increasing in numbers over the last years. Government reports shows that this is the… (more)

Subjects/Keywords: online fraud; categorization; defining; fraud prevention; fraud defense; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joakim, K. (2014). DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD. (Thesis). University of Skövde. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Joakim, Kävrestad. “DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD.” 2014. Thesis, University of Skövde. Accessed December 19, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Joakim, Kävrestad. “DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD.” 2014. Web. 19 Dec 2018.

Vancouver:

Joakim K. DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD. [Internet] [Thesis]. University of Skövde; 2014. [cited 2018 Dec 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Joakim K. DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD. [Thesis]. University of Skövde; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

21. Khan, Mohammad Ariful Alam. Predicting the Risk of Chronic Disease: A Framework Based on Graph Theory and Social Network Analysis .

Degree: 2016, University of Sydney

 Chronic diseases progress slowly and the patients are often first diagnosed with the disease when admitted to the hospital, resulting in further complications and an… (more)

Subjects/Keywords: disease prevention; data mining; healthcare informatics; graph theory; network science; social network analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, M. A. A. (2016). Predicting the Risk of Chronic Disease: A Framework Based on Graph Theory and Social Network Analysis . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/16557

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Mohammad Ariful Alam. “Predicting the Risk of Chronic Disease: A Framework Based on Graph Theory and Social Network Analysis .” 2016. Thesis, University of Sydney. Accessed December 19, 2018. http://hdl.handle.net/2123/16557.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Mohammad Ariful Alam. “Predicting the Risk of Chronic Disease: A Framework Based on Graph Theory and Social Network Analysis .” 2016. Web. 19 Dec 2018.

Vancouver:

Khan MAA. Predicting the Risk of Chronic Disease: A Framework Based on Graph Theory and Social Network Analysis . [Internet] [Thesis]. University of Sydney; 2016. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/2123/16557.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan MAA. Predicting the Risk of Chronic Disease: A Framework Based on Graph Theory and Social Network Analysis . [Thesis]. University of Sydney; 2016. Available from: http://hdl.handle.net/2123/16557

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Narain, Pranav. Ransomware - Rising Menace to an Unsuspecting Cyber Audience.

Degree: Information and Logistics Technology, Department of, 2018, University of Houston

 Ransomware has quickly become one of the biggest threats, the public and enterprises in the cyber space, have ever had to face and continues to… (more)

Subjects/Keywords: Ransomware; Cyber; Information Security; Hack; Security; Incident Response; Incident Detection; Data Loss Prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Narain, P. (2018). Ransomware - Rising Menace to an Unsuspecting Cyber Audience. (Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/3145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Narain, Pranav. “Ransomware - Rising Menace to an Unsuspecting Cyber Audience.” 2018. Thesis, University of Houston. Accessed December 19, 2018. http://hdl.handle.net/10657/3145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Narain, Pranav. “Ransomware - Rising Menace to an Unsuspecting Cyber Audience.” 2018. Web. 19 Dec 2018.

Vancouver:

Narain P. Ransomware - Rising Menace to an Unsuspecting Cyber Audience. [Internet] [Thesis]. University of Houston; 2018. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/10657/3145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Narain P. Ransomware - Rising Menace to an Unsuspecting Cyber Audience. [Thesis]. University of Houston; 2018. Available from: http://hdl.handle.net/10657/3145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Knuth, Tobias. Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining.

Degree: Thesis (D.B.A.), 2018, Edinburgh Napier University

 A remarkable gap exists between the financial impact of fraud in the B2C e-commerce mail order business and the amount of research conducted in this… (more)

Subjects/Keywords: 006.3; Data Mining; E-Commerce; Fraud Prevention; 006.3 Artificial intelligence; QA75 Electronic computers. Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Knuth, T. (2018). Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining. (Doctoral Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1256175 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754109

Chicago Manual of Style (16th Edition):

Knuth, Tobias. “Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining.” 2018. Doctoral Dissertation, Edinburgh Napier University. Accessed December 19, 2018. http://researchrepository.napier.ac.uk/Output/1256175 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754109.

MLA Handbook (7th Edition):

Knuth, Tobias. “Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining.” 2018. Web. 19 Dec 2018.

Vancouver:

Knuth T. Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining. [Internet] [Doctoral dissertation]. Edinburgh Napier University; 2018. [cited 2018 Dec 19]. Available from: http://researchrepository.napier.ac.uk/Output/1256175 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754109.

Council of Science Editors:

Knuth T. Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining. [Doctoral Dissertation]. Edinburgh Napier University; 2018. Available from: http://researchrepository.napier.ac.uk/Output/1256175 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754109


University of Toronto

24. Alcaire, Salvador. A Conserved Family of ER Proteins NLF Regulate the Na+ Leak Channel NCA/NALCN in Caenorhabditis elegans and Mus musculus.

Degree: 2013, University of Toronto

Neuronal excitability is controlled by multiple ion channels at the plasma membrane of neurons. Recently, the Na+ leak channel, NCA in C. elegans and NALCN… (more)

Subjects/Keywords: ER protein; trafficking; leak channel; 0317; 0307

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alcaire, S. (2013). A Conserved Family of ER Proteins NLF Regulate the Na+ Leak Channel NCA/NALCN in Caenorhabditis elegans and Mus musculus. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/42662

Chicago Manual of Style (16th Edition):

Alcaire, Salvador. “A Conserved Family of ER Proteins NLF Regulate the Na+ Leak Channel NCA/NALCN in Caenorhabditis elegans and Mus musculus.” 2013. Masters Thesis, University of Toronto. Accessed December 19, 2018. http://hdl.handle.net/1807/42662.

MLA Handbook (7th Edition):

Alcaire, Salvador. “A Conserved Family of ER Proteins NLF Regulate the Na+ Leak Channel NCA/NALCN in Caenorhabditis elegans and Mus musculus.” 2013. Web. 19 Dec 2018.

Vancouver:

Alcaire S. A Conserved Family of ER Proteins NLF Regulate the Na+ Leak Channel NCA/NALCN in Caenorhabditis elegans and Mus musculus. [Internet] [Masters thesis]. University of Toronto; 2013. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/1807/42662.

Council of Science Editors:

Alcaire S. A Conserved Family of ER Proteins NLF Regulate the Na+ Leak Channel NCA/NALCN in Caenorhabditis elegans and Mus musculus. [Masters Thesis]. University of Toronto; 2013. Available from: http://hdl.handle.net/1807/42662


University of New South Wales

25. Vidyalakshmi, Vidyalakshmi. Privacy in social networks.

Degree: Computer Science & Engineering, 2017, University of New South Wales

 Participation in social networks has surpassed all other online activities to be one of the top internet activities. Information disclosure on social networks comes with… (more)

Subjects/Keywords: attribute inference; privacy leak; social networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vidyalakshmi, V. (2017). Privacy in social networks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/58534 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46216/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Vidyalakshmi, Vidyalakshmi. “Privacy in social networks.” 2017. Doctoral Dissertation, University of New South Wales. Accessed December 19, 2018. http://handle.unsw.edu.au/1959.4/58534 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46216/SOURCE02?view=true.

MLA Handbook (7th Edition):

Vidyalakshmi, Vidyalakshmi. “Privacy in social networks.” 2017. Web. 19 Dec 2018.

Vancouver:

Vidyalakshmi V. Privacy in social networks. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2018 Dec 19]. Available from: http://handle.unsw.edu.au/1959.4/58534 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46216/SOURCE02?view=true.

Council of Science Editors:

Vidyalakshmi V. Privacy in social networks. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/58534 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46216/SOURCE02?view=true


Loughborough University

26. Pal, Maninder. Leak detection and location in polyethylene pipes.

Degree: PhD, 2008, Loughborough University

 This thesis is focused on the application of cross-correlation technique for leak detection and location in medium density polyethylene (MDPE) pipes. A leaking water pipe… (more)

Subjects/Keywords: 624; Correlators; Leakage; Leak detection; Leak location; Medium density polyethyelene pipes; Water shortage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pal, M. (2008). Leak detection and location in polyethylene pipes. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/15181 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603092

Chicago Manual of Style (16th Edition):

Pal, Maninder. “Leak detection and location in polyethylene pipes.” 2008. Doctoral Dissertation, Loughborough University. Accessed December 19, 2018. https://dspace.lboro.ac.uk/2134/15181 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603092.

MLA Handbook (7th Edition):

Pal, Maninder. “Leak detection and location in polyethylene pipes.” 2008. Web. 19 Dec 2018.

Vancouver:

Pal M. Leak detection and location in polyethylene pipes. [Internet] [Doctoral dissertation]. Loughborough University; 2008. [cited 2018 Dec 19]. Available from: https://dspace.lboro.ac.uk/2134/15181 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603092.

Council of Science Editors:

Pal M. Leak detection and location in polyethylene pipes. [Doctoral Dissertation]. Loughborough University; 2008. Available from: https://dspace.lboro.ac.uk/2134/15181 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603092


Universidade do Minho

27. Carção, Tiago Alves. Spectrum-based energy leak localization .

Degree: 2014, Universidade do Minho

 For the past few years, we have begun to witness an exponential growth in the inform ation and communication technologies (ICT) sector. While undoubtedly a… (more)

Subjects/Keywords: Green Computing; Spectrum-based Fault Localization; Energy Consumption; Energy Leak; Spectrum-based Energy Leak Localization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carção, T. A. (2014). Spectrum-based energy leak localization . (Masters Thesis). Universidade do Minho. Retrieved from http://hdl.handle.net/1822/38676

Chicago Manual of Style (16th Edition):

Carção, Tiago Alves. “Spectrum-based energy leak localization .” 2014. Masters Thesis, Universidade do Minho. Accessed December 19, 2018. http://hdl.handle.net/1822/38676.

MLA Handbook (7th Edition):

Carção, Tiago Alves. “Spectrum-based energy leak localization .” 2014. Web. 19 Dec 2018.

Vancouver:

Carção TA. Spectrum-based energy leak localization . [Internet] [Masters thesis]. Universidade do Minho; 2014. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/1822/38676.

Council of Science Editors:

Carção TA. Spectrum-based energy leak localization . [Masters Thesis]. Universidade do Minho; 2014. Available from: http://hdl.handle.net/1822/38676


Brno University of Technology

28. Šabatka, Pavel. Tvorba úloh pro výuku předmětu: Praktické programování v C++ .

Degree: 2008, Brno University of Technology

 Předmětem této práce je tvorba pomůcek pro začínající programátory, které usnadní studentům absolvování předmětu BPPC. Teoretická část pojednává o programovacích jazycích C, C++ a jejich… (more)

Subjects/Keywords: C/C++; programování; kurz BPPC; výuka; detekce úniku pamětových zdrojů; abstraktní datové typy; C/C++; programming; education; memory leak detection; abstract data types

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šabatka, P. (2008). Tvorba úloh pro výuku předmětu: Praktické programování v C++ . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/2924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šabatka, Pavel. “Tvorba úloh pro výuku předmětu: Praktické programování v C++ .” 2008. Thesis, Brno University of Technology. Accessed December 19, 2018. http://hdl.handle.net/11012/2924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šabatka, Pavel. “Tvorba úloh pro výuku předmětu: Praktické programování v C++ .” 2008. Web. 19 Dec 2018.

Vancouver:

Šabatka P. Tvorba úloh pro výuku předmětu: Praktické programování v C++ . [Internet] [Thesis]. Brno University of Technology; 2008. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/11012/2924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šabatka P. Tvorba úloh pro výuku předmětu: Praktické programování v C++ . [Thesis]. Brno University of Technology; 2008. Available from: http://hdl.handle.net/11012/2924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Alberta

29. Pabon,Sergio. Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines.

Degree: MS, Department of Civil and Environmental Engineering, 2015, University of Alberta

 Computer model based leak detection technique is extensively applied in the energy pipeline industry. However, its effectiveness is often limited by the ability of the… (more)

Subjects/Keywords: Computer Model Based Leak Detection System in Liquid Pipelines; Computer Model Based Leak Detection System; Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pabon,Sergio. (2015). Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines. (Masters Thesis). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/kh04ds37n

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Pabon,Sergio. “Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines.” 2015. Masters Thesis, University of Alberta. Accessed December 19, 2018. https://era.library.ualberta.ca/files/kh04ds37n.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Pabon,Sergio. “Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines.” 2015. Web. 19 Dec 2018.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Pabon,Sergio. Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines. [Internet] [Masters thesis]. University of Alberta; 2015. [cited 2018 Dec 19]. Available from: https://era.library.ualberta.ca/files/kh04ds37n.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Pabon,Sergio. Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines. [Masters Thesis]. University of Alberta; 2015. Available from: https://era.library.ualberta.ca/files/kh04ds37n

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Kansas

30. Conrad-Hiebner, Aislinn. Economic Conditions and Risk for Child Physical Abuse per Maternal Report: The Mediating Roles of Parenting Stress, Depression, and Domestic Violence.

Degree: PhD, Social Welfare, 2015, University of Kansas

 Child physical abuse is a serious social problem associated with a host of risk factors and consequences, ranging from unemployment and poverty to substance use… (more)

Subjects/Keywords: Social work; Social research; Child Maltreatment Prevention; Child Physical Abuse; Material Hardship; Poverty; Secondary Data Analysis; Structural Equation Modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Conrad-Hiebner, A. (2015). Economic Conditions and Risk for Child Physical Abuse per Maternal Report: The Mediating Roles of Parenting Stress, Depression, and Domestic Violence. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/19385

Chicago Manual of Style (16th Edition):

Conrad-Hiebner, Aislinn. “Economic Conditions and Risk for Child Physical Abuse per Maternal Report: The Mediating Roles of Parenting Stress, Depression, and Domestic Violence.” 2015. Doctoral Dissertation, University of Kansas. Accessed December 19, 2018. http://hdl.handle.net/1808/19385.

MLA Handbook (7th Edition):

Conrad-Hiebner, Aislinn. “Economic Conditions and Risk for Child Physical Abuse per Maternal Report: The Mediating Roles of Parenting Stress, Depression, and Domestic Violence.” 2015. Web. 19 Dec 2018.

Vancouver:

Conrad-Hiebner A. Economic Conditions and Risk for Child Physical Abuse per Maternal Report: The Mediating Roles of Parenting Stress, Depression, and Domestic Violence. [Internet] [Doctoral dissertation]. University of Kansas; 2015. [cited 2018 Dec 19]. Available from: http://hdl.handle.net/1808/19385.

Council of Science Editors:

Conrad-Hiebner A. Economic Conditions and Risk for Child Physical Abuse per Maternal Report: The Mediating Roles of Parenting Stress, Depression, and Domestic Violence. [Doctoral Dissertation]. University of Kansas; 2015. Available from: http://hdl.handle.net/1808/19385

[1] [2] [3] [4] [5] … [1271]

.