Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Country:

You searched for subject:( Network security). Showing records 1 – 30 of 36 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of Wollongong

1. Elashry, Ibrahim. Pairing-free identity-based cryptography.

Degree: PhD, 2015, University of Wollongong

  Identity-based cryptography (IBC) is considered nowadays as the evolution of public key cryptography because it completely eliminates the use of digital certificates by representing… (more)

Subjects/Keywords: Information security-cryptography; key exchange; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elashry, I. (2015). Pairing-free identity-based cryptography. (Doctoral Dissertation). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/4409

Chicago Manual of Style (16th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Doctoral Dissertation, University of Wollongong. Accessed November 14, 2019. ; https://ro.uow.edu.au/theses/4409.

MLA Handbook (7th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Web. 14 Nov 2019.

Vancouver:

Elashry I. Pairing-free identity-based cryptography. [Internet] [Doctoral dissertation]. University of Wollongong; 2015. [cited 2019 Nov 14]. Available from: ; https://ro.uow.edu.au/theses/4409.

Council of Science Editors:

Elashry I. Pairing-free identity-based cryptography. [Doctoral Dissertation]. University of Wollongong; 2015. Available from: ; https://ro.uow.edu.au/theses/4409


University of Technology, Sydney

2. Yu, Dong. Generic benchmarking for application specific wireless sensor networks multi criteria performance.

Degree: 2012, University of Technology, Sydney

 Due to stringent energy constraint and demand for performance requirement, a generic architecture like TCP/IP or Internet is not feasible with sensors used across various… (more)

Subjects/Keywords: Wireless sensor network.; Evaluation.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, D. (2012). Generic benchmarking for application specific wireless sensor networks multi criteria performance. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/21812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Dong. “Generic benchmarking for application specific wireless sensor networks multi criteria performance.” 2012. Thesis, University of Technology, Sydney. Accessed November 14, 2019. http://hdl.handle.net/10453/21812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Dong. “Generic benchmarking for application specific wireless sensor networks multi criteria performance.” 2012. Web. 14 Nov 2019.

Vancouver:

Yu D. Generic benchmarking for application specific wireless sensor networks multi criteria performance. [Internet] [Thesis]. University of Technology, Sydney; 2012. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/10453/21812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu D. Generic benchmarking for application specific wireless sensor networks multi criteria performance. [Thesis]. University of Technology, Sydney; 2012. Available from: http://hdl.handle.net/10453/21812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Curtin University of Technology

3. Radmand, Pedram. An architecture framework for enhanced wireless sensor network security .

Degree: 2012, Curtin University of Technology

 This thesis develops an architectural framework to enhance the security of Wireless Sensor Networks (WSNs) and provides the implementation proof through different security countermeasures, which… (more)

Subjects/Keywords: architecture framework; enhanced wireless sensor; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Radmand, P. (2012). An architecture framework for enhanced wireless sensor network security . (Thesis). Curtin University of Technology. Retrieved from http://hdl.handle.net/20.500.11937/2095

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Radmand, Pedram. “An architecture framework for enhanced wireless sensor network security .” 2012. Thesis, Curtin University of Technology. Accessed November 14, 2019. http://hdl.handle.net/20.500.11937/2095.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Radmand, Pedram. “An architecture framework for enhanced wireless sensor network security .” 2012. Web. 14 Nov 2019.

Vancouver:

Radmand P. An architecture framework for enhanced wireless sensor network security . [Internet] [Thesis]. Curtin University of Technology; 2012. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/20.500.11937/2095.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Radmand P. An architecture framework for enhanced wireless sensor network security . [Thesis]. Curtin University of Technology; 2012. Available from: http://hdl.handle.net/20.500.11937/2095

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Melbourne

4. WAHID, ALIF. Estimating the Internet malicious host population while preserving privacy.

Degree: 2013, University of Melbourne

 The Internet is a globally significant infrastructure that attracts a large number of threats posed by the population of malicious hosts within it. These threats… (more)

Subjects/Keywords: intrusion detection; privacy protection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

WAHID, A. (2013). Estimating the Internet malicious host population while preserving privacy. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/38139

Chicago Manual of Style (16th Edition):

WAHID, ALIF. “Estimating the Internet malicious host population while preserving privacy.” 2013. Doctoral Dissertation, University of Melbourne. Accessed November 14, 2019. http://hdl.handle.net/11343/38139.

MLA Handbook (7th Edition):

WAHID, ALIF. “Estimating the Internet malicious host population while preserving privacy.” 2013. Web. 14 Nov 2019.

Vancouver:

WAHID A. Estimating the Internet malicious host population while preserving privacy. [Internet] [Doctoral dissertation]. University of Melbourne; 2013. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/11343/38139.

Council of Science Editors:

WAHID A. Estimating the Internet malicious host population while preserving privacy. [Doctoral Dissertation]. University of Melbourne; 2013. Available from: http://hdl.handle.net/11343/38139


University of Adelaide

5. Ranathunga, Dinesha Prasanna. Auto-configuration of Critical Network Infrastructure.

Degree: 2017, University of Adelaide

 Until the turn of the millennia, many electricity, water and gas supply plant operators used analogue serial cabling to communicate between highly customised systems to… (more)

Subjects/Keywords: SCADA network security; zone-conduit model; security policy; firewall auto-configuration

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ranathunga, D. P. (2017). Auto-configuration of Critical Network Infrastructure. (Thesis). University of Adelaide. Retrieved from http://hdl.handle.net/2440/119620

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ranathunga, Dinesha Prasanna. “Auto-configuration of Critical Network Infrastructure.” 2017. Thesis, University of Adelaide. Accessed November 14, 2019. http://hdl.handle.net/2440/119620.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ranathunga, Dinesha Prasanna. “Auto-configuration of Critical Network Infrastructure.” 2017. Web. 14 Nov 2019.

Vancouver:

Ranathunga DP. Auto-configuration of Critical Network Infrastructure. [Internet] [Thesis]. University of Adelaide; 2017. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/2440/119620.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ranathunga DP. Auto-configuration of Critical Network Infrastructure. [Thesis]. University of Adelaide; 2017. Available from: http://hdl.handle.net/2440/119620

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Edith Cowan University

6. Szewczyk, Patryk. An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively.

Degree: 2015, Edith Cowan University

 Australia has consistently been identified as a major Internet user that will continue to be targeted by cybercrime. Some protection is afforded by specialised security(more)

Subjects/Keywords: ADSL router security; network security; ADSL router forensics; Information Security; OS and Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Szewczyk, P. (2015). An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively. (Thesis). Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/1705

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Szewczyk, Patryk. “An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively.” 2015. Thesis, Edith Cowan University. Accessed November 14, 2019. https://ro.ecu.edu.au/theses/1705.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Szewczyk, Patryk. “An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively.” 2015. Web. 14 Nov 2019.

Vancouver:

Szewczyk P. An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively. [Internet] [Thesis]. Edith Cowan University; 2015. [cited 2019 Nov 14]. Available from: https://ro.ecu.edu.au/theses/1705.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Szewczyk P. An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively. [Thesis]. Edith Cowan University; 2015. Available from: https://ro.ecu.edu.au/theses/1705

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Edith Cowan University

7. Peacock, Matthew. Anomaly Detection in BACnet/IP managed Building Automation Systems.

Degree: 2019, Edith Cowan University

 Building Automation Systems (BAS) are a collection of devices and software which manage the operation of building services. The BAS market is expected to be… (more)

Subjects/Keywords: intrustion detection; Network security; Machine learning Hidden Markov models; Artificial Intelligence and Robotics; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peacock, M. (2019). Anomaly Detection in BACnet/IP managed Building Automation Systems. (Thesis). Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/2178

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peacock, Matthew. “Anomaly Detection in BACnet/IP managed Building Automation Systems.” 2019. Thesis, Edith Cowan University. Accessed November 14, 2019. https://ro.ecu.edu.au/theses/2178.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peacock, Matthew. “Anomaly Detection in BACnet/IP managed Building Automation Systems.” 2019. Web. 14 Nov 2019.

Vancouver:

Peacock M. Anomaly Detection in BACnet/IP managed Building Automation Systems. [Internet] [Thesis]. Edith Cowan University; 2019. [cited 2019 Nov 14]. Available from: https://ro.ecu.edu.au/theses/2178.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peacock M. Anomaly Detection in BACnet/IP managed Building Automation Systems. [Thesis]. Edith Cowan University; 2019. Available from: https://ro.ecu.edu.au/theses/2178

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Sydney

8. Idjalahoue, Eliezer. Detection of bypassing traffic.

Degree: 2011, University of Western Sydney

 The internet through the years has become, not a luxury asset, but a necessary tool for businesses as well as our daily life. Emails, social… (more)

Subjects/Keywords: Master of Science (Hons); computer security; computer networks; firewalls (computer security); CGI (computer network protocol)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Idjalahoue, E. (2011). Detection of bypassing traffic. (Thesis). University of Western Sydney. Retrieved from http://handle.uws.edu.au:8081/1959.7/499802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Idjalahoue, Eliezer. “Detection of bypassing traffic.” 2011. Thesis, University of Western Sydney. Accessed November 14, 2019. http://handle.uws.edu.au:8081/1959.7/499802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Idjalahoue, Eliezer. “Detection of bypassing traffic.” 2011. Web. 14 Nov 2019.

Vancouver:

Idjalahoue E. Detection of bypassing traffic. [Internet] [Thesis]. University of Western Sydney; 2011. [cited 2019 Nov 14]. Available from: http://handle.uws.edu.au:8081/1959.7/499802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Idjalahoue E. Detection of bypassing traffic. [Thesis]. University of Western Sydney; 2011. Available from: http://handle.uws.edu.au:8081/1959.7/499802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

9. Tan, Zhiyuan (Thomas). Detection of denial-of-service attacks based on computer vision techniques.

Degree: 2013, University of Technology, Sydney

 A Denial-of-Service (DoS) attack is an intrusive attempt, which aims to force a designated resource (e.g., network bandwidth, processor time or memory) to be unavailable… (more)

Subjects/Keywords: Network security; Network intrusion detection.; Anomaly-based detection.; Denial-of-service attack.; Computer vision.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, Z. (. (2013). Detection of denial-of-service attacks based on computer vision techniques. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/24176

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tan, Zhiyuan (Thomas). “Detection of denial-of-service attacks based on computer vision techniques.” 2013. Thesis, University of Technology, Sydney. Accessed November 14, 2019. http://hdl.handle.net/10453/24176.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tan, Zhiyuan (Thomas). “Detection of denial-of-service attacks based on computer vision techniques.” 2013. Web. 14 Nov 2019.

Vancouver:

Tan Z(. Detection of denial-of-service attacks based on computer vision techniques. [Internet] [Thesis]. University of Technology, Sydney; 2013. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/10453/24176.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tan Z(. Detection of denial-of-service attacks based on computer vision techniques. [Thesis]. University of Technology, Sydney; 2013. Available from: http://hdl.handle.net/10453/24176

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

10. Yu, Yue. Resilience Strategies for Network Challenge Detection, Identification and Remediation .

Degree: 2013, University of Sydney

 The enormous growth of the Internet and its use in everyday life make it an attractive target for malicious users. As the network becomes more… (more)

Subjects/Keywords: Network Security; Malware Detection; Malicious Attack; Network Resilience; DDoS Attack; Worm Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, Y. (2013). Resilience Strategies for Network Challenge Detection, Identification and Remediation . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/10277

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Yue. “Resilience Strategies for Network Challenge Detection, Identification and Remediation .” 2013. Thesis, University of Sydney. Accessed November 14, 2019. http://hdl.handle.net/2123/10277.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Yue. “Resilience Strategies for Network Challenge Detection, Identification and Remediation .” 2013. Web. 14 Nov 2019.

Vancouver:

Yu Y. Resilience Strategies for Network Challenge Detection, Identification and Remediation . [Internet] [Thesis]. University of Sydney; 2013. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/2123/10277.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Y. Resilience Strategies for Network Challenge Detection, Identification and Remediation . [Thesis]. University of Sydney; 2013. Available from: http://hdl.handle.net/2123/10277

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

11. Hussain, Mubashir. Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip.

Degree: Computer Science & Engineering, 2018, University of New South Wales

 Traditionally, the computing system security has been tackled as a software-level problem. With the globalization of the modern semiconductor industry, the design of a system… (more)

Subjects/Keywords: System-on-Chip; Hardware Trojan; Network-on-Chip; Hardware Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hussain, M. (2018). Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/60304 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51737/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Hussain, Mubashir. “Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip.” 2018. Doctoral Dissertation, University of New South Wales. Accessed November 14, 2019. http://handle.unsw.edu.au/1959.4/60304 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51737/SOURCE02?view=true.

MLA Handbook (7th Edition):

Hussain, Mubashir. “Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip.” 2018. Web. 14 Nov 2019.

Vancouver:

Hussain M. Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip. [Internet] [Doctoral dissertation]. University of New South Wales; 2018. [cited 2019 Nov 14]. Available from: http://handle.unsw.edu.au/1959.4/60304 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51737/SOURCE02?view=true.

Council of Science Editors:

Hussain M. Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip. [Doctoral Dissertation]. University of New South Wales; 2018. Available from: http://handle.unsw.edu.au/1959.4/60304 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51737/SOURCE02?view=true


RMIT University

12. Dang, D. Investigating the formation of an information security climate in a large Vietnamese construction company: a social network analysis approach.

Degree: 2018, RMIT University

 The management of organisational information security (InfoSec) has gained importance due to the rise of new and sophisticated cyberthreats with technical measures alone no longer… (more)

Subjects/Keywords: Fields of Research; behavioural information security; social network analysis; action research; information systems management; information security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dang, D. (2018). Investigating the formation of an information security climate in a large Vietnamese construction company: a social network analysis approach. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:162382

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dang, D. “Investigating the formation of an information security climate in a large Vietnamese construction company: a social network analysis approach.” 2018. Thesis, RMIT University. Accessed November 14, 2019. http://researchbank.rmit.edu.au/view/rmit:162382.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dang, D. “Investigating the formation of an information security climate in a large Vietnamese construction company: a social network analysis approach.” 2018. Web. 14 Nov 2019.

Vancouver:

Dang D. Investigating the formation of an information security climate in a large Vietnamese construction company: a social network analysis approach. [Internet] [Thesis]. RMIT University; 2018. [cited 2019 Nov 14]. Available from: http://researchbank.rmit.edu.au/view/rmit:162382.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dang D. Investigating the formation of an information security climate in a large Vietnamese construction company: a social network analysis approach. [Thesis]. RMIT University; 2018. Available from: http://researchbank.rmit.edu.au/view/rmit:162382

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Australia

13. Pirzada, Asad Amir. Trust-based routing in pure ad-hoc wireless networks.

Degree: PhD, 2007, University of Western Australia

[Truncated abstract] An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. Due to its peculiar… (more)

Subjects/Keywords: Routing (Computer network management); Ad hoc networks (Computer networks); Public key infrastructure (Computer security); Trust security; Mobile

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pirzada, A. A. (2007). Trust-based routing in pure ad-hoc wireless networks. (Doctoral Dissertation). University of Western Australia. Retrieved from http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=9300&local_base=GEN01-INS01

Chicago Manual of Style (16th Edition):

Pirzada, Asad Amir. “Trust-based routing in pure ad-hoc wireless networks.” 2007. Doctoral Dissertation, University of Western Australia. Accessed November 14, 2019. http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=9300&local_base=GEN01-INS01.

MLA Handbook (7th Edition):

Pirzada, Asad Amir. “Trust-based routing in pure ad-hoc wireless networks.” 2007. Web. 14 Nov 2019.

Vancouver:

Pirzada AA. Trust-based routing in pure ad-hoc wireless networks. [Internet] [Doctoral dissertation]. University of Western Australia; 2007. [cited 2019 Nov 14]. Available from: http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=9300&local_base=GEN01-INS01.

Council of Science Editors:

Pirzada AA. Trust-based routing in pure ad-hoc wireless networks. [Doctoral Dissertation]. University of Western Australia; 2007. Available from: http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=9300&local_base=GEN01-INS01


Queensland University of Technology

14. Davis, Jonathan J. Machine learning and feature engineering for computer network security.

Degree: 2017, Queensland University of Technology

 This thesis studies the application of machine learning to the field of Cyber security. Machine learning algorithms promise to enhance Cyber security by identifying malicious… (more)

Subjects/Keywords: feature engineering; network security; machine learning; data preprocessing; HTTP tunnel; DNS tunnel; traffic classification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, J. J. (2017). Machine learning and feature engineering for computer network security. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/106914/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Davis, Jonathan J. “Machine learning and feature engineering for computer network security.” 2017. Thesis, Queensland University of Technology. Accessed November 14, 2019. https://eprints.qut.edu.au/106914/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Davis, Jonathan J. “Machine learning and feature engineering for computer network security.” 2017. Web. 14 Nov 2019.

Vancouver:

Davis JJ. Machine learning and feature engineering for computer network security. [Internet] [Thesis]. Queensland University of Technology; 2017. [cited 2019 Nov 14]. Available from: https://eprints.qut.edu.au/106914/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Davis JJ. Machine learning and feature engineering for computer network security. [Thesis]. Queensland University of Technology; 2017. Available from: https://eprints.qut.edu.au/106914/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


RMIT University

15. Zhang, Xinyang. Efficient key management in wireless sensor network security.

Degree: 2015, RMIT University

 Wireless sensor network is a multi-hop ad hoc network formed by a large number of low-cost micro-sensor nodes which communicate through radio channels. It is… (more)

Subjects/Keywords: Fields of Research; Wireless sensor network; Security; Key management; Assistant node management; SEHKM; Key update

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, X. (2015). Efficient key management in wireless sensor network security. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:161517

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Xinyang. “Efficient key management in wireless sensor network security.” 2015. Thesis, RMIT University. Accessed November 14, 2019. http://researchbank.rmit.edu.au/view/rmit:161517.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Xinyang. “Efficient key management in wireless sensor network security.” 2015. Web. 14 Nov 2019.

Vancouver:

Zhang X. Efficient key management in wireless sensor network security. [Internet] [Thesis]. RMIT University; 2015. [cited 2019 Nov 14]. Available from: http://researchbank.rmit.edu.au/view/rmit:161517.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang X. Efficient key management in wireless sensor network security. [Thesis]. RMIT University; 2015. Available from: http://researchbank.rmit.edu.au/view/rmit:161517

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Edith Cowan University

16. Rabadia, Priya Naran. Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach.

Degree: 2018, Edith Cowan University

 This thesis investigates a precise and efficient pattern-based intrusion detection approach by extracting patterns from sequential adversarial commands. As organisations are further placing assets within… (more)

Subjects/Keywords: intrusion detection; Network security; Pattern analysis and Secure Shell; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rabadia, P. N. (2018). Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach. (Thesis). Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/2142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rabadia, Priya Naran. “Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach.” 2018. Thesis, Edith Cowan University. Accessed November 14, 2019. https://ro.ecu.edu.au/theses/2142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rabadia, Priya Naran. “Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach.” 2018. Web. 14 Nov 2019.

Vancouver:

Rabadia PN. Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach. [Internet] [Thesis]. Edith Cowan University; 2018. [cited 2019 Nov 14]. Available from: https://ro.ecu.edu.au/theses/2142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rabadia PN. Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach. [Thesis]. Edith Cowan University; 2018. Available from: https://ro.ecu.edu.au/theses/2142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Curtin University of Technology

17. Tian, Biming. Key management for wireless sensor network security .

Degree: 2011, Curtin University of Technology

 Wireless Sensor Networks (WSNs) have attracted great attention not only in industry but also in academia due to their enormous application potential and unique security(more)

Subjects/Keywords: sensor nodes; wireless sensor networks (WSNs); schemes; network security problems; key management; cryptographic mechanisms; framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tian, B. (2011). Key management for wireless sensor network security . (Thesis). Curtin University of Technology. Retrieved from http://hdl.handle.net/20.500.11937/1157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tian, Biming. “Key management for wireless sensor network security .” 2011. Thesis, Curtin University of Technology. Accessed November 14, 2019. http://hdl.handle.net/20.500.11937/1157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tian, Biming. “Key management for wireless sensor network security .” 2011. Web. 14 Nov 2019.

Vancouver:

Tian B. Key management for wireless sensor network security . [Internet] [Thesis]. Curtin University of Technology; 2011. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/20.500.11937/1157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tian B. Key management for wireless sensor network security . [Thesis]. Curtin University of Technology; 2011. Available from: http://hdl.handle.net/20.500.11937/1157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Curtin University of Technology

18. Alam, Mohammad Rafiqul. Detecting wormhole and Byzantine attacks in mobile ad hoc networks .

Degree: 2011, Curtin University of Technology

 The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these… (more)

Subjects/Keywords: Byzantine attacks; wireless technology; detecting wormhole; network security; mobile ad hoc networks (MANET)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alam, M. R. (2011). Detecting wormhole and Byzantine attacks in mobile ad hoc networks . (Thesis). Curtin University of Technology. Retrieved from http://hdl.handle.net/20.500.11937/1701

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alam, Mohammad Rafiqul. “Detecting wormhole and Byzantine attacks in mobile ad hoc networks .” 2011. Thesis, Curtin University of Technology. Accessed November 14, 2019. http://hdl.handle.net/20.500.11937/1701.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alam, Mohammad Rafiqul. “Detecting wormhole and Byzantine attacks in mobile ad hoc networks .” 2011. Web. 14 Nov 2019.

Vancouver:

Alam MR. Detecting wormhole and Byzantine attacks in mobile ad hoc networks . [Internet] [Thesis]. Curtin University of Technology; 2011. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/20.500.11937/1701.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alam MR. Detecting wormhole and Byzantine attacks in mobile ad hoc networks . [Thesis]. Curtin University of Technology; 2011. Available from: http://hdl.handle.net/20.500.11937/1701

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

19. Ross, David Andrew. Securing IEEE 802.11 wireless LANs.

Degree: 2010, Queensland University of Technology

 As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in… (more)

Subjects/Keywords: 802.11, IEEE 802.11, 802.11i, 802.11w, wireless, wireless LAN, WLAN, wireless networks, network security, information security, data security, privacy, Wired Equivalent Privacy, WEP, Wireless Ethernet Compatibility Alliance, WECA; Wireless Fidelity Alliance, Wi-Fi, Wi-Fi Protected Access, WPA, WPA2, Temporal Key Integrity Protocol, TKIP, CCMP, transition security network, TSN, robust security network, RSN, robust security network association, RSNA, data link, link layer, MPDU, PSDU; address encryption, pervasive, ubiquitous

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ross, D. A. (2010). Securing IEEE 802.11 wireless LANs. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/37638/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ross, David Andrew. “Securing IEEE 802.11 wireless LANs.” 2010. Thesis, Queensland University of Technology. Accessed November 14, 2019. https://eprints.qut.edu.au/37638/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ross, David Andrew. “Securing IEEE 802.11 wireless LANs.” 2010. Web. 14 Nov 2019.

Vancouver:

Ross DA. Securing IEEE 802.11 wireless LANs. [Internet] [Thesis]. Queensland University of Technology; 2010. [cited 2019 Nov 14]. Available from: https://eprints.qut.edu.au/37638/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ross DA. Securing IEEE 802.11 wireless LANs. [Thesis]. Queensland University of Technology; 2010. Available from: https://eprints.qut.edu.au/37638/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


RMIT University

20. Sivabalan, S. Protecting web servers from distributed denial of service attack.

Degree: 2017, RMIT University

This thesis developed a novel architecture and adaptive methods to detect and block Distributed Denial of Service attacks with minimal punishment to legitimate users. A real time scoring algorithm differentiated attackers from legitimate users. This architecture reduces the power consumption of a web server farm thus reducing the carbon footprint.

Subjects/Keywords: Fields of Research; Network Security; Web Server Security; Internet of Things (IoT); Distributed Denial of Service attack (DDoS); IoT DDoS attack; Application layer DDoS attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sivabalan, S. (2017). Protecting web servers from distributed denial of service attack. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:162328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sivabalan, S. “Protecting web servers from distributed denial of service attack.” 2017. Thesis, RMIT University. Accessed November 14, 2019. http://researchbank.rmit.edu.au/view/rmit:162328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sivabalan, S. “Protecting web servers from distributed denial of service attack.” 2017. Web. 14 Nov 2019.

Vancouver:

Sivabalan S. Protecting web servers from distributed denial of service attack. [Internet] [Thesis]. RMIT University; 2017. [cited 2019 Nov 14]. Available from: http://researchbank.rmit.edu.au/view/rmit:162328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sivabalan S. Protecting web servers from distributed denial of service attack. [Thesis]. RMIT University; 2017. Available from: http://researchbank.rmit.edu.au/view/rmit:162328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

21. Alzomai, Mohammed Hamad. Identity management : strengthening one-time password authentication through usability.

Degree: 2011, Queensland University of Technology

 Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site… (more)

Subjects/Keywords: security; usability; identity management; authentication; authorization; scalability; online banking; password; one-time-password; hardware token; software token; trusted computing; display security; sms; mobile phone; cellular network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alzomai, M. H. (2011). Identity management : strengthening one-time password authentication through usability. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/46213/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alzomai, Mohammed Hamad. “Identity management : strengthening one-time password authentication through usability.” 2011. Thesis, Queensland University of Technology. Accessed November 14, 2019. https://eprints.qut.edu.au/46213/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alzomai, Mohammed Hamad. “Identity management : strengthening one-time password authentication through usability.” 2011. Web. 14 Nov 2019.

Vancouver:

Alzomai MH. Identity management : strengthening one-time password authentication through usability. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2019 Nov 14]. Available from: https://eprints.qut.edu.au/46213/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alzomai MH. Identity management : strengthening one-time password authentication through usability. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/46213/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Rastegari, Samaneh. Intelligent network intrusion detection using an evolutionary computation approach.

Degree: 2015, Edith Cowan University

 With the enormous growth of users' reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools… (more)

Subjects/Keywords: Network security; intrusion detection; evolutionary computation; classification; genetic based machine learning; supervised learning; rule based algorithms; Digital Communications and Networking; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rastegari, S. (2015). Intelligent network intrusion detection using an evolutionary computation approach. (Thesis). Edith Cowan University. Retrieved from http://ro.ecu.edu.au/theses/1760

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rastegari, Samaneh. “Intelligent network intrusion detection using an evolutionary computation approach.” 2015. Thesis, Edith Cowan University. Accessed November 14, 2019. http://ro.ecu.edu.au/theses/1760.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rastegari, Samaneh. “Intelligent network intrusion detection using an evolutionary computation approach.” 2015. Web. 14 Nov 2019.

Vancouver:

Rastegari S. Intelligent network intrusion detection using an evolutionary computation approach. [Internet] [Thesis]. Edith Cowan University; 2015. [cited 2019 Nov 14]. Available from: http://ro.ecu.edu.au/theses/1760.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rastegari S. Intelligent network intrusion detection using an evolutionary computation approach. [Thesis]. Edith Cowan University; 2015. Available from: http://ro.ecu.edu.au/theses/1760

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

23. Brown, Douglas Graeme. Formal network behaviour analysis using model checking.

Degree: 2016, Queensland University of Technology

 In this research we modelled computer network devices to ensure their communication behaviours meet various network standards. By modelling devices as finite-state machines and examining… (more)

Subjects/Keywords: Formal Methods; Model Checking; Network; SELinux; Mandatory Access Controls; Information-flow; Multi-Category Security; CIPSO; Symbolic Analysis Laboratory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brown, D. G. (2016). Formal network behaviour analysis using model checking. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/93693/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Brown, Douglas Graeme. “Formal network behaviour analysis using model checking.” 2016. Thesis, Queensland University of Technology. Accessed November 14, 2019. http://eprints.qut.edu.au/93693/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Brown, Douglas Graeme. “Formal network behaviour analysis using model checking.” 2016. Web. 14 Nov 2019.

Vancouver:

Brown DG. Formal network behaviour analysis using model checking. [Internet] [Thesis]. Queensland University of Technology; 2016. [cited 2019 Nov 14]. Available from: http://eprints.qut.edu.au/93693/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Brown DG. Formal network behaviour analysis using model checking. [Thesis]. Queensland University of Technology; 2016. Available from: http://eprints.qut.edu.au/93693/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Australia

24. Behdad, Mohammad. Application of learning classifier systems to fraud detection problem.

Degree: PhD, 2013, University of Western Australia

This thesis examines the application of learning classi er systems to the problem of electronic fraud (e-fraud) detection. E-fraud is highly lucrative, with estimates suggesting… (more)

Subjects/Keywords: Learning classifier systems; Computer security; Evolutionary computation; XCS; Genetics-based machine learning; Fraud detection; Dimensionality reduction; Network intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Behdad, M. (2013). Application of learning classifier systems to fraud detection problem. (Doctoral Dissertation). University of Western Australia. Retrieved from http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=40164&local_base=GEN01-INS01

Chicago Manual of Style (16th Edition):

Behdad, Mohammad. “Application of learning classifier systems to fraud detection problem.” 2013. Doctoral Dissertation, University of Western Australia. Accessed November 14, 2019. http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=40164&local_base=GEN01-INS01.

MLA Handbook (7th Edition):

Behdad, Mohammad. “Application of learning classifier systems to fraud detection problem.” 2013. Web. 14 Nov 2019.

Vancouver:

Behdad M. Application of learning classifier systems to fraud detection problem. [Internet] [Doctoral dissertation]. University of Western Australia; 2013. [cited 2019 Nov 14]. Available from: http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=40164&local_base=GEN01-INS01.

Council of Science Editors:

Behdad M. Application of learning classifier systems to fraud detection problem. [Doctoral Dissertation]. University of Western Australia; 2013. Available from: http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=40164&local_base=GEN01-INS01


University of New South Wales

25. Wong, Alfred Ka Yiu. Ontology mapping: a logic-based approach with applications in selected domains.

Degree: Computer Science & Engineering, 2008, University of New South Wales

 In advent of the Semantic Web and recent standardization efforts, Ontology has quickly become a popular and core semantic technology. Ontology is seen as a… (more)

Subjects/Keywords: semantic interoperability; ontology; ontology mapping; compliance management; network management; network security intrusion detection; network configuration management; integrated network management; Mappings (Mathematics)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, A. K. Y. (2008). Ontology mapping: a logic-based approach with applications in selected domains. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/41103 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:2057/SOURCE1?view=true

Chicago Manual of Style (16th Edition):

Wong, Alfred Ka Yiu. “Ontology mapping: a logic-based approach with applications in selected domains.” 2008. Doctoral Dissertation, University of New South Wales. Accessed November 14, 2019. http://handle.unsw.edu.au/1959.4/41103 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:2057/SOURCE1?view=true.

MLA Handbook (7th Edition):

Wong, Alfred Ka Yiu. “Ontology mapping: a logic-based approach with applications in selected domains.” 2008. Web. 14 Nov 2019.

Vancouver:

Wong AKY. Ontology mapping: a logic-based approach with applications in selected domains. [Internet] [Doctoral dissertation]. University of New South Wales; 2008. [cited 2019 Nov 14]. Available from: http://handle.unsw.edu.au/1959.4/41103 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:2057/SOURCE1?view=true.

Council of Science Editors:

Wong AKY. Ontology mapping: a logic-based approach with applications in selected domains. [Doctoral Dissertation]. University of New South Wales; 2008. Available from: http://handle.unsw.edu.au/1959.4/41103 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:2057/SOURCE1?view=true


Queensland University of Technology

26. Tham, Kevin Wen Kaye. Developing security services for network architectures.

Degree: 2006, Queensland University of Technology

 In the last 15 years, the adoption of enterprise level data networks had increased dramatically. This is mainly due to reasons, such as better use… (more)

Subjects/Keywords: secure network architecture; security services; protocols; denial-of-service; network security; worm; denial-of-service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tham, K. W. K. (2006). Developing security services for network architectures. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16546/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tham, Kevin Wen Kaye. “Developing security services for network architectures.” 2006. Thesis, Queensland University of Technology. Accessed November 14, 2019. https://eprints.qut.edu.au/16546/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tham, Kevin Wen Kaye. “Developing security services for network architectures.” 2006. Web. 14 Nov 2019.

Vancouver:

Tham KWK. Developing security services for network architectures. [Internet] [Thesis]. Queensland University of Technology; 2006. [cited 2019 Nov 14]. Available from: https://eprints.qut.edu.au/16546/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tham KWK. Developing security services for network architectures. [Thesis]. Queensland University of Technology; 2006. Available from: https://eprints.qut.edu.au/16546/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Queensland

27. Alharbi, Talal. Security in software defined networks.

Degree: School of Information Technology and Electrical Engineering, 2018, University of Queensland

Subjects/Keywords: Software defined networking; SDN; Topology discovery; Network security; Security of topology discovery; Security of address resolution protocol; Denial of service attack; Network virtualisation security; 0805 Distributed Computing; 1005 Communications Technologies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alharbi, T. (2018). Security in software defined networks. (Thesis). University of Queensland. Retrieved from http://espace.library.uq.edu.au/view/UQ:4

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alharbi, Talal. “Security in software defined networks.” 2018. Thesis, University of Queensland. Accessed November 14, 2019. http://espace.library.uq.edu.au/view/UQ:4.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alharbi, Talal. “Security in software defined networks.” 2018. Web. 14 Nov 2019.

Vancouver:

Alharbi T. Security in software defined networks. [Internet] [Thesis]. University of Queensland; 2018. [cited 2019 Nov 14]. Available from: http://espace.library.uq.edu.au/view/UQ:4.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alharbi T. Security in software defined networks. [Thesis]. University of Queensland; 2018. Available from: http://espace.library.uq.edu.au/view/UQ:4

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Bond University

28. Plasto, Daniel. Automated Analysis of Industrial Scale Security Protocols.

Degree: 2004, Bond University

Security protocols provide a communication architecture upon which security-sensitive distributed applications are built. Flaws in security protocols can expose applications to exploitation and manipulation. A… (more)

Subjects/Keywords: Computer network protocols; Computer networks; Security measures; Computer Science (0984)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Plasto, D. (2004). Automated Analysis of Industrial Scale Security Protocols. (Thesis). Bond University. Retrieved from https://epublications.bond.edu.au/theses/plasto

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Plasto, Daniel. “Automated Analysis of Industrial Scale Security Protocols.” 2004. Thesis, Bond University. Accessed November 14, 2019. https://epublications.bond.edu.au/theses/plasto.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Plasto, Daniel. “Automated Analysis of Industrial Scale Security Protocols.” 2004. Web. 14 Nov 2019.

Vancouver:

Plasto D. Automated Analysis of Industrial Scale Security Protocols. [Internet] [Thesis]. Bond University; 2004. [cited 2019 Nov 14]. Available from: https://epublications.bond.edu.au/theses/plasto.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Plasto D. Automated Analysis of Industrial Scale Security Protocols. [Thesis]. Bond University; 2004. Available from: https://epublications.bond.edu.au/theses/plasto

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

29. Wullems, Christian John. Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models.

Degree: 2005, Queensland University of Technology

 Context-aware computing has been a rapidly growing research area, however its uses have been predominantly targeted at pervasive applications for smart spaces such as smart… (more)

Subjects/Keywords: Pervasive; ubiquitous; authorization; access control; location; trusted location; context; context-aware; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wullems, C. J. (2005). Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16707/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wullems, Christian John. “Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models.” 2005. Thesis, Queensland University of Technology. Accessed November 14, 2019. https://eprints.qut.edu.au/16707/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wullems, Christian John. “Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models.” 2005. Web. 14 Nov 2019.

Vancouver:

Wullems CJ. Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models. [Internet] [Thesis]. Queensland University of Technology; 2005. [cited 2019 Nov 14]. Available from: https://eprints.qut.edu.au/16707/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wullems CJ. Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models. [Thesis]. Queensland University of Technology; 2005. Available from: https://eprints.qut.edu.au/16707/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Al-Ibrahim, Mohamed Hussain. Source authentication in group communication.

Degree: PhD, 2005, Macquarie University, Division of Information and Communication Sciences, Dept. of Computing

Bibliography: leaves 163-175.

Introduction  – Cryptographic essentials  – Multicast: structure and security  – Authentication of multicast streams  – Authentication of concast communication  – Authentication… (more)

Subjects/Keywords: Authentication; Digital signatures; Computer networks  – Security measures; Data encryption (Computer science); Computers  – Access control; Cryptography; Computer security; Computer network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Ibrahim, M. H. (2005). Source authentication in group communication. (Doctoral Dissertation). Macquarie University, Division of Information and Communication Sciences, Dept. of Computing. Retrieved from http://hdl.handle.net/1959.14/549

Chicago Manual of Style (16th Edition):

Al-Ibrahim, Mohamed Hussain. “Source authentication in group communication.” 2005. Doctoral Dissertation, Macquarie University, Division of Information and Communication Sciences, Dept. of Computing. Accessed November 14, 2019. http://hdl.handle.net/1959.14/549.

MLA Handbook (7th Edition):

Al-Ibrahim, Mohamed Hussain. “Source authentication in group communication.” 2005. Web. 14 Nov 2019.

Vancouver:

Al-Ibrahim MH. Source authentication in group communication. [Internet] [Doctoral dissertation]. Macquarie University, Division of Information and Communication Sciences, Dept. of Computing; 2005. [cited 2019 Nov 14]. Available from: http://hdl.handle.net/1959.14/549.

Council of Science Editors:

Al-Ibrahim MH. Source authentication in group communication. [Doctoral Dissertation]. Macquarie University, Division of Information and Communication Sciences, Dept. of Computing; 2005. Available from: http://hdl.handle.net/1959.14/549

[1] [2]

.