Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( attack). Showing records 1 – 30 of 982 total matches.

[1] [2] [3] [4] [5] … [33]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


North Carolina State University

1. Gegick, Michael. Predicting Attack-prone Components with Source Code Static Analyzers.

Degree: PhD, Computer Science, 2009, North Carolina State University

 No single vulnerability detection technique can identify all vulnerabilities in a software system. However, the vulnerabilities that are identified from a detection technique may be… (more)

Subjects/Keywords: attack-prone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gegick, M. (2009). Predicting Attack-prone Components with Source Code Static Analyzers. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5294

Chicago Manual of Style (16th Edition):

Gegick, Michael. “Predicting Attack-prone Components with Source Code Static Analyzers.” 2009. Doctoral Dissertation, North Carolina State University. Accessed February 21, 2020. http://www.lib.ncsu.edu/resolver/1840.16/5294.

MLA Handbook (7th Edition):

Gegick, Michael. “Predicting Attack-prone Components with Source Code Static Analyzers.” 2009. Web. 21 Feb 2020.

Vancouver:

Gegick M. Predicting Attack-prone Components with Source Code Static Analyzers. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2020 Feb 21]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5294.

Council of Science Editors:

Gegick M. Predicting Attack-prone Components with Source Code Static Analyzers. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5294


Colorado School of Mines

2. Lin, Jian. PRIVACY AND SECURITY IN CROWDSENSING.

Degree: PhD, Electrical Engineering and Computer Sciences, 2020, Colorado School of Mines

 The rapid proliferation of sensor-embedded devices has enabled crowdsensing, a new paradigm which effectively collects sensing data from pervasive users. However, both the openness of… (more)

Subjects/Keywords: Incentive mechanism; Sybil attack; Inference attack; Crowdsensing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2020). PRIVACY AND SECURITY IN CROWDSENSING. (Doctoral Dissertation). Colorado School of Mines. Retrieved from http://hdl.handle.net/11124/173985

Chicago Manual of Style (16th Edition):

Lin, Jian. “PRIVACY AND SECURITY IN CROWDSENSING.” 2020. Doctoral Dissertation, Colorado School of Mines. Accessed February 21, 2020. http://hdl.handle.net/11124/173985.

MLA Handbook (7th Edition):

Lin, Jian. “PRIVACY AND SECURITY IN CROWDSENSING.” 2020. Web. 21 Feb 2020.

Vancouver:

Lin J. PRIVACY AND SECURITY IN CROWDSENSING. [Internet] [Doctoral dissertation]. Colorado School of Mines; 2020. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/11124/173985.

Council of Science Editors:

Lin J. PRIVACY AND SECURITY IN CROWDSENSING. [Doctoral Dissertation]. Colorado School of Mines; 2020. Available from: http://hdl.handle.net/11124/173985

3. Soltani Esterabadi, Afshin. Attack Analysis Methodologies .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsvetenskap, 2019, Chalmers University of Technology

 new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although… (more)

Subjects/Keywords: Automotive; Cybersecurity; Cyberattack; Attack surface; Attack analysis; Risk assessment; Threat analysis; Attack feasibility; Attack potentials.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soltani Esterabadi, A. (2019). Attack Analysis Methodologies . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Thesis, Chalmers University of Technology. Accessed February 21, 2020. http://hdl.handle.net/20.500.12380/300610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Web. 21 Feb 2020.

Vancouver:

Soltani Esterabadi A. Attack Analysis Methodologies . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/20.500.12380/300610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soltani Esterabadi A. Attack Analysis Methodologies . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

4. Teklay, Gebremichael. Preventing Flooding Attack in MANETs using the reserved bits of AODV messages .

Degree: 2014, Addis Ababa University

 The flexibility and other advantages of mobile ad-hoc networks come with different security flaws, and flooding attack is one of the common attacks in reactive… (more)

Subjects/Keywords: Preventing flooding attack; Data flooding attac; Route request flooding attack; Route request flooding attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Teklay, G. (2014). Preventing Flooding Attack in MANETs using the reserved bits of AODV messages . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/5233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Teklay, Gebremichael. “Preventing Flooding Attack in MANETs using the reserved bits of AODV messages .” 2014. Thesis, Addis Ababa University. Accessed February 21, 2020. http://etd.aau.edu.et/dspace/handle/123456789/5233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Teklay, Gebremichael. “Preventing Flooding Attack in MANETs using the reserved bits of AODV messages .” 2014. Web. 21 Feb 2020.

Vancouver:

Teklay G. Preventing Flooding Attack in MANETs using the reserved bits of AODV messages . [Internet] [Thesis]. Addis Ababa University; 2014. [cited 2020 Feb 21]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/5233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Teklay G. Preventing Flooding Attack in MANETs using the reserved bits of AODV messages . [Thesis]. Addis Ababa University; 2014. Available from: http://etd.aau.edu.et/dspace/handle/123456789/5233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Notre Dame

5. Michael W Hull. The Foundations of Organo-Zintl Chemistry</h1>.

Degree: PhD, Chemistry and Biochemistry, 2009, University of Notre Dame

  The primary focus of this dissertation is the development of the chemistry of organo-Zintl clusters. The goal of the project was to put into… (more)

Subjects/Keywords: alkyne; Zintl; nucleophilic attack; cluster

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hull, M. W. (2009). The Foundations of Organo-Zintl Chemistry</h1>. (Doctoral Dissertation). University of Notre Dame. Retrieved from https://curate.nd.edu/show/bk128912n2h

Chicago Manual of Style (16th Edition):

Hull, Michael W. “The Foundations of Organo-Zintl Chemistry</h1>.” 2009. Doctoral Dissertation, University of Notre Dame. Accessed February 21, 2020. https://curate.nd.edu/show/bk128912n2h.

MLA Handbook (7th Edition):

Hull, Michael W. “The Foundations of Organo-Zintl Chemistry</h1>.” 2009. Web. 21 Feb 2020.

Vancouver:

Hull MW. The Foundations of Organo-Zintl Chemistry</h1>. [Internet] [Doctoral dissertation]. University of Notre Dame; 2009. [cited 2020 Feb 21]. Available from: https://curate.nd.edu/show/bk128912n2h.

Council of Science Editors:

Hull MW. The Foundations of Organo-Zintl Chemistry</h1>. [Doctoral Dissertation]. University of Notre Dame; 2009. Available from: https://curate.nd.edu/show/bk128912n2h


NSYSU

6. Liu, Ming-Che. APT Attack Detection Based on DNS Time Frequency Analysis.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 Recently, malware infection has become one of the most serious threats against information security. Analysis and detection against malware are regarded as an important issue… (more)

Subjects/Keywords: Malware; Traffic Analysis; APT Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, M. (2013). APT Attack Detection Based on DNS Time Frequency Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Thesis, NSYSU. Accessed February 21, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Web. 21 Feb 2020.

Vancouver:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Feb 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. CHITTAPHONE PHONHARATH. Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Inference attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

PHONHARATH, C. (n.d.). Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/7608

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

PHONHARATH, CHITTAPHONE. “Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed February 21, 2020. http://hdl.handle.net/10061/7608.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

PHONHARATH, CHITTAPHONE. “Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ.” Web. 21 Feb 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

PHONHARATH C. Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10061/7608.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

PHONHARATH C. Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/7608

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Louisiana State University

8. Tang, Bixiang. New Approaches to Smart Grid Security with SCADA Systems.

Degree: PhD, Electrical and Computer Engineering, 2014, Louisiana State University

 The use of information technology in electric power grid introduces the vulnerability problem looming the future smart grid. The supervisory control and data acquisition (SCADA)is… (more)

Subjects/Keywords: smart grid; SCADA; replay attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tang, B. (2014). New Approaches to Smart Grid Security with SCADA Systems. (Doctoral Dissertation). Louisiana State University. Retrieved from etd-06022014-114518 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3077

Chicago Manual of Style (16th Edition):

Tang, Bixiang. “New Approaches to Smart Grid Security with SCADA Systems.” 2014. Doctoral Dissertation, Louisiana State University. Accessed February 21, 2020. etd-06022014-114518 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3077.

MLA Handbook (7th Edition):

Tang, Bixiang. “New Approaches to Smart Grid Security with SCADA Systems.” 2014. Web. 21 Feb 2020.

Vancouver:

Tang B. New Approaches to Smart Grid Security with SCADA Systems. [Internet] [Doctoral dissertation]. Louisiana State University; 2014. [cited 2020 Feb 21]. Available from: etd-06022014-114518 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3077.

Council of Science Editors:

Tang B. New Approaches to Smart Grid Security with SCADA Systems. [Doctoral Dissertation]. Louisiana State University; 2014. Available from: etd-06022014-114518 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3077


Macquarie University

9. Orumiehchiha, Mohammad Ali. Cryptanalysis of lightweight cryptographic algorithms.

Degree: 2014, Macquarie University

Empirical thesis.

Bibliography: pages 111-124.

1. Introduction  – 2. Stream ciphers  – 3. Cryptanalysis of WG-7 stream cipher  – 4. Security evaluation of Rakaposhi stream… (more)

Subjects/Keywords: Stream ciphers; cryptography; cryptanalysis; symmetric cipher; stream cipher; hash function; key recovery attack; distinguishing attack; collision attack; forgery attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Orumiehchiha, M. A. (2014). Cryptanalysis of lightweight cryptographic algorithms. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1141525

Chicago Manual of Style (16th Edition):

Orumiehchiha, Mohammad Ali. “Cryptanalysis of lightweight cryptographic algorithms.” 2014. Doctoral Dissertation, Macquarie University. Accessed February 21, 2020. http://hdl.handle.net/1959.14/1141525.

MLA Handbook (7th Edition):

Orumiehchiha, Mohammad Ali. “Cryptanalysis of lightweight cryptographic algorithms.” 2014. Web. 21 Feb 2020.

Vancouver:

Orumiehchiha MA. Cryptanalysis of lightweight cryptographic algorithms. [Internet] [Doctoral dissertation]. Macquarie University; 2014. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1959.14/1141525.

Council of Science Editors:

Orumiehchiha MA. Cryptanalysis of lightweight cryptographic algorithms. [Doctoral Dissertation]. Macquarie University; 2014. Available from: http://hdl.handle.net/1959.14/1141525


Oregon State University

10. Yoo, Jaewon. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.

Degree: MS, Electrical and Computer Engineering, 2008, Oregon State University

 The Advent of multi-cores allows programs to be executed much faster than before. Cryptoalgorithms use long-bit words thus parallelizing these operations on multi-cores will achieve… (more)

Subjects/Keywords: Side Channel Attack; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yoo, J. (2008). Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/8927

Chicago Manual of Style (16th Edition):

Yoo, Jaewon. “Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.” 2008. Masters Thesis, Oregon State University. Accessed February 21, 2020. http://hdl.handle.net/1957/8927.

MLA Handbook (7th Edition):

Yoo, Jaewon. “Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.” 2008. Web. 21 Feb 2020.

Vancouver:

Yoo J. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. [Internet] [Masters thesis]. Oregon State University; 2008. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1957/8927.

Council of Science Editors:

Yoo J. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. [Masters Thesis]. Oregon State University; 2008. Available from: http://hdl.handle.net/1957/8927


University of Adelaide

11. Leung, Elaine Stephanie. Transient ischaemic attack: a primary care perspective of stroke prevention.

Degree: 2015, University of Adelaide

 Transient ischaemic attacks (TIAs) are a warning sign for stroke. The early assessment and management of TIA can decrease the subsequent risk of stroke but… (more)

Subjects/Keywords: transient ischaemic attack; primary care

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Leung, E. S. (2015). Transient ischaemic attack: a primary care perspective of stroke prevention. (Thesis). University of Adelaide. Retrieved from http://hdl.handle.net/2440/97990

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Leung, Elaine Stephanie. “Transient ischaemic attack: a primary care perspective of stroke prevention.” 2015. Thesis, University of Adelaide. Accessed February 21, 2020. http://hdl.handle.net/2440/97990.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Leung, Elaine Stephanie. “Transient ischaemic attack: a primary care perspective of stroke prevention.” 2015. Web. 21 Feb 2020.

Vancouver:

Leung ES. Transient ischaemic attack: a primary care perspective of stroke prevention. [Internet] [Thesis]. University of Adelaide; 2015. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2440/97990.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Leung ES. Transient ischaemic attack: a primary care perspective of stroke prevention. [Thesis]. University of Adelaide; 2015. Available from: http://hdl.handle.net/2440/97990

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Garrett, Keith. Vulnerabililty Analysis of Multi-Factor Authentication Protocols.

Degree: 2016, University of North Florida

 In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those… (more)

Subjects/Keywords: clogging attack security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garrett, K. (2016). Vulnerabililty Analysis of Multi-Factor Authentication Protocols. (Thesis). University of North Florida. Retrieved from https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Thesis, University of North Florida. Accessed February 21, 2020. https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Web. 21 Feb 2020.

Vancouver:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Internet] [Thesis]. University of North Florida; 2016. [cited 2020 Feb 21]. Available from: https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Thesis]. University of North Florida; 2016. Available from: https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tennessee – Knoxville

13. Burns, Evan Montgomery. When patients attack: The experience of inpatient mental health counselors after a physical attack from a patient.

Degree: 2018, University of Tennessee – Knoxville

 Mental health professionals who work at inpatient facilities are at an increased risk of physical attacks from patients (Beech & Leather, 2006; Campbell et al.,… (more)

Subjects/Keywords: counselor; inpatient; physical attack; psychological

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burns, E. M. (2018). When patients attack: The experience of inpatient mental health counselors after a physical attack from a patient. (Doctoral Dissertation). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_graddiss/5251

Chicago Manual of Style (16th Edition):

Burns, Evan Montgomery. “When patients attack: The experience of inpatient mental health counselors after a physical attack from a patient.” 2018. Doctoral Dissertation, University of Tennessee – Knoxville. Accessed February 21, 2020. https://trace.tennessee.edu/utk_graddiss/5251.

MLA Handbook (7th Edition):

Burns, Evan Montgomery. “When patients attack: The experience of inpatient mental health counselors after a physical attack from a patient.” 2018. Web. 21 Feb 2020.

Vancouver:

Burns EM. When patients attack: The experience of inpatient mental health counselors after a physical attack from a patient. [Internet] [Doctoral dissertation]. University of Tennessee – Knoxville; 2018. [cited 2020 Feb 21]. Available from: https://trace.tennessee.edu/utk_graddiss/5251.

Council of Science Editors:

Burns EM. When patients attack: The experience of inpatient mental health counselors after a physical attack from a patient. [Doctoral Dissertation]. University of Tennessee – Knoxville; 2018. Available from: https://trace.tennessee.edu/utk_graddiss/5251


Queens University

14. Fahim Hashemi, Hana Sadat. A Hybrid Approach to Detect Tabnabbing Attacks .

Degree: Computing, 2014, Queens University

 Phishing is one of the most prevalent types of modern attacks, costing significant financial losses to enterprises and users each day. Despite the emergence of… (more)

Subjects/Keywords: Tabnabbing; Attack Detection; Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fahim Hashemi, H. S. (2014). A Hybrid Approach to Detect Tabnabbing Attacks . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fahim Hashemi, Hana Sadat. “A Hybrid Approach to Detect Tabnabbing Attacks .” 2014. Thesis, Queens University. Accessed February 21, 2020. http://hdl.handle.net/1974/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fahim Hashemi, Hana Sadat. “A Hybrid Approach to Detect Tabnabbing Attacks .” 2014. Web. 21 Feb 2020.

Vancouver:

Fahim Hashemi HS. A Hybrid Approach to Detect Tabnabbing Attacks . [Internet] [Thesis]. Queens University; 2014. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1974/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fahim Hashemi HS. A Hybrid Approach to Detect Tabnabbing Attacks . [Thesis]. Queens University; 2014. Available from: http://hdl.handle.net/1974/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Syracuse University

15. Luo, Tongbo. ATTACKS AND COUNTERMEASURES FOR WEBVIEW ON MOBILE SYSTEMS.

Degree: PhD, Electrical Engineering and Computer Science, 2014, Syracuse University

  ABSTRACT All the mainstream mobile operating systems provide a web container, called ``WebView''. This Web-based interface can be included as part of the mobile… (more)

Subjects/Keywords: Android; Attack; Security; WebView; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, T. (2014). ATTACKS AND COUNTERMEASURES FOR WEBVIEW ON MOBILE SYSTEMS. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/81

Chicago Manual of Style (16th Edition):

Luo, Tongbo. “ATTACKS AND COUNTERMEASURES FOR WEBVIEW ON MOBILE SYSTEMS.” 2014. Doctoral Dissertation, Syracuse University. Accessed February 21, 2020. https://surface.syr.edu/etd/81.

MLA Handbook (7th Edition):

Luo, Tongbo. “ATTACKS AND COUNTERMEASURES FOR WEBVIEW ON MOBILE SYSTEMS.” 2014. Web. 21 Feb 2020.

Vancouver:

Luo T. ATTACKS AND COUNTERMEASURES FOR WEBVIEW ON MOBILE SYSTEMS. [Internet] [Doctoral dissertation]. Syracuse University; 2014. [cited 2020 Feb 21]. Available from: https://surface.syr.edu/etd/81.

Council of Science Editors:

Luo T. ATTACKS AND COUNTERMEASURES FOR WEBVIEW ON MOBILE SYSTEMS. [Doctoral Dissertation]. Syracuse University; 2014. Available from: https://surface.syr.edu/etd/81


Brunel University

16. Shanmugam, Karthikeyan. Validating digital forensic evidence.

Degree: PhD, 2011, Brunel University

 This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the… (more)

Subjects/Keywords: 363.25; Security; Hacking; Computer vulnerability; Virus attack; Trojan horse attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shanmugam, K. (2011). Validating digital forensic evidence. (Doctoral Dissertation). Brunel University. Retrieved from http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883

Chicago Manual of Style (16th Edition):

Shanmugam, Karthikeyan. “Validating digital forensic evidence.” 2011. Doctoral Dissertation, Brunel University. Accessed February 21, 2020. http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883.

MLA Handbook (7th Edition):

Shanmugam, Karthikeyan. “Validating digital forensic evidence.” 2011. Web. 21 Feb 2020.

Vancouver:

Shanmugam K. Validating digital forensic evidence. [Internet] [Doctoral dissertation]. Brunel University; 2011. [cited 2020 Feb 21]. Available from: http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883.

Council of Science Editors:

Shanmugam K. Validating digital forensic evidence. [Doctoral Dissertation]. Brunel University; 2011. Available from: http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883


Texas A&M University

17. Wilcox, Eric Scott. A Relay Prevention Technique for Near Field Communication.

Degree: 2015, Texas A&M University

 The use of near field communication (NFC) has expanded as rapidly as Bluetooth or similar technologies and shows no signs of slowing down. It is… (more)

Subjects/Keywords: NFC; Near Field Communication; Relay Attack; Relay Attack Prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilcox, E. S. (2015). A Relay Prevention Technique for Near Field Communication. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/155758

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wilcox, Eric Scott. “A Relay Prevention Technique for Near Field Communication.” 2015. Thesis, Texas A&M University. Accessed February 21, 2020. http://hdl.handle.net/1969.1/155758.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wilcox, Eric Scott. “A Relay Prevention Technique for Near Field Communication.” 2015. Web. 21 Feb 2020.

Vancouver:

Wilcox ES. A Relay Prevention Technique for Near Field Communication. [Internet] [Thesis]. Texas A&M University; 2015. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1969.1/155758.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wilcox ES. A Relay Prevention Technique for Near Field Communication. [Thesis]. Texas A&M University; 2015. Available from: http://hdl.handle.net/1969.1/155758

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

18. Moskal, Stephen Frank. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.

Degree: MS, Computer Engineering, 2016, Rochester Institute of Technology

  Computer networks are becoming more complex as the reliance on these network increases in this era of exponential technological growth. This makes the potential… (more)

Subjects/Keywords: Cyber attack behavior; Cyber attack modeling; Cyber threat analytics; Simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moskal, S. F. (2016). Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9216

Chicago Manual of Style (16th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed February 21, 2020. https://scholarworks.rit.edu/theses/9216.

MLA Handbook (7th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Web. 21 Feb 2020.

Vancouver:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2020 Feb 21]. Available from: https://scholarworks.rit.edu/theses/9216.

Council of Science Editors:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9216


RMIT University

19. Medos, S. Fault attacks and countermeasures for elliptic curve cryptosystems.

Degree: 2009, RMIT University

 In this thesis we have developed a new algorithmic countermeasures that protect elliptic curve computation by protecting computation of the finite binary extension field, against… (more)

Subjects/Keywords: Fields of Research; Side channel attack; fault attack; elliptic curve cryptosystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Medos, S. (2009). Fault attacks and countermeasures for elliptic curve cryptosystems. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:160069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Medos, S. “Fault attacks and countermeasures for elliptic curve cryptosystems.” 2009. Thesis, RMIT University. Accessed February 21, 2020. http://researchbank.rmit.edu.au/view/rmit:160069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Medos, S. “Fault attacks and countermeasures for elliptic curve cryptosystems.” 2009. Web. 21 Feb 2020.

Vancouver:

Medos S. Fault attacks and countermeasures for elliptic curve cryptosystems. [Internet] [Thesis]. RMIT University; 2009. [cited 2020 Feb 21]. Available from: http://researchbank.rmit.edu.au/view/rmit:160069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Medos S. Fault attacks and countermeasures for elliptic curve cryptosystems. [Thesis]. RMIT University; 2009. Available from: http://researchbank.rmit.edu.au/view/rmit:160069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

20. Saglam, Mehmet. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.

Degree: MS, Computer Science, 2014, Virginia Tech

 Power grids are regarded as significant military targets and have been targeted with kinetic attacks in previous military operations. These attacks resulted in significant levels… (more)

Subjects/Keywords: Cyber Warfare; Power Grid; Cyber Attack; Kinetic Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saglam, M. (2014). A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49435

Chicago Manual of Style (16th Edition):

Saglam, Mehmet. “A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.” 2014. Masters Thesis, Virginia Tech. Accessed February 21, 2020. http://hdl.handle.net/10919/49435.

MLA Handbook (7th Edition):

Saglam, Mehmet. “A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.” 2014. Web. 21 Feb 2020.

Vancouver:

Saglam M. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10919/49435.

Council of Science Editors:

Saglam M. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49435


University of South Carolina

21. Epelle, Gabrielle. The Effect of Medicaid Expansion on Heart Attack Mortality.

Degree: Degree ofMA, Moore School of Business, 2018, University of South Carolina

  The aim of this study is to estimate the effect of Medicaid expansion on the number of deaths from heart attacks using a difference… (more)

Subjects/Keywords: Economics; heart attack; Medicaid expansion; heart attack mortality

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Epelle, G. (2018). The Effect of Medicaid Expansion on Heart Attack Mortality. (Thesis). University of South Carolina. Retrieved from https://scholarcommons.sc.edu/etd/5046

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Epelle, Gabrielle. “The Effect of Medicaid Expansion on Heart Attack Mortality.” 2018. Thesis, University of South Carolina. Accessed February 21, 2020. https://scholarcommons.sc.edu/etd/5046.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Epelle, Gabrielle. “The Effect of Medicaid Expansion on Heart Attack Mortality.” 2018. Web. 21 Feb 2020.

Vancouver:

Epelle G. The Effect of Medicaid Expansion on Heart Attack Mortality. [Internet] [Thesis]. University of South Carolina; 2018. [cited 2020 Feb 21]. Available from: https://scholarcommons.sc.edu/etd/5046.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Epelle G. The Effect of Medicaid Expansion on Heart Attack Mortality. [Thesis]. University of South Carolina; 2018. Available from: https://scholarcommons.sc.edu/etd/5046

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

22. Zhu, Y. Attack pattern ontology: A common language for attack information sharing between organizations :.

Degree: 2015, Delft University of Technology

 Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks.… (more)

Subjects/Keywords: cyber security; information sharing; cyber attack; attack pattern; ontology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2015). Attack pattern ontology: A common language for attack information sharing between organizations :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46

Chicago Manual of Style (16th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Masters Thesis, Delft University of Technology. Accessed February 21, 2020. http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

MLA Handbook (7th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Web. 21 Feb 2020.

Vancouver:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2020 Feb 21]. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

Council of Science Editors:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46


University of Waterloo

23. Liao, Haohao. Electromagnetic Fault Injection On Two Microcontrollers: Methodology, Fault Model, Attack and Countermeasures.

Degree: 2020, University of Waterloo

 Cryptographic algorithms are being applied to various kinds of embedded devices such as credit card, smart phone, etc. Those cryptographic algorithms are designed to be… (more)

Subjects/Keywords: security; computer hardware; hardware security; side channel attack; fault injection attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liao, H. (2020). Electromagnetic Fault Injection On Two Microcontrollers: Methodology, Fault Model, Attack and Countermeasures. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/15639

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liao, Haohao. “Electromagnetic Fault Injection On Two Microcontrollers: Methodology, Fault Model, Attack and Countermeasures.” 2020. Thesis, University of Waterloo. Accessed February 21, 2020. http://hdl.handle.net/10012/15639.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liao, Haohao. “Electromagnetic Fault Injection On Two Microcontrollers: Methodology, Fault Model, Attack and Countermeasures.” 2020. Web. 21 Feb 2020.

Vancouver:

Liao H. Electromagnetic Fault Injection On Two Microcontrollers: Methodology, Fault Model, Attack and Countermeasures. [Internet] [Thesis]. University of Waterloo; 2020. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10012/15639.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liao H. Electromagnetic Fault Injection On Two Microcontrollers: Methodology, Fault Model, Attack and Countermeasures. [Thesis]. University of Waterloo; 2020. Available from: http://hdl.handle.net/10012/15639

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Andersen, Jonas Skog. Denial-of-service attack : A realistic implementation of a DoS attack.

Degree: Faculty of Science & Engineering, 2015, Linköping UniversityLinköping University

  This report describes some of the most well known denial of service attacks (DoS-attacks). This will be done in the first part of the… (more)

Subjects/Keywords: DOS; DDOS; Attack; Denial of Service; Distributed denial of service attack; HTTP POST; HTTP POST attack; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andersen, J. S. (2015). Denial-of-service attack : A realistic implementation of a DoS attack. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Thesis, Linköping UniversityLinköping University. Accessed February 21, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andersen, Jonas Skog. “Denial-of-service attack : A realistic implementation of a DoS attack.” 2015. Web. 21 Feb 2020.

Vancouver:

Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2020 Feb 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andersen JS. Denial-of-service attack : A realistic implementation of a DoS attack. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Aguessy, François-Xavier. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.

Degree: Docteur es, Informatique, 2016, Evry, Institut national des télécommunications

Les systèmes d'information sont une cible de plus en plus attractive pour les attaquants. Dans cette thèse de doctorat, nous construisons une méthodologie complète d'analyse… (more)

Subjects/Keywords: Graphes d'attaque; Évaluation dynamique de risque; Modélisation d'attaques; Modèles d’attaques bayésiens; Attack graph; Dynamic risk assessment; Attack modelling; Bayesian attack model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aguessy, F. (2016). Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2016TELE0016

Chicago Manual of Style (16th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed February 21, 2020. http://www.theses.fr/2016TELE0016.

MLA Handbook (7th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Web. 21 Feb 2020.

Vancouver:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2016. [cited 2020 Feb 21]. Available from: http://www.theses.fr/2016TELE0016.

Council of Science Editors:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2016. Available from: http://www.theses.fr/2016TELE0016

26. Bruneau, Nicolas. Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé : Multivariate multitarget high order side-channel attacks.

Degree: Docteur es, Electronique et communications, 2017, Paris, ENST

Les analyses par canaux auxiliaires exploitent les fuites physiques des systèmes embarqués. Ces attaques représentent une réelle menace; c’est pourquoi différentes contre-mesures ont été développées.… (more)

Subjects/Keywords: Attaque par canal auxiliaire; Schéma de masquage; Attaque multivariée; Attaque optimale; Side-channel attack; Masking scheme; Multivariate attack; Optimal attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bruneau, N. (2017). Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé : Multivariate multitarget high order side-channel attacks. (Doctoral Dissertation). Paris, ENST. Retrieved from http://www.theses.fr/2017ENST0025

Chicago Manual of Style (16th Edition):

Bruneau, Nicolas. “Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé : Multivariate multitarget high order side-channel attacks.” 2017. Doctoral Dissertation, Paris, ENST. Accessed February 21, 2020. http://www.theses.fr/2017ENST0025.

MLA Handbook (7th Edition):

Bruneau, Nicolas. “Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé : Multivariate multitarget high order side-channel attacks.” 2017. Web. 21 Feb 2020.

Vancouver:

Bruneau N. Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé : Multivariate multitarget high order side-channel attacks. [Internet] [Doctoral dissertation]. Paris, ENST; 2017. [cited 2020 Feb 21]. Available from: http://www.theses.fr/2017ENST0025.

Council of Science Editors:

Bruneau N. Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé : Multivariate multitarget high order side-channel attacks. [Doctoral Dissertation]. Paris, ENST; 2017. Available from: http://www.theses.fr/2017ENST0025


Coventry University

27. Al-Rajaibi, Hajar M. The role of caspase inhibitors in protecting the myocardium from ischemia reperfusion injury.

Degree: PhD, 2008, Coventry University

 Rapid restoration of blood flow to ischemic myocardium is essential, however it causes further injury called reperfusion injury. Apoptosis contributes significantly to cardiomyocyte cell death… (more)

Subjects/Keywords: 616.1; Heart attack, heart injury, myocardium, infarction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Rajaibi, H. M. (2008). The role of caspase inhibitors in protecting the myocardium from ischemia reperfusion injury. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/7c1324d7-8e28-3a1c-009c-fc7aa0d874f8/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.486898

Chicago Manual of Style (16th Edition):

Al-Rajaibi, Hajar M. “The role of caspase inhibitors in protecting the myocardium from ischemia reperfusion injury.” 2008. Doctoral Dissertation, Coventry University. Accessed February 21, 2020. http://curve.coventry.ac.uk/open/items/7c1324d7-8e28-3a1c-009c-fc7aa0d874f8/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.486898.

MLA Handbook (7th Edition):

Al-Rajaibi, Hajar M. “The role of caspase inhibitors in protecting the myocardium from ischemia reperfusion injury.” 2008. Web. 21 Feb 2020.

Vancouver:

Al-Rajaibi HM. The role of caspase inhibitors in protecting the myocardium from ischemia reperfusion injury. [Internet] [Doctoral dissertation]. Coventry University; 2008. [cited 2020 Feb 21]. Available from: http://curve.coventry.ac.uk/open/items/7c1324d7-8e28-3a1c-009c-fc7aa0d874f8/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.486898.

Council of Science Editors:

Al-Rajaibi HM. The role of caspase inhibitors in protecting the myocardium from ischemia reperfusion injury. [Doctoral Dissertation]. Coventry University; 2008. Available from: http://curve.coventry.ac.uk/open/items/7c1324d7-8e28-3a1c-009c-fc7aa0d874f8/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.486898


University of Alberta

28. Sivakumar, Leka. Cognitive Impairment following Transient Ischemic Attack and Minor Stroke.

Degree: MS, Centre for Neuroscience, 2013, University of Alberta

 Background: Ischemic stroke is associated with cognitive impairment, but the acute cognitive sequelae of transient ischemic attack (TIA) and minor stroke is unknown. We hypothesized… (more)

Subjects/Keywords: cognitive impairment; minor stroke; transient ischemic attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sivakumar, L. (2013). Cognitive Impairment following Transient Ischemic Attack and Minor Stroke. (Masters Thesis). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/rr171x30t

Chicago Manual of Style (16th Edition):

Sivakumar, Leka. “Cognitive Impairment following Transient Ischemic Attack and Minor Stroke.” 2013. Masters Thesis, University of Alberta. Accessed February 21, 2020. https://era.library.ualberta.ca/files/rr171x30t.

MLA Handbook (7th Edition):

Sivakumar, Leka. “Cognitive Impairment following Transient Ischemic Attack and Minor Stroke.” 2013. Web. 21 Feb 2020.

Vancouver:

Sivakumar L. Cognitive Impairment following Transient Ischemic Attack and Minor Stroke. [Internet] [Masters thesis]. University of Alberta; 2013. [cited 2020 Feb 21]. Available from: https://era.library.ualberta.ca/files/rr171x30t.

Council of Science Editors:

Sivakumar L. Cognitive Impairment following Transient Ischemic Attack and Minor Stroke. [Masters Thesis]. University of Alberta; 2013. Available from: https://era.library.ualberta.ca/files/rr171x30t


Oregon State University

29. Adem, Nadia. Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks.

Degree: PhD, Electrical and Computer Engineering, 2016, Oregon State University

 Cognitive radio technology emerges as a promising solution for overcoming shortage and inefficient use of spectrum resources. In cognitive radio networks, secondary users, which are… (more)

Subjects/Keywords: Jamming Attack Resiliency; Cognitive radio networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adem, N. (2016). Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/59838

Chicago Manual of Style (16th Edition):

Adem, Nadia. “Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks.” 2016. Doctoral Dissertation, Oregon State University. Accessed February 21, 2020. http://hdl.handle.net/1957/59838.

MLA Handbook (7th Edition):

Adem, Nadia. “Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks.” 2016. Web. 21 Feb 2020.

Vancouver:

Adem N. Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks. [Internet] [Doctoral dissertation]. Oregon State University; 2016. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1957/59838.

Council of Science Editors:

Adem N. Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks. [Doctoral Dissertation]. Oregon State University; 2016. Available from: http://hdl.handle.net/1957/59838


NSYSU

30. Huang, Yu-Zhi. Detecting Attack Sequence in Cloud Based on Hidden Markov Model.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Cloud computing provides business new working paradigm with the benefit of cost reduce and resource sharing. Tasks from different users may be performed on the… (more)

Subjects/Keywords: Cloud Computing; Hidden Markov Model; Attack Plan

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2012). Detecting Attack Sequence in Cloud Based on Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed February 21, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Web. 21 Feb 2020.

Vancouver:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Feb 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [33]

.