Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( Network security). Showing records 121 – 150 of 1058 total matches.

[1] [2] [3] [4] [5] [6] [7] … [36]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Michigan State University

121. Zhang, Lei. Spectrally efficient anti-jamming system design in wireless networks.

Degree: 2011, Michigan State University

Thesis Ph. D. Michigan State University. Electrical Engineering 2011.

In wireless networks, one of the most commonly used techniques for limiting the effectiveness of an… (more)

Subjects/Keywords: Wireless communication systems – Security measures; Network performance (Telecommunication) – Security measures; Radio – Interference – Prevention; Electrical engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, L. (2011). Spectrally efficient anti-jamming system design in wireless networks. (Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:868

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Lei. “Spectrally efficient anti-jamming system design in wireless networks.” 2011. Thesis, Michigan State University. Accessed November 18, 2019. http://etd.lib.msu.edu/islandora/object/etd:868.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Lei. “Spectrally efficient anti-jamming system design in wireless networks.” 2011. Web. 18 Nov 2019.

Vancouver:

Zhang L. Spectrally efficient anti-jamming system design in wireless networks. [Internet] [Thesis]. Michigan State University; 2011. [cited 2019 Nov 18]. Available from: http://etd.lib.msu.edu/islandora/object/etd:868.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang L. Spectrally efficient anti-jamming system design in wireless networks. [Thesis]. Michigan State University; 2011. Available from: http://etd.lib.msu.edu/islandora/object/etd:868

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Utah

122. Joseph, Jithu. Cenet – capability enabled networking: towards least-privileged networking.

Degree: MSin Computer Science, School of Computing, 2015, University of Utah

 In today's IP networks, any host can send packets to any other host irrespective of whether the recipient is interested in communicating with the sender… (more)

Subjects/Keywords: Access control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joseph, J. (2015). Cenet – capability enabled networking: towards least-privileged networking. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409

Chicago Manual of Style (16th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Masters Thesis, University of Utah. Accessed November 18, 2019. http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

MLA Handbook (7th Edition):

Joseph, Jithu. “Cenet – capability enabled networking: towards least-privileged networking.” 2015. Web. 18 Nov 2019.

Vancouver:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Internet] [Masters thesis]. University of Utah; 2015. [cited 2019 Nov 18]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409.

Council of Science Editors:

Joseph J. Cenet – capability enabled networking: towards least-privileged networking. [Masters Thesis]. University of Utah; 2015. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd3/id/3990/rec/409


Nelson Mandela Metropolitan University

123. Mooi, Roderick David. A model for security incident response in the South African National Research and Education network.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2014, Nelson Mandela Metropolitan University

 This dissertation addresses the problem of a lack of a formal incident response capability in the South African National Research and Education Network (SA NREN).… (more)

Subjects/Keywords: Information networks  – South Africa; Internet  – Security measures; Computer networks  – Security measures  – South Africa; National Research and Education Network (Computer network)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mooi, R. D. (2014). A model for security incident response in the South African National Research and Education network. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1017598

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mooi, Roderick David. “A model for security incident response in the South African National Research and Education network.” 2014. Thesis, Nelson Mandela Metropolitan University. Accessed November 18, 2019. http://hdl.handle.net/10948/d1017598.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mooi, Roderick David. “A model for security incident response in the South African National Research and Education network.” 2014. Web. 18 Nov 2019.

Vancouver:

Mooi RD. A model for security incident response in the South African National Research and Education network. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2014. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10948/d1017598.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mooi RD. A model for security incident response in the South African National Research and Education network. [Thesis]. Nelson Mandela Metropolitan University; 2014. Available from: http://hdl.handle.net/10948/d1017598

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

124. Zhang,Chi. Improving the Performance and Security of Multi-Hop Wireless Networks.

Degree: PhD, Electrical and Computer Engineering, 2011, University of Florida

Multi-hop wireless networks (or wireless ad hoc networks) have been widely accepted as an indispensable component of next-generation communication systems Advisors/Committee Members: Fang, Yuguang (committee chair), Wu, Dapeng (committee member), Khargonekar, Pramod (committee member), Chen, Shigang (committee member).

Subjects/Keywords: Algebra; Bartering; Broadcasting industry; Community structure; Distance functions; Inference; Network security; Property trusts; Sensors; Tradeoffs; network  – performance  – security  – wireless

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang,Chi. (2011). Improving the Performance and Security of Multi-Hop Wireless Networks. (Doctoral Dissertation). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0042891

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Zhang,Chi. “Improving the Performance and Security of Multi-Hop Wireless Networks.” 2011. Doctoral Dissertation, University of Florida. Accessed November 18, 2019. http://ufdc.ufl.edu/UFE0042891.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Zhang,Chi. “Improving the Performance and Security of Multi-Hop Wireless Networks.” 2011. Web. 18 Nov 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Zhang,Chi. Improving the Performance and Security of Multi-Hop Wireless Networks. [Internet] [Doctoral dissertation]. University of Florida; 2011. [cited 2019 Nov 18]. Available from: http://ufdc.ufl.edu/UFE0042891.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Zhang,Chi. Improving the Performance and Security of Multi-Hop Wireless Networks. [Doctoral Dissertation]. University of Florida; 2011. Available from: http://ufdc.ufl.edu/UFE0042891

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

125. Homer, John. A comprehensive approach to enterprise network security management.

Degree: PhD, Department of Computing and Information Sciences, 2009, Kansas State University

 Enterprise network security management is a vitally important task, more so now than ever before. Networks grow ever larger and more complex, and corporations, universities,… (more)

Subjects/Keywords: Enterprise network security analysis; Risk assessment; Attack Graph; Enterprise network configuration management; Security metric; Computer Science (0984)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Homer, J. (2009). A comprehensive approach to enterprise network security management. (Doctoral Dissertation). Kansas State University. Retrieved from http://hdl.handle.net/2097/1372

Chicago Manual of Style (16th Edition):

Homer, John. “A comprehensive approach to enterprise network security management.” 2009. Doctoral Dissertation, Kansas State University. Accessed November 18, 2019. http://hdl.handle.net/2097/1372.

MLA Handbook (7th Edition):

Homer, John. “A comprehensive approach to enterprise network security management.” 2009. Web. 18 Nov 2019.

Vancouver:

Homer J. A comprehensive approach to enterprise network security management. [Internet] [Doctoral dissertation]. Kansas State University; 2009. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/2097/1372.

Council of Science Editors:

Homer J. A comprehensive approach to enterprise network security management. [Doctoral Dissertation]. Kansas State University; 2009. Available from: http://hdl.handle.net/2097/1372


Unitec New Zealand

126. You, Li. A multi-agent integrated analysis engine for decentralized network traffic monitoring.

Degree: 2014, Unitec New Zealand

 The advent of decentralized systems have been considered as an immense progress as compared to existing centralized systems. In this research, we present an extensible,… (more)

Subjects/Keywords: network traffic analysis; networks; real-time analysis engines/agents; decentralized systems; network security; network privacy; network encrypted communications; 100503 Computer Communications Networks; 080303 Computer System Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

You, L. (2014). A multi-agent integrated analysis engine for decentralized network traffic monitoring. (Thesis). Unitec New Zealand. Retrieved from http://hdl.handle.net/10652/2526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

You, Li. “A multi-agent integrated analysis engine for decentralized network traffic monitoring.” 2014. Thesis, Unitec New Zealand. Accessed November 18, 2019. http://hdl.handle.net/10652/2526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

You, Li. “A multi-agent integrated analysis engine for decentralized network traffic monitoring.” 2014. Web. 18 Nov 2019.

Vancouver:

You L. A multi-agent integrated analysis engine for decentralized network traffic monitoring. [Internet] [Thesis]. Unitec New Zealand; 2014. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10652/2526.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

You L. A multi-agent integrated analysis engine for decentralized network traffic monitoring. [Thesis]. Unitec New Zealand; 2014. Available from: http://hdl.handle.net/10652/2526

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

127. WANG, HONGHAO. An Efficient and Secure Overlay Network for General Peer-to-Peer Systems.

Degree: PhD, Engineering : Computer Science and Engineering, 2008, University of Cincinnati

 Currently, Peer-to-Peer overlays can be classified into two main categories: unstructured and structured ones. Unstructured overlays are simple, robust, and powerful in keyword search. Structured… (more)

Subjects/Keywords: Computer Science; Peer-to-Peer; Overlay Network; Overlay Routing; Overlay Structure; Distributed Hash Table (DHT); Network Topology; Network Aware; Network Locality; Network Proximity; Network Security; Secure Routing; System Churn

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

WANG, H. (2008). An Efficient and Secure Overlay Network for General Peer-to-Peer Systems. (Doctoral Dissertation). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1204080675

Chicago Manual of Style (16th Edition):

WANG, HONGHAO. “An Efficient and Secure Overlay Network for General Peer-to-Peer Systems.” 2008. Doctoral Dissertation, University of Cincinnati. Accessed November 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1204080675.

MLA Handbook (7th Edition):

WANG, HONGHAO. “An Efficient and Secure Overlay Network for General Peer-to-Peer Systems.” 2008. Web. 18 Nov 2019.

Vancouver:

WANG H. An Efficient and Secure Overlay Network for General Peer-to-Peer Systems. [Internet] [Doctoral dissertation]. University of Cincinnati; 2008. [cited 2019 Nov 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1204080675.

Council of Science Editors:

WANG H. An Efficient and Secure Overlay Network for General Peer-to-Peer Systems. [Doctoral Dissertation]. University of Cincinnati; 2008. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1204080675

128. Papadogiannakis, Antonios. Building efficient network traffic monitoring systems under heavy load.

Degree: 2014, University of Crete (UOC); Πανεπιστήμιο Κρήτης

Network traffic monitoring is the basis for a multitude of systems, such as intrusion detection, network forensics, and traffic classification systems, which support the robust,… (more)

Subjects/Keywords: Εποπτεία δικτύων; Ασφάλεια δικτύων; Συστήματα ανίχνευσης επιθέσεων; Network monitoring; Network security; Intrusion detection systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Papadogiannakis, A. (2014). Building efficient network traffic monitoring systems under heavy load. (Thesis). University of Crete (UOC); Πανεπιστήμιο Κρήτης. Retrieved from http://hdl.handle.net/10442/hedi/34771

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Papadogiannakis, Antonios. “Building efficient network traffic monitoring systems under heavy load.” 2014. Thesis, University of Crete (UOC); Πανεπιστήμιο Κρήτης. Accessed November 18, 2019. http://hdl.handle.net/10442/hedi/34771.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Papadogiannakis, Antonios. “Building efficient network traffic monitoring systems under heavy load.” 2014. Web. 18 Nov 2019.

Vancouver:

Papadogiannakis A. Building efficient network traffic monitoring systems under heavy load. [Internet] [Thesis]. University of Crete (UOC); Πανεπιστήμιο Κρήτης; 2014. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10442/hedi/34771.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Papadogiannakis A. Building efficient network traffic monitoring systems under heavy load. [Thesis]. University of Crete (UOC); Πανεπιστήμιο Κρήτης; 2014. Available from: http://hdl.handle.net/10442/hedi/34771

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

129. Tan, Zhiyuan (Thomas). Detection of denial-of-service attacks based on computer vision techniques.

Degree: 2013, University of Technology, Sydney

 A Denial-of-Service (DoS) attack is an intrusive attempt, which aims to force a designated resource (e.g., network bandwidth, processor time or memory) to be unavailable… (more)

Subjects/Keywords: Network security; Network intrusion detection.; Anomaly-based detection.; Denial-of-service attack.; Computer vision.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, Z. (. (2013). Detection of denial-of-service attacks based on computer vision techniques. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/24176

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tan, Zhiyuan (Thomas). “Detection of denial-of-service attacks based on computer vision techniques.” 2013. Thesis, University of Technology, Sydney. Accessed November 18, 2019. http://hdl.handle.net/10453/24176.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tan, Zhiyuan (Thomas). “Detection of denial-of-service attacks based on computer vision techniques.” 2013. Web. 18 Nov 2019.

Vancouver:

Tan Z(. Detection of denial-of-service attacks based on computer vision techniques. [Internet] [Thesis]. University of Technology, Sydney; 2013. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10453/24176.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tan Z(. Detection of denial-of-service attacks based on computer vision techniques. [Thesis]. University of Technology, Sydney; 2013. Available from: http://hdl.handle.net/10453/24176

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Sacramento

130. Lavender, Brian Eugene. Implementation of genetic algorithms into a network intrusion detection system (netGA), and integration into nProbe.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 netGA takes networking theory and artificial intelligence theory and combines them together to form an attack detection system. netGA is an implementation of the method… (more)

Subjects/Keywords: Network security; Artificial intelligence; Soft computing; Wire tap; Network monitoring; Evolving rules

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lavender, B. E. (2011). Implementation of genetic algorithms into a network intrusion detection system (netGA), and integration into nProbe. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/973

Chicago Manual of Style (16th Edition):

Lavender, Brian Eugene. “Implementation of genetic algorithms into a network intrusion detection system (netGA), and integration into nProbe.” 2011. Masters Thesis, California State University – Sacramento. Accessed November 18, 2019. http://hdl.handle.net/10211.9/973.

MLA Handbook (7th Edition):

Lavender, Brian Eugene. “Implementation of genetic algorithms into a network intrusion detection system (netGA), and integration into nProbe.” 2011. Web. 18 Nov 2019.

Vancouver:

Lavender BE. Implementation of genetic algorithms into a network intrusion detection system (netGA), and integration into nProbe. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10211.9/973.

Council of Science Editors:

Lavender BE. Implementation of genetic algorithms into a network intrusion detection system (netGA), and integration into nProbe. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/973


Penn State University

131. Kim, Myongsoo. DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID.

Degree: PhD, Computer Science and Engineering, 2011, Penn State University

 Power systems have been dramatically changing with cutting edge information technologies. The new power system infrastructure called Smart Grid has evolved and has been studied… (more)

Subjects/Keywords: Smart Grid; Communication Network; Utility Security; Key Exchange; One core ring network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, M. (2011). DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/12204

Chicago Manual of Style (16th Edition):

Kim, Myongsoo. “DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID.” 2011. Doctoral Dissertation, Penn State University. Accessed November 18, 2019. https://etda.libraries.psu.edu/catalog/12204.

MLA Handbook (7th Edition):

Kim, Myongsoo. “DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID.” 2011. Web. 18 Nov 2019.

Vancouver:

Kim M. DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID. [Internet] [Doctoral dissertation]. Penn State University; 2011. [cited 2019 Nov 18]. Available from: https://etda.libraries.psu.edu/catalog/12204.

Council of Science Editors:

Kim M. DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID. [Doctoral Dissertation]. Penn State University; 2011. Available from: https://etda.libraries.psu.edu/catalog/12204


University of Victoria

132. Lai, Dao Yu. Intelligent online risk-based authentication using Bayesian network model.

Degree: Dept. of Electrical and Computer Engineering, 2011, University of Victoria

 Risk-based authentication is an increasingly popular component in the security architecture deployed by many organizations in mitigating online identity threat. Risk-based authentication uses contextual and… (more)

Subjects/Keywords: Risk-based authentication; network security; mouse dynamics; keystroke dynamics; biometric technology; Bayesian network model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lai, D. Y. (2011). Intelligent online risk-based authentication using Bayesian network model. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/3290

Chicago Manual of Style (16th Edition):

Lai, Dao Yu. “Intelligent online risk-based authentication using Bayesian network model.” 2011. Masters Thesis, University of Victoria. Accessed November 18, 2019. http://hdl.handle.net/1828/3290.

MLA Handbook (7th Edition):

Lai, Dao Yu. “Intelligent online risk-based authentication using Bayesian network model.” 2011. Web. 18 Nov 2019.

Vancouver:

Lai DY. Intelligent online risk-based authentication using Bayesian network model. [Internet] [Masters thesis]. University of Victoria; 2011. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/1828/3290.

Council of Science Editors:

Lai DY. Intelligent online risk-based authentication using Bayesian network model. [Masters Thesis]. University of Victoria; 2011. Available from: http://hdl.handle.net/1828/3290


Université Catholique de Louvain

133. Dethise, Arnaud. Towards privacy-preserving network verification of inter-domain Software-Defined Networking.

Degree: 2017, Université Catholique de Louvain

SDN approaches to inter-domain routing promise better traffic engineering, enhanced security, and higher automation. Yet, naïve deployment of SDN on the Internet is dangerous as… (more)

Subjects/Keywords: Software-Defined Networking; Network verification; Routing; Privacy; Secure multi-party computation; Traffic engineering; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dethise, A. (2017). Towards privacy-preserving network verification of inter-domain Software-Defined Networking. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/thesis:10711

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dethise, Arnaud. “Towards privacy-preserving network verification of inter-domain Software-Defined Networking.” 2017. Thesis, Université Catholique de Louvain. Accessed November 18, 2019. http://hdl.handle.net/2078.1/thesis:10711.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dethise, Arnaud. “Towards privacy-preserving network verification of inter-domain Software-Defined Networking.” 2017. Web. 18 Nov 2019.

Vancouver:

Dethise A. Towards privacy-preserving network verification of inter-domain Software-Defined Networking. [Internet] [Thesis]. Université Catholique de Louvain; 2017. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/2078.1/thesis:10711.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dethise A. Towards privacy-preserving network verification of inter-domain Software-Defined Networking. [Thesis]. Université Catholique de Louvain; 2017. Available from: http://hdl.handle.net/2078.1/thesis:10711

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

134. Hamadi, Ashraf. Investigating vulnerabilities in a home network with Kali Linux.

Degree: Design and Engineering, 2019, Mälardalen University

  The advancement of the internet across the globe has made computer users implement several ways of protection against possible network threats. The goal of… (more)

Subjects/Keywords: vulnerabilities; home network; Kali Linux; Classification; network security; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hamadi, A. (2019). Investigating vulnerabilities in a home network with Kali Linux. (Thesis). Mälardalen University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42612

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hamadi, Ashraf. “Investigating vulnerabilities in a home network with Kali Linux.” 2019. Thesis, Mälardalen University. Accessed November 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42612.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hamadi, Ashraf. “Investigating vulnerabilities in a home network with Kali Linux.” 2019. Web. 18 Nov 2019.

Vancouver:

Hamadi A. Investigating vulnerabilities in a home network with Kali Linux. [Internet] [Thesis]. Mälardalen University; 2019. [cited 2019 Nov 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42612.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hamadi A. Investigating vulnerabilities in a home network with Kali Linux. [Thesis]. Mälardalen University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42612

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Halmstad University

135. Wallin, Andreas; Rubensson, Jonas. Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation.

Degree: Computer and Electrical Engineering (IDE), 2014, Halmstad University

Offentliga trådlösa nätverk finns idag mer tillgängliga än någonsin. Samtidigt haralla dessa nätverk något gemensamt – de går alla att avlyssna och risken finns… (more)

Subjects/Keywords: Security awareness; Wireless network; Eavesdropping; Network traffic; Säkerhetsmedvetenhet; Trådlösa nätverk; Avlyssning; Nätverkstrafik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wallin, Andreas; Rubensson, J. (2014). Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26644

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wallin, Andreas; Rubensson, Jonas. “Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation.” 2014. Thesis, Halmstad University. Accessed November 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26644.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wallin, Andreas; Rubensson, Jonas. “Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation.” 2014. Web. 18 Nov 2019.

Vancouver:

Wallin, Andreas; Rubensson J. Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation. [Internet] [Thesis]. Halmstad University; 2014. [cited 2019 Nov 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26644.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wallin, Andreas; Rubensson J. Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation. [Thesis]. Halmstad University; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26644

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

136. Swankoski, Eric. Mitigating Denial-of-Service Attacks in Mobile Ad Hoc Networks using Network Capabilities .

Degree: 2017, George Mason University

 The open nature of mobile ad hoc networks (MANETs) makes them vulnerable to denial-of-service attacks. With no well-defined access points, network perimeter, or centralized authority,… (more)

Subjects/Keywords: Computer science; Denial of Service; Mobile Ad Hoc Networks; Multicast; Network Capabilities; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Swankoski, E. (2017). Mitigating Denial-of-Service Attacks in Mobile Ad Hoc Networks using Network Capabilities . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/11319

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Swankoski, Eric. “Mitigating Denial-of-Service Attacks in Mobile Ad Hoc Networks using Network Capabilities .” 2017. Thesis, George Mason University. Accessed November 18, 2019. http://hdl.handle.net/1920/11319.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Swankoski, Eric. “Mitigating Denial-of-Service Attacks in Mobile Ad Hoc Networks using Network Capabilities .” 2017. Web. 18 Nov 2019.

Vancouver:

Swankoski E. Mitigating Denial-of-Service Attacks in Mobile Ad Hoc Networks using Network Capabilities . [Internet] [Thesis]. George Mason University; 2017. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/1920/11319.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Swankoski E. Mitigating Denial-of-Service Attacks in Mobile Ad Hoc Networks using Network Capabilities . [Thesis]. George Mason University; 2017. Available from: http://hdl.handle.net/1920/11319

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidad Nacional de La Plata

137. Lanfranco, Einar Felipe. Integración de herramientas de seguridad para redes informáticas.

Degree: 2010, Universidad Nacional de La Plata

El objetivo del trabajo es analizar y estudiar los diversos tipos de herramientas de seguridad en redes existentes en la actualidad, a fin de seleccionar… (more)

Subjects/Keywords: Ciencias Informáticas; Redes y Seguridad; Network communications; Network Protocols; Security and protection (e.g., firewalls)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lanfranco, E. F. (2010). Integración de herramientas de seguridad para redes informáticas. (Thesis). Universidad Nacional de La Plata. Retrieved from http://hdl.handle.net/10915/4030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lanfranco, Einar Felipe. “Integración de herramientas de seguridad para redes informáticas.” 2010. Thesis, Universidad Nacional de La Plata. Accessed November 18, 2019. http://hdl.handle.net/10915/4030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lanfranco, Einar Felipe. “Integración de herramientas de seguridad para redes informáticas.” 2010. Web. 18 Nov 2019.

Vancouver:

Lanfranco EF. Integración de herramientas de seguridad para redes informáticas. [Internet] [Thesis]. Universidad Nacional de La Plata; 2010. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10915/4030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lanfranco EF. Integración de herramientas de seguridad para redes informáticas. [Thesis]. Universidad Nacional de La Plata; 2010. Available from: http://hdl.handle.net/10915/4030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

138. Yu, Yue. Resilience Strategies for Network Challenge Detection, Identification and Remediation .

Degree: 2013, University of Sydney

 The enormous growth of the Internet and its use in everyday life make it an attractive target for malicious users. As the network becomes more… (more)

Subjects/Keywords: Network Security; Malware Detection; Malicious Attack; Network Resilience; DDoS Attack; Worm Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, Y. (2013). Resilience Strategies for Network Challenge Detection, Identification and Remediation . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/10277

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Yue. “Resilience Strategies for Network Challenge Detection, Identification and Remediation .” 2013. Thesis, University of Sydney. Accessed November 18, 2019. http://hdl.handle.net/2123/10277.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Yue. “Resilience Strategies for Network Challenge Detection, Identification and Remediation .” 2013. Web. 18 Nov 2019.

Vancouver:

Yu Y. Resilience Strategies for Network Challenge Detection, Identification and Remediation . [Internet] [Thesis]. University of Sydney; 2013. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/2123/10277.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Y. Resilience Strategies for Network Challenge Detection, Identification and Remediation . [Thesis]. University of Sydney; 2013. Available from: http://hdl.handle.net/2123/10277

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

139. Li, Celia J. Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks.

Degree: PhD, Computer Science, 2016, York University

 Wireless mesh networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructures. As the use of mobile devices such as smart… (more)

Subjects/Keywords: Computer science; Wireless mesh network; Network security; Authentication; Key management; Group key management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, C. J. (2016). Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks. (Doctoral Dissertation). York University. Retrieved from http://hdl.handle.net/10315/32127

Chicago Manual of Style (16th Edition):

Li, Celia J. “Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks.” 2016. Doctoral Dissertation, York University. Accessed November 18, 2019. http://hdl.handle.net/10315/32127.

MLA Handbook (7th Edition):

Li, Celia J. “Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks.” 2016. Web. 18 Nov 2019.

Vancouver:

Li CJ. Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks. [Internet] [Doctoral dissertation]. York University; 2016. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10315/32127.

Council of Science Editors:

Li CJ. Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks. [Doctoral Dissertation]. York University; 2016. Available from: http://hdl.handle.net/10315/32127


University of KwaZulu-Natal

140. [No author]. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices.

Degree: 2016, University of KwaZulu-Natal

 In recent years, there has been a rapid increase in Internet usage, which has in turn led to a rise in malicious network activity. Network(more)

Subjects/Keywords: Anomaly detection (Computer security); Intrusion detection systems (Computer security); Firewalls (Computer security); Computer networks.; Computer engineering.; Network Intrusion Detection Systems (NIDS).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2016). Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/14171

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. ” 2016. Thesis, University of KwaZulu-Natal. Accessed November 18, 2019. http://hdl.handle.net/10413/14171.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. ” 2016. Web. 18 Nov 2019.

Vancouver:

author] [. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. [Internet] [Thesis]. University of KwaZulu-Natal; 2016. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10413/14171.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. Unsupervised feature selection for anomaly-based network intrusion detection using cluster validity indices. [Thesis]. University of KwaZulu-Natal; 2016. Available from: http://hdl.handle.net/10413/14171

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Youngstown State University

141. Watkins, Trevor U. Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots.

Degree: Master of Computing and Information Systems, Department of Computer Science and Information Systems, 2009, Youngstown State University

 Is Microsoft a threat to national security? This thesis evaluates Microsoft's policies, business model, and products to determine whether Microsoft is a threat to national… (more)

Subjects/Keywords: Computer Science; Information Systems; Systems Design; Honeypots; penetration testing; national security; network security; Microsoft threat to national security; hackers; Microsoft Windows

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Watkins, T. U. (2009). Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206

Chicago Manual of Style (16th Edition):

Watkins, Trevor U. “Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots.” 2009. Masters Thesis, Youngstown State University. Accessed November 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.

MLA Handbook (7th Edition):

Watkins, Trevor U. “Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots.” 2009. Web. 18 Nov 2019.

Vancouver:

Watkins TU. Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2019 Nov 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.

Council of Science Editors:

Watkins TU. Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206


University of Notre Dame

142. Chad D. Mano. Defending against Malicious Rogue System Threats</h1>.

Degree: PhD, Computer Science and Engineering, 2006, University of Notre Dame

  With the expanse of the Internet and the increased reliance on computer networking technology for everyday business, the need to protect electronic data and… (more)

Subjects/Keywords: encryption; communication protocols; network security; wireless security; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mano, C. D. (2006). Defending against Malicious Rogue System Threats</h1>. (Doctoral Dissertation). University of Notre Dame. Retrieved from https://curate.nd.edu/show/vq27zk54c89

Chicago Manual of Style (16th Edition):

Mano, Chad D.. “Defending against Malicious Rogue System Threats</h1>.” 2006. Doctoral Dissertation, University of Notre Dame. Accessed November 18, 2019. https://curate.nd.edu/show/vq27zk54c89.

MLA Handbook (7th Edition):

Mano, Chad D.. “Defending against Malicious Rogue System Threats</h1>.” 2006. Web. 18 Nov 2019.

Vancouver:

Mano CD. Defending against Malicious Rogue System Threats</h1>. [Internet] [Doctoral dissertation]. University of Notre Dame; 2006. [cited 2019 Nov 18]. Available from: https://curate.nd.edu/show/vq27zk54c89.

Council of Science Editors:

Mano CD. Defending against Malicious Rogue System Threats</h1>. [Doctoral Dissertation]. University of Notre Dame; 2006. Available from: https://curate.nd.edu/show/vq27zk54c89


Sardar Patel University

143. Patel, Atul Manubhai. Development of protocols and algorithms to secure integration of ad hoc network and wired network; -.

Degree: Computer Sc., 2012, Sardar Patel University

None newline

References given in the end .

Advisors/Committee Members: Virparia, Paresh.

Subjects/Keywords: algorithms; IEEE standards; network; network security; protocols; wireless network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patel, A. M. (2012). Development of protocols and algorithms to secure integration of ad hoc network and wired network; -. (Thesis). Sardar Patel University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/34783

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Patel, Atul Manubhai. “Development of protocols and algorithms to secure integration of ad hoc network and wired network; -.” 2012. Thesis, Sardar Patel University. Accessed November 18, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/34783.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Patel, Atul Manubhai. “Development of protocols and algorithms to secure integration of ad hoc network and wired network; -.” 2012. Web. 18 Nov 2019.

Vancouver:

Patel AM. Development of protocols and algorithms to secure integration of ad hoc network and wired network; -. [Internet] [Thesis]. Sardar Patel University; 2012. [cited 2019 Nov 18]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34783.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Patel AM. Development of protocols and algorithms to secure integration of ad hoc network and wired network; -. [Thesis]. Sardar Patel University; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34783

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

144. Hassani, Abtin. Designing a fault tolerant and secure network core for inter-organization communication.

Degree: Design and Engineering, 2015, Mälardalen University

  Service providers which provide services within customers’ networks often deal with the issue of needing to use a large number of VPN accounts and… (more)

Subjects/Keywords: Inter-organizational communication network; IOCN; Inter-organization communication; IOC; Data center network; DCN; cascading firewalls; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hassani, A. (2015). Designing a fault tolerant and secure network core for inter-organization communication. (Thesis). Mälardalen University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hassani, Abtin. “Designing a fault tolerant and secure network core for inter-organization communication.” 2015. Thesis, Mälardalen University. Accessed November 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hassani, Abtin. “Designing a fault tolerant and secure network core for inter-organization communication.” 2015. Web. 18 Nov 2019.

Vancouver:

Hassani A. Designing a fault tolerant and secure network core for inter-organization communication. [Internet] [Thesis]. Mälardalen University; 2015. [cited 2019 Nov 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hassani A. Designing a fault tolerant and secure network core for inter-organization communication. [Thesis]. Mälardalen University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

145. Henry, Kevin John. Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks.

Degree: 2015, University of Waterloo

 The term sensor network is used to refer to a broad class of networks where several small devices, called sensors, are deployed in order to… (more)

Subjects/Keywords: wireless sensor network; key pre-distribution; network discovery; aggregation; combinatorial key pre-distribution; resilient aggregation; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henry, K. J. (2015). Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/9476

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Henry, Kevin John. “Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks.” 2015. Thesis, University of Waterloo. Accessed November 18, 2019. http://hdl.handle.net/10012/9476.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Henry, Kevin John. “Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks.” 2015. Web. 18 Nov 2019.

Vancouver:

Henry KJ. Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks. [Internet] [Thesis]. University of Waterloo; 2015. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10012/9476.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Henry KJ. Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks. [Thesis]. University of Waterloo; 2015. Available from: http://hdl.handle.net/10012/9476

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Toledo

146. Farhat, Md Tanzin. An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network.

Degree: MS, Engineering (Computer Science), 2018, University of Toledo

 Cognitive Radio Network (CRN) technology has offered the opportunistic solution for the spectrum scarcity problem in wireless communication. The Dynamic Spectrum Access (DSA) solution enables… (more)

Subjects/Keywords: Computer Science; Electrical Engineering; Cognitive Radio Network; Software Defined Radio; Wireless Network Security; Artificial Neural Network; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farhat, M. T. (2018). An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network. (Masters Thesis). University of Toledo. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623

Chicago Manual of Style (16th Edition):

Farhat, Md Tanzin. “An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network.” 2018. Masters Thesis, University of Toledo. Accessed November 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623.

MLA Handbook (7th Edition):

Farhat, Md Tanzin. “An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network.” 2018. Web. 18 Nov 2019.

Vancouver:

Farhat MT. An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network. [Internet] [Masters thesis]. University of Toledo; 2018. [cited 2019 Nov 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623.

Council of Science Editors:

Farhat MT. An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network. [Masters Thesis]. University of Toledo; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623


University of Waterloo

147. Fung, Carol. Design and Management of Collaborative Intrusion Detection Networks.

Degree: 2013, University of Waterloo

 In recent years network intrusions have become a severe threat to the privacy and safety of computer users. Recent cyber attacks compromise a large number… (more)

Subjects/Keywords: Intrusion Detection Network; Collaboration network; Computer Security; Network Management; Trust Management; Resource Management; Game Theory; Bayesian Decision

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fung, C. (2013). Design and Management of Collaborative Intrusion Detection Networks. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/7490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fung, Carol. “Design and Management of Collaborative Intrusion Detection Networks.” 2013. Thesis, University of Waterloo. Accessed November 18, 2019. http://hdl.handle.net/10012/7490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fung, Carol. “Design and Management of Collaborative Intrusion Detection Networks.” 2013. Web. 18 Nov 2019.

Vancouver:

Fung C. Design and Management of Collaborative Intrusion Detection Networks. [Internet] [Thesis]. University of Waterloo; 2013. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10012/7490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fung C. Design and Management of Collaborative Intrusion Detection Networks. [Thesis]. University of Waterloo; 2013. Available from: http://hdl.handle.net/10012/7490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

148. Kumar, Ajoy. Unifying the conceptual levels of network security through the use of patterns.

Degree: 2014, Florida Atlantic University

Summary: Network architectures are described by the International Standard for Organization (ISO), which contains seven layers. The internet uses four of these layers, of which… (more)

Subjects/Keywords: Computer architecture; Computer network architectures; Computer network protocols; Computer network protocols; Computer networks  – Security measures; Expert systems (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumar, A. (2014). Unifying the conceptual levels of network security through the use of patterns. (Thesis). Florida Atlantic University. Retrieved from http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kumar, Ajoy. “Unifying the conceptual levels of network security through the use of patterns.” 2014. Thesis, Florida Atlantic University. Accessed November 18, 2019. http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kumar, Ajoy. “Unifying the conceptual levels of network security through the use of patterns.” 2014. Web. 18 Nov 2019.

Vancouver:

Kumar A. Unifying the conceptual levels of network security through the use of patterns. [Internet] [Thesis]. Florida Atlantic University; 2014. [cited 2019 Nov 18]. Available from: http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kumar A. Unifying the conceptual levels of network security through the use of patterns. [Thesis]. Florida Atlantic University; 2014. Available from: http://purl.flvc.org/fau/fd/FA00004132 ; (URL) http://purl.flvc.org/fau/fd/FA00004132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dalhousie University

149. Arndt, Daniel Joseph. An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic.

Degree: Master of Computer Science, Faculty of Computer Science, 2012, Dalhousie University

 Encrypted protocols, such as Secure Socket Layer (SSL), are becoming more prevalent because of the growing use of e-commerce, anonymity services, gaming and Peer-to-Peer (P2P)… (more)

Subjects/Keywords: encryption; network security; machine learning; SSL; secure socket layer

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arndt, D. J. (2012). An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/15279

Chicago Manual of Style (16th Edition):

Arndt, Daniel Joseph. “An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic.” 2012. Masters Thesis, Dalhousie University. Accessed November 18, 2019. http://hdl.handle.net/10222/15279.

MLA Handbook (7th Edition):

Arndt, Daniel Joseph. “An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic.” 2012. Web. 18 Nov 2019.

Vancouver:

Arndt DJ. An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic. [Internet] [Masters thesis]. Dalhousie University; 2012. [cited 2019 Nov 18]. Available from: http://hdl.handle.net/10222/15279.

Council of Science Editors:

Arndt DJ. An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic. [Masters Thesis]. Dalhousie University; 2012. Available from: http://hdl.handle.net/10222/15279

150. Valiveti Sharada. Enhancing Security with Effective Routing Mechanism in Ad Hoc Networks;.

Degree: 2015, Nirma University

newline

Advisors/Committee Members: Kotecha K.

Subjects/Keywords: Enhancing; Network; Routing; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharada, V. (2015). Enhancing Security with Effective Routing Mechanism in Ad Hoc Networks;. (Thesis). Nirma University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/45060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sharada, Valiveti. “Enhancing Security with Effective Routing Mechanism in Ad Hoc Networks;.” 2015. Thesis, Nirma University. Accessed November 18, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/45060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sharada, Valiveti. “Enhancing Security with Effective Routing Mechanism in Ad Hoc Networks;.” 2015. Web. 18 Nov 2019.

Vancouver:

Sharada V. Enhancing Security with Effective Routing Mechanism in Ad Hoc Networks;. [Internet] [Thesis]. Nirma University; 2015. [cited 2019 Nov 18]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/45060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sharada V. Enhancing Security with Effective Routing Mechanism in Ad Hoc Networks;. [Thesis]. Nirma University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/45060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] … [36]

.