Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Country:

You searched for subject:( security). Showing records 1 – 30 of 504 total matches.

[1] [2] [3] [4] [5] … [17]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Cranfield University

1. Lewis, P S. The global vulnerability discovery and disclosure system: a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system: a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665

Chicago Manual of Style (16th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed October 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

MLA Handbook (7th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Web. 17 Oct 2019.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Oct 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665


Cranfield University

2. Humphrey, M. Identifying the critical success factors to improve information security incident reporting.

Degree: 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Thesis). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Thesis, Cranfield University. Accessed October 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 17 Oct 2019.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Thesis]. Cranfield University; 2017. [cited 2019 Oct 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Thesis]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cranfield University

3. Humphrey, Mike. Identifying the critical success factors to improve information security incident reporting.

Degree: PhD, 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627

Chicago Manual of Style (16th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Doctoral Dissertation, Cranfield University. Accessed October 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

MLA Handbook (7th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 17 Oct 2019.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Oct 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627


University of Central Lancashire

4. Usman, Ahmad Kabir. An investigation into the critical success factors for e-banking frauds prevention in Nigeria.

Degree: PhD, 2018, University of Central Lancashire

 E-Banking frauds is an issue experienced globally and continues to prove costly to both banks and customers. Frauds in e-banking services occur due to various… (more)

Subjects/Keywords: Security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Usman, A. K. (2018). An investigation into the critical success factors for e-banking frauds prevention in Nigeria. (Doctoral Dissertation). University of Central Lancashire. Retrieved from http://clok.uclan.ac.uk/25360/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.762445

Chicago Manual of Style (16th Edition):

Usman, Ahmad Kabir. “An investigation into the critical success factors for e-banking frauds prevention in Nigeria.” 2018. Doctoral Dissertation, University of Central Lancashire. Accessed October 17, 2019. http://clok.uclan.ac.uk/25360/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.762445.

MLA Handbook (7th Edition):

Usman, Ahmad Kabir. “An investigation into the critical success factors for e-banking frauds prevention in Nigeria.” 2018. Web. 17 Oct 2019.

Vancouver:

Usman AK. An investigation into the critical success factors for e-banking frauds prevention in Nigeria. [Internet] [Doctoral dissertation]. University of Central Lancashire; 2018. [cited 2019 Oct 17]. Available from: http://clok.uclan.ac.uk/25360/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.762445.

Council of Science Editors:

Usman AK. An investigation into the critical success factors for e-banking frauds prevention in Nigeria. [Doctoral Dissertation]. University of Central Lancashire; 2018. Available from: http://clok.uclan.ac.uk/25360/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.762445


Coventry University

5. Nagarle Shivashankarappa, A. Novel framework to support information security audit in virtual environment.

Degree: PhD, 2013, Coventry University

 Over the years, the focus of information security has evolved from technical issue to business issue. Heightened competition from globalization compounded by emerging technologies such… (more)

Subjects/Keywords: 005.8; Computer security; Internet; Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nagarle Shivashankarappa, A. (2013). Novel framework to support information security audit in virtual environment. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889

Chicago Manual of Style (16th Edition):

Nagarle Shivashankarappa, A. “Novel framework to support information security audit in virtual environment.” 2013. Doctoral Dissertation, Coventry University. Accessed October 17, 2019. http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889.

MLA Handbook (7th Edition):

Nagarle Shivashankarappa, A. “Novel framework to support information security audit in virtual environment.” 2013. Web. 17 Oct 2019.

Vancouver:

Nagarle Shivashankarappa A. Novel framework to support information security audit in virtual environment. [Internet] [Doctoral dissertation]. Coventry University; 2013. [cited 2019 Oct 17]. Available from: http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889.

Council of Science Editors:

Nagarle Shivashankarappa A. Novel framework to support information security audit in virtual environment. [Doctoral Dissertation]. Coventry University; 2013. Available from: http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889


University of Plymouth

6. Zaaba, Zarul Fitri. Enhancing usability using automated security interface adaptation (ASIA).

Degree: PhD, 2014, University of Plymouth

 Many users are now significantly dependent upon computer application. Whilst many aspects are now used very successfully, an area in which usability difficulties continue to… (more)

Subjects/Keywords: 005.8; security and usability; usable security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaaba, Z. F. (2014). Enhancing usability using automated security interface adaptation (ASIA). (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3025

Chicago Manual of Style (16th Edition):

Zaaba, Zarul Fitri. “Enhancing usability using automated security interface adaptation (ASIA).” 2014. Doctoral Dissertation, University of Plymouth. Accessed October 17, 2019. http://hdl.handle.net/10026.1/3025.

MLA Handbook (7th Edition):

Zaaba, Zarul Fitri. “Enhancing usability using automated security interface adaptation (ASIA).” 2014. Web. 17 Oct 2019.

Vancouver:

Zaaba ZF. Enhancing usability using automated security interface adaptation (ASIA). [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10026.1/3025.

Council of Science Editors:

Zaaba ZF. Enhancing usability using automated security interface adaptation (ASIA). [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/3025


University of Plymouth

7. Talib, Shuhaili. Personalising information security education.

Degree: PhD, 2014, University of Plymouth

 Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal… (more)

Subjects/Keywords: 005.8; Information security awareness; Information security education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Talib, S. (2014). Personalising information security education. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/2896

Chicago Manual of Style (16th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Doctoral Dissertation, University of Plymouth. Accessed October 17, 2019. http://hdl.handle.net/10026.1/2896.

MLA Handbook (7th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Web. 17 Oct 2019.

Vancouver:

Talib S. Personalising information security education. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10026.1/2896.

Council of Science Editors:

Talib S. Personalising information security education. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/2896


Coventry University

8. Subaihi, B. A. Social security contribution evasion : an evaluation from the perspective of former contribution evaders : Jordan - case study.

Degree: PhD, 2013, Coventry University

 Despite the critical nature of the Social Security Contribution Evasion (SSCE) phenomenon, relatively few studies have investigated and analysed the problem. The vast majority of… (more)

Subjects/Keywords: 368.4; Social security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subaihi, B. A. (2013). Social security contribution evasion : an evaluation from the perspective of former contribution evaders : Jordan - case study. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/9dea426f-97a5-436d-abb8-99a5ff1173a0/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637495

Chicago Manual of Style (16th Edition):

Subaihi, B A. “Social security contribution evasion : an evaluation from the perspective of former contribution evaders : Jordan - case study.” 2013. Doctoral Dissertation, Coventry University. Accessed October 17, 2019. http://curve.coventry.ac.uk/open/items/9dea426f-97a5-436d-abb8-99a5ff1173a0/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637495.

MLA Handbook (7th Edition):

Subaihi, B A. “Social security contribution evasion : an evaluation from the perspective of former contribution evaders : Jordan - case study.” 2013. Web. 17 Oct 2019.

Vancouver:

Subaihi BA. Social security contribution evasion : an evaluation from the perspective of former contribution evaders : Jordan - case study. [Internet] [Doctoral dissertation]. Coventry University; 2013. [cited 2019 Oct 17]. Available from: http://curve.coventry.ac.uk/open/items/9dea426f-97a5-436d-abb8-99a5ff1173a0/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637495.

Council of Science Editors:

Subaihi BA. Social security contribution evasion : an evaluation from the perspective of former contribution evaders : Jordan - case study. [Doctoral Dissertation]. Coventry University; 2013. Available from: http://curve.coventry.ac.uk/open/items/9dea426f-97a5-436d-abb8-99a5ff1173a0/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637495


Coventry University

9. Chapsos, I. The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study.

Degree: PhD, 2014, Coventry University

 This thesis examines the expansion of private maritime security provision, its regulation and implications for national and global security. The main research question addressed is:… (more)

Subjects/Keywords: 387.5; maritime security, privatisation of security, private security companies, piracy; Maritime piracy; Private security services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chapsos, I. (2014). The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928

Chicago Manual of Style (16th Edition):

Chapsos, I. “The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study.” 2014. Doctoral Dissertation, Coventry University. Accessed October 17, 2019. http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928.

MLA Handbook (7th Edition):

Chapsos, I. “The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study.” 2014. Web. 17 Oct 2019.

Vancouver:

Chapsos I. The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study. [Internet] [Doctoral dissertation]. Coventry University; 2014. [cited 2019 Oct 17]. Available from: http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928.

Council of Science Editors:

Chapsos I. The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study. [Doctoral Dissertation]. Coventry University; 2014. Available from: http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928


University of Aberdeen

10. Le Noan, Rachel. The strategic use of diaspora politics in Russia's national security policy : evidence from the Commonwealth of Independent States, 1991-2010.

Degree: PhD, 2012, University of Aberdeen

 This thesis examines Russia’s national security policies and objectives by strictly focusing on the role of Russia and the strategic use of diaspora politics in… (more)

Subjects/Keywords: 320; National security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Le Noan, R. (2012). The strategic use of diaspora politics in Russia's national security policy : evidence from the Commonwealth of Independent States, 1991-2010. (Doctoral Dissertation). University of Aberdeen. Retrieved from http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=196198 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577675

Chicago Manual of Style (16th Edition):

Le Noan, Rachel. “The strategic use of diaspora politics in Russia's national security policy : evidence from the Commonwealth of Independent States, 1991-2010.” 2012. Doctoral Dissertation, University of Aberdeen. Accessed October 17, 2019. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=196198 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577675.

MLA Handbook (7th Edition):

Le Noan, Rachel. “The strategic use of diaspora politics in Russia's national security policy : evidence from the Commonwealth of Independent States, 1991-2010.” 2012. Web. 17 Oct 2019.

Vancouver:

Le Noan R. The strategic use of diaspora politics in Russia's national security policy : evidence from the Commonwealth of Independent States, 1991-2010. [Internet] [Doctoral dissertation]. University of Aberdeen; 2012. [cited 2019 Oct 17]. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=196198 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577675.

Council of Science Editors:

Le Noan R. The strategic use of diaspora politics in Russia's national security policy : evidence from the Commonwealth of Independent States, 1991-2010. [Doctoral Dissertation]. University of Aberdeen; 2012. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=196198 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.577675


University of Aberdeen

11. Taylor, Barry. Identitying vulnerabilities and controls in complex composite security architectures.

Degree: PhD, 2014, University of Aberdeen

 The ability to design and reason about architectures (here understood as organisations which are designed according to hierarchies of roles and those processes that link… (more)

Subjects/Keywords: 004; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taylor, B. (2014). Identitying vulnerabilities and controls in complex composite security architectures. (Doctoral Dissertation). University of Aberdeen. Retrieved from http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105

Chicago Manual of Style (16th Edition):

Taylor, Barry. “Identitying vulnerabilities and controls in complex composite security architectures.” 2014. Doctoral Dissertation, University of Aberdeen. Accessed October 17, 2019. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105.

MLA Handbook (7th Edition):

Taylor, Barry. “Identitying vulnerabilities and controls in complex composite security architectures.” 2014. Web. 17 Oct 2019.

Vancouver:

Taylor B. Identitying vulnerabilities and controls in complex composite security architectures. [Internet] [Doctoral dissertation]. University of Aberdeen; 2014. [cited 2019 Oct 17]. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105.

Council of Science Editors:

Taylor B. Identitying vulnerabilities and controls in complex composite security architectures. [Doctoral Dissertation]. University of Aberdeen; 2014. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105

12. Puttaroo, Mohammad Ally Rehaz. A behavioural study in runtime analysis environments and drive-by download attacks.

Degree: PhD, 2017, University of West London

 In the information age, the growth in availability of both technology and exploit kits have continuously contributed in a large volume of websites being compromised… (more)

Subjects/Keywords: Cyber security; Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puttaroo, M. A. R. (2017). A behavioural study in runtime analysis environments and drive-by download attacks. (Doctoral Dissertation). University of West London. Retrieved from https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802

Chicago Manual of Style (16th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Doctoral Dissertation, University of West London. Accessed October 17, 2019. https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

MLA Handbook (7th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Web. 17 Oct 2019.

Vancouver:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Internet] [Doctoral dissertation]. University of West London; 2017. [cited 2019 Oct 17]. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

Council of Science Editors:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Doctoral Dissertation]. University of West London; 2017. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802


University of Manchester

13. Taha, Hasan. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.

Degree: 2018, University of Manchester

Security and power consumption are the first critical concerns in many wireless networks as part of the fast progress in a variety of applications over… (more)

Subjects/Keywords: Physical Layer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, H. (2018). PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845

Chicago Manual of Style (16th Edition):

Taha, Hasan. “PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.” 2018. Doctoral Dissertation, University of Manchester. Accessed October 17, 2019. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845.

MLA Handbook (7th Edition):

Taha, Hasan. “PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS.” 2018. Web. 17 Oct 2019.

Vancouver:

Taha H. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2019 Oct 17]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845.

Council of Science Editors:

Taha H. PHYSICAL LAYER BASED SECRET KEY EXCHANGE AND AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS. [Doctoral Dissertation]. University of Manchester; 2018. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:313845


Cranfield University

14. Lewis, Paul Simon. The global vulnerability discovery and disclosure system : a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: 005.8; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system : a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729

Chicago Manual of Style (16th Edition):

Lewis, Paul Simon. “The global vulnerability discovery and disclosure system : a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed October 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729.

MLA Handbook (7th Edition):

Lewis, Paul Simon. “The global vulnerability discovery and disclosure system : a thematic system dynamics approach.” 2017. Web. 17 Oct 2019.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system : a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Oct 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system : a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729


University of Manchester

15. Taha, Hasan. Physical layer based secret key exchange and authentication techniques for wireless networks.

Degree: PhD, 2018, University of Manchester

Security and power consumption are the first critical concerns in many wireless networks as part of the fast progress in a variety of applications over… (more)

Subjects/Keywords: Physical Layer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, H. (2018). Physical layer based secret key exchange and authentication techniques for wireless networks. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446

Chicago Manual of Style (16th Edition):

Taha, Hasan. “Physical layer based secret key exchange and authentication techniques for wireless networks.” 2018. Doctoral Dissertation, University of Manchester. Accessed October 17, 2019. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446.

MLA Handbook (7th Edition):

Taha, Hasan. “Physical layer based secret key exchange and authentication techniques for wireless networks.” 2018. Web. 17 Oct 2019.

Vancouver:

Taha H. Physical layer based secret key exchange and authentication techniques for wireless networks. [Internet] [Doctoral dissertation]. University of Manchester; 2018. [cited 2019 Oct 17]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446.

Council of Science Editors:

Taha H. Physical layer based secret key exchange and authentication techniques for wireless networks. [Doctoral Dissertation]. University of Manchester; 2018. Available from: https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-based-secret-key-exchange-and-authentication-techniques-for-wireless-networks(94bd3276-7e3b-4769-bc79-7f460aa5f40a).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.771446


Coventry University

16. Kalutarage, H. K. Effective monitoring of slow suspicious activites on computer networks.

Degree: PhD, 2013, Coventry University

 Slow and suspicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack… (more)

Subjects/Keywords: 005.8; computer security, detection; Computer security; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kalutarage, H. K. (2013). Effective monitoring of slow suspicious activites on computer networks. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964

Chicago Manual of Style (16th Edition):

Kalutarage, H K. “Effective monitoring of slow suspicious activites on computer networks.” 2013. Doctoral Dissertation, Coventry University. Accessed October 17, 2019. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964.

MLA Handbook (7th Edition):

Kalutarage, H K. “Effective monitoring of slow suspicious activites on computer networks.” 2013. Web. 17 Oct 2019.

Vancouver:

Kalutarage HK. Effective monitoring of slow suspicious activites on computer networks. [Internet] [Doctoral dissertation]. Coventry University; 2013. [cited 2019 Oct 17]. Available from: http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964.

Council of Science Editors:

Kalutarage HK. Effective monitoring of slow suspicious activites on computer networks. [Doctoral Dissertation]. Coventry University; 2013. Available from: http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964


University of Oxford

17. Chen, Bangdao. Using human interactive security protocols to secure payments.

Degree: PhD, 2012, University of Oxford

 We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our research by conducting extensive investigations into the payment industry. After interacting… (more)

Subjects/Keywords: 005.82; Computing; Computer security; payment; security; human interactive security protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, B. (2012). Using human interactive security protocols to secure payments. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053

Chicago Manual of Style (16th Edition):

Chen, Bangdao. “Using human interactive security protocols to secure payments.” 2012. Doctoral Dissertation, University of Oxford. Accessed October 17, 2019. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053.

MLA Handbook (7th Edition):

Chen, Bangdao. “Using human interactive security protocols to secure payments.” 2012. Web. 17 Oct 2019.

Vancouver:

Chen B. Using human interactive security protocols to secure payments. [Internet] [Doctoral dissertation]. University of Oxford; 2012. [cited 2019 Oct 17]. Available from: http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053.

Council of Science Editors:

Chen B. Using human interactive security protocols to secure payments. [Doctoral Dissertation]. University of Oxford; 2012. Available from: http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053


Loughborough University

18. Alkahtani, Hend K. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.

Degree: PhD, 2018, Loughborough University

 The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all… (more)

Subjects/Keywords: Information systems; Information security; Security awareness; Saudi Arabian culture; Security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkahtani, H. K. (2018). Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230

Chicago Manual of Style (16th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Doctoral Dissertation, Loughborough University. Accessed October 17, 2019. https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230.

MLA Handbook (7th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Web. 17 Oct 2019.

Vancouver:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2019 Oct 17]. Available from: https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230.

Council of Science Editors:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/28120 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.740230


University of St. Andrews

19. Dario, Diogo M. Human security policies in the Colombian conflict during the Uribe government .

Degree: 2013, University of St. Andrews

 The aim of this dissertation is to analyse the use of narratives informed by the discourse of human security in the context of the Colombian… (more)

Subjects/Keywords: Colombian conflict; Critical security studies; Security in Latin America; Human security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dario, D. M. (2013). Human security policies in the Colombian conflict during the Uribe government . (Thesis). University of St. Andrews. Retrieved from http://hdl.handle.net/10023/4516

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dario, Diogo M. “Human security policies in the Colombian conflict during the Uribe government .” 2013. Thesis, University of St. Andrews. Accessed October 17, 2019. http://hdl.handle.net/10023/4516.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dario, Diogo M. “Human security policies in the Colombian conflict during the Uribe government .” 2013. Web. 17 Oct 2019.

Vancouver:

Dario DM. Human security policies in the Colombian conflict during the Uribe government . [Internet] [Thesis]. University of St. Andrews; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10023/4516.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dario DM. Human security policies in the Colombian conflict during the Uribe government . [Thesis]. University of St. Andrews; 2013. Available from: http://hdl.handle.net/10023/4516

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Loughborough University

20. Alkahtani, Hend K. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.

Degree: PhD, 2018, Loughborough University

 The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all… (more)

Subjects/Keywords: Information systems; Information security; Security awareness; Saudi Arabian culture; Security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkahtani, H. K. (2018). Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/28120

Chicago Manual of Style (16th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Doctoral Dissertation, Loughborough University. Accessed October 17, 2019. http://hdl.handle.net/2134/28120.

MLA Handbook (7th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Web. 17 Oct 2019.

Vancouver:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/2134/28120.

Council of Science Editors:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/28120

21. Korovessis, Peter. Establishing an information security awareness and culture.

Degree: PhD, 2015, University of Plymouth

 In today’s business environment all business operations are enabled by technology. Its always on and connected nature has brought new business possibilities but at the… (more)

Subjects/Keywords: 005.8; information security awareness; information security culture; information security surveys; information security practices; information security toolkit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Korovessis, P. (2015). Establishing an information security awareness and culture. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3836

Chicago Manual of Style (16th Edition):

Korovessis, Peter. “Establishing an information security awareness and culture.” 2015. Doctoral Dissertation, University of Plymouth. Accessed October 17, 2019. http://hdl.handle.net/10026.1/3836.

MLA Handbook (7th Edition):

Korovessis, Peter. “Establishing an information security awareness and culture.” 2015. Web. 17 Oct 2019.

Vancouver:

Korovessis P. Establishing an information security awareness and culture. [Internet] [Doctoral dissertation]. University of Plymouth; 2015. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10026.1/3836.

Council of Science Editors:

Korovessis P. Establishing an information security awareness and culture. [Doctoral Dissertation]. University of Plymouth; 2015. Available from: http://hdl.handle.net/10026.1/3836


Loughborough University

22. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed October 17, 2019. https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 17 Oct 2019.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2019 Oct 17]. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959


Loughborough University

23. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/33541

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed October 17, 2019. http://hdl.handle.net/2134/33541.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 17 Oct 2019.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/2134/33541.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/33541

24. Viduto, Valentina. A risk assessment and optimisation model for minimising network security risk and cost.

Degree: PhD, 2012, University of Bedfordshire

 Network security risk analysis has received great attention within the scientific community, due to the current proliferation of network attacks and threats. Although, considerable effort… (more)

Subjects/Keywords: 005.8; G420 Networks and Communications; network security risk analysis; computer security; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Viduto, V. (2012). A risk assessment and optimisation model for minimising network security risk and cost. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/270440

Chicago Manual of Style (16th Edition):

Viduto, Valentina. “A risk assessment and optimisation model for minimising network security risk and cost.” 2012. Doctoral Dissertation, University of Bedfordshire. Accessed October 17, 2019. http://hdl.handle.net/10547/270440.

MLA Handbook (7th Edition):

Viduto, Valentina. “A risk assessment and optimisation model for minimising network security risk and cost.” 2012. Web. 17 Oct 2019.

Vancouver:

Viduto V. A risk assessment and optimisation model for minimising network security risk and cost. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10547/270440.

Council of Science Editors:

Viduto V. A risk assessment and optimisation model for minimising network security risk and cost. [Doctoral Dissertation]. University of Bedfordshire; 2012. Available from: http://hdl.handle.net/10547/270440


University of Exeter

25. Iles, Andrew Thomas. Security-priming in trauma-exposed individuals : an fMRI study.

Degree: Thesis (D.Clin.Psy.), 2013, University of Exeter

 Research shows a strong association between attentional bias to threat and emotional regulation difficulties, specifically heightened activation of neural areas known to be involved in… (more)

Subjects/Keywords: 616.89; trauma and security-priming; PTSD and security-priming; attachment security-priming and trauma

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Iles, A. T. (2013). Security-priming in trauma-exposed individuals : an fMRI study. (Doctoral Dissertation). University of Exeter. Retrieved from http://hdl.handle.net/10871/13021

Chicago Manual of Style (16th Edition):

Iles, Andrew Thomas. “Security-priming in trauma-exposed individuals : an fMRI study.” 2013. Doctoral Dissertation, University of Exeter. Accessed October 17, 2019. http://hdl.handle.net/10871/13021.

MLA Handbook (7th Edition):

Iles, Andrew Thomas. “Security-priming in trauma-exposed individuals : an fMRI study.” 2013. Web. 17 Oct 2019.

Vancouver:

Iles AT. Security-priming in trauma-exposed individuals : an fMRI study. [Internet] [Doctoral dissertation]. University of Exeter; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10871/13021.

Council of Science Editors:

Iles AT. Security-priming in trauma-exposed individuals : an fMRI study. [Doctoral Dissertation]. University of Exeter; 2013. Available from: http://hdl.handle.net/10871/13021


University of Brighton

26. Argyropoulos, Nikolaos. Designing secure business processes from organisational goal models.

Degree: PhD, 2018, University of Brighton

 Business processes are essential instruments used for the coordination of organisational activities in order to produce value in the form of products and services. Information… (more)

Subjects/Keywords: Information security; goal-oriented security requirements engineering; business process modelling; business process security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Argyropoulos, N. (2018). Designing secure business processes from organisational goal models. (Doctoral Dissertation). University of Brighton. Retrieved from https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754036

Chicago Manual of Style (16th Edition):

Argyropoulos, Nikolaos. “Designing secure business processes from organisational goal models.” 2018. Doctoral Dissertation, University of Brighton. Accessed October 17, 2019. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754036.

MLA Handbook (7th Edition):

Argyropoulos, Nikolaos. “Designing secure business processes from organisational goal models.” 2018. Web. 17 Oct 2019.

Vancouver:

Argyropoulos N. Designing secure business processes from organisational goal models. [Internet] [Doctoral dissertation]. University of Brighton; 2018. [cited 2019 Oct 17]. Available from: https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754036.

Council of Science Editors:

Argyropoulos N. Designing secure business processes from organisational goal models. [Doctoral Dissertation]. University of Brighton; 2018. Available from: https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.754036


University of Plymouth

27. Miloslavskaya, Natalia. Network security intelligence centres for information security incident management.

Degree: PhD, 2019, University of Plymouth

 Intensive IT development has led to qualitative changes in our living, which are driving current information security (IS) trends and require sophisticated structures and adequate… (more)

Subjects/Keywords: Network Security Intelligence Centre; Information Security Incident Management; Security Information and Event Management system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miloslavskaya, N. (2019). Network security intelligence centres for information security incident management. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/14306

Chicago Manual of Style (16th Edition):

Miloslavskaya, Natalia. “Network security intelligence centres for information security incident management.” 2019. Doctoral Dissertation, University of Plymouth. Accessed October 17, 2019. http://hdl.handle.net/10026.1/14306.

MLA Handbook (7th Edition):

Miloslavskaya, Natalia. “Network security intelligence centres for information security incident management.” 2019. Web. 17 Oct 2019.

Vancouver:

Miloslavskaya N. Network security intelligence centres for information security incident management. [Internet] [Doctoral dissertation]. University of Plymouth; 2019. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10026.1/14306.

Council of Science Editors:

Miloslavskaya N. Network security intelligence centres for information security incident management. [Doctoral Dissertation]. University of Plymouth; 2019. Available from: http://hdl.handle.net/10026.1/14306


University of Edinburgh

28. Seaton, Jillian Elizabeth. Touching the void : the museological implications of theft on public art collections.

Degree: PhD, 2014, University of Edinburgh

 Of central importance to this thesis is the way security measures contradict the process through which museums have been seeking to divest themselves of theoretical… (more)

Subjects/Keywords: 069; art theft; museum security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Seaton, J. E. (2014). Touching the void : the museological implications of theft on public art collections. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/9577

Chicago Manual of Style (16th Edition):

Seaton, Jillian Elizabeth. “Touching the void : the museological implications of theft on public art collections.” 2014. Doctoral Dissertation, University of Edinburgh. Accessed October 17, 2019. http://hdl.handle.net/1842/9577.

MLA Handbook (7th Edition):

Seaton, Jillian Elizabeth. “Touching the void : the museological implications of theft on public art collections.” 2014. Web. 17 Oct 2019.

Vancouver:

Seaton JE. Touching the void : the museological implications of theft on public art collections. [Internet] [Doctoral dissertation]. University of Edinburgh; 2014. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1842/9577.

Council of Science Editors:

Seaton JE. Touching the void : the museological implications of theft on public art collections. [Doctoral Dissertation]. University of Edinburgh; 2014. Available from: http://hdl.handle.net/1842/9577


University of Exeter

29. Vieira, Telmo J. Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security.

Degree: PhD, 2009, University of Exeter

 The emergence of the European Union (EU) as an international actor is an important development for Europeans, but also for the international community. The EU… (more)

Subjects/Keywords: 355; Mediterranean Regional Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vieira, T. J. (2009). Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security. (Doctoral Dissertation). University of Exeter. Retrieved from http://hdl.handle.net/10036/67300

Chicago Manual of Style (16th Edition):

Vieira, Telmo J. “Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security.” 2009. Doctoral Dissertation, University of Exeter. Accessed October 17, 2019. http://hdl.handle.net/10036/67300.

MLA Handbook (7th Edition):

Vieira, Telmo J. “Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security.” 2009. Web. 17 Oct 2019.

Vancouver:

Vieira TJ. Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security. [Internet] [Doctoral dissertation]. University of Exeter; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10036/67300.

Council of Science Editors:

Vieira TJ. Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security. [Doctoral Dissertation]. University of Exeter; 2009. Available from: http://hdl.handle.net/10036/67300


University of Edinburgh

30. Georgie, Paul. Forecasting Future Food Security through Agent Based Modelling.

Degree: 2010, University of Edinburgh

 Regardless of what recognition human involvement has played, the consequences of our changing climate will have a negative effect on both agriculture and human well-being.… (more)

Subjects/Keywords: Food Security; Agent Based Modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Georgie, P. (2010). Forecasting Future Food Security through Agent Based Modelling. (Thesis). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/3757

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Georgie, Paul. “Forecasting Future Food Security through Agent Based Modelling.” 2010. Thesis, University of Edinburgh. Accessed October 17, 2019. http://hdl.handle.net/1842/3757.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Georgie, Paul. “Forecasting Future Food Security through Agent Based Modelling.” 2010. Web. 17 Oct 2019.

Vancouver:

Georgie P. Forecasting Future Food Security through Agent Based Modelling. [Internet] [Thesis]. University of Edinburgh; 2010. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1842/3757.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Georgie P. Forecasting Future Food Security through Agent Based Modelling. [Thesis]. University of Edinburgh; 2010. Available from: http://hdl.handle.net/1842/3757

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [17]

.