Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Dept: Computing

You searched for subject:( security). Showing records 1 – 30 of 59 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Universities

Country

▼ Search Limiters


Queens University

1. Hunny, Umme. Orthogonal Security Defect Classification for Secure Software Development .

Degree: Computing, 2012, Queens University

Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than… (more)

Subjects/Keywords: Security defect classification; Software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hunny, U. (2012). Orthogonal Security Defect Classification for Secure Software Development . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Web. 13 Oct 2019.

Vancouver:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Internet] [Thesis]. Queens University; 2012. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Thesis]. Queens University; 2012. Available from: http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

2. Payne, Bryan D. Improving host-based computer security using secure active monitoring and memory analysis.

Degree: PhD, Computing, 2010, Georgia Tech

 Thirty years ago, research in designing operating systems to defeat malicious software was very popular. The primary technique was to design and implement a small… (more)

Subjects/Keywords: Memory analysis; Introspection; Virtualization; Security; Active monitoring; User intent; Computer networks Security measures; Computer security; Intrusion detection systems (Computer security)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Payne, B. D. (2010). Improving host-based computer security using secure active monitoring and memory analysis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/34852

Chicago Manual of Style (16th Edition):

Payne, Bryan D. “Improving host-based computer security using secure active monitoring and memory analysis.” 2010. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/34852.

MLA Handbook (7th Edition):

Payne, Bryan D. “Improving host-based computer security using secure active monitoring and memory analysis.” 2010. Web. 13 Oct 2019.

Vancouver:

Payne BD. Improving host-based computer security using secure active monitoring and memory analysis. [Internet] [Doctoral dissertation]. Georgia Tech; 2010. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/34852.

Council of Science Editors:

Payne BD. Improving host-based computer security using secure active monitoring and memory analysis. [Doctoral Dissertation]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/34852


Queens University

3. Nourijelyani, Mohammad. Taxonomy for JavaScript Attacks .

Degree: Computing, 2014, Queens University

 In the ubiquity era, each user has multiple devices; hence an attractive model is to have applications that execute in a client’s web browser instead… (more)

Subjects/Keywords: Attacks; Security; JavaScript; Taxonomy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nourijelyani, M. (2014). Taxonomy for JavaScript Attacks . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/12622

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nourijelyani, Mohammad. “Taxonomy for JavaScript Attacks .” 2014. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/12622.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nourijelyani, Mohammad. “Taxonomy for JavaScript Attacks .” 2014. Web. 13 Oct 2019.

Vancouver:

Nourijelyani M. Taxonomy for JavaScript Attacks . [Internet] [Thesis]. Queens University; 2014. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/12622.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nourijelyani M. Taxonomy for JavaScript Attacks . [Thesis]. Queens University; 2014. Available from: http://hdl.handle.net/1974/12622

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

4. Barua, Anton. Protecting Browser Extensions from JavaScript Injection Attacks with Runtime Protection and Static Analysis .

Degree: Computing, 2012, Queens University

 With the rapid proliferation of the internet, web browsers have evolved from single-purpose remote document viewers into multifaceted systems for executing dynamic, interactive web applications.… (more)

Subjects/Keywords: Browser; Security; Injection; Extensions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barua, A. (2012). Protecting Browser Extensions from JavaScript Injection Attacks with Runtime Protection and Static Analysis . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/7560

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barua, Anton. “Protecting Browser Extensions from JavaScript Injection Attacks with Runtime Protection and Static Analysis .” 2012. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/7560.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barua, Anton. “Protecting Browser Extensions from JavaScript Injection Attacks with Runtime Protection and Static Analysis .” 2012. Web. 13 Oct 2019.

Vancouver:

Barua A. Protecting Browser Extensions from JavaScript Injection Attacks with Runtime Protection and Static Analysis . [Internet] [Thesis]. Queens University; 2012. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/7560.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barua A. Protecting Browser Extensions from JavaScript Injection Attacks with Runtime Protection and Static Analysis . [Thesis]. Queens University; 2012. Available from: http://hdl.handle.net/1974/7560

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

5. Khan, Muhammad. Embedding Security Monitors in Software Components .

Degree: Computing, 2014, Queens University

 Software can be made more secure by stipulating and integrating security specifications in the development process. However, guaranteeing the correct implementation of these specifications is… (more)

Subjects/Keywords: Requirements; Security; Design; Software Engineering; Monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, M. (2014). Embedding Security Monitors in Software Components . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/12423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Muhammad. “Embedding Security Monitors in Software Components .” 2014. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/12423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Muhammad. “Embedding Security Monitors in Software Components .” 2014. Web. 13 Oct 2019.

Vancouver:

Khan M. Embedding Security Monitors in Software Components . [Internet] [Thesis]. Queens University; 2014. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/12423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan M. Embedding Security Monitors in Software Components . [Thesis]. Queens University; 2014. Available from: http://hdl.handle.net/1974/12423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

6. You, Yonghua. A defense framework for flooding-based DDoS attacks .

Degree: Computing, 2007, Queens University

 Distributed denial of service (DDoS) attacks are widely regarded as a major threat to the Internet. A flooding-based DDoS attack is a very common way… (more)

Subjects/Keywords: Network security; DDoS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

You, Y. (2007). A defense framework for flooding-based DDoS attacks . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/653

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

You, Yonghua. “A defense framework for flooding-based DDoS attacks .” 2007. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/653.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

You, Yonghua. “A defense framework for flooding-based DDoS attacks .” 2007. Web. 13 Oct 2019.

Vancouver:

You Y. A defense framework for flooding-based DDoS attacks . [Internet] [Thesis]. Queens University; 2007. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/653.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

You Y. A defense framework for flooding-based DDoS attacks . [Thesis]. Queens University; 2007. Available from: http://hdl.handle.net/1974/653

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

7. Cash, Charles David. On the security and efficiency of encryption.

Degree: PhD, Computing, 2009, Georgia Tech

 This thesis is concerned with the design and analysis of practical provably-secure encryption schemes. We give several results that include new schemes with attractive tradeoffs… (more)

Subjects/Keywords: Provable security; Encryption; Cryptography; Data encryption (Computer science); Hashing (Computer science); Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cash, C. D. (2009). On the security and efficiency of encryption. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/31733

Chicago Manual of Style (16th Edition):

Cash, Charles David. “On the security and efficiency of encryption.” 2009. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/31733.

MLA Handbook (7th Edition):

Cash, Charles David. “On the security and efficiency of encryption.” 2009. Web. 13 Oct 2019.

Vancouver:

Cash CD. On the security and efficiency of encryption. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/31733.

Council of Science Editors:

Cash CD. On the security and efficiency of encryption. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/31733


Georgia Tech

8. Wei, Jinpeng. Improving operating systems security: two case studies.

Degree: PhD, Computing, 2009, Georgia Tech

 Malicious attacks on computer systems attempt to obtain and maintain illicit control over the victim system. To obtain unauthorized access, they often exploit vulnerabilities in… (more)

Subjects/Keywords: Control flow integrity; Security and protection; Reliability; File systems management; Operating systems (Computers) Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wei, J. (2009). Improving operating systems security: two case studies. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/31849

Chicago Manual of Style (16th Edition):

Wei, Jinpeng. “Improving operating systems security: two case studies.” 2009. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/31849.

MLA Handbook (7th Edition):

Wei, Jinpeng. “Improving operating systems security: two case studies.” 2009. Web. 13 Oct 2019.

Vancouver:

Wei J. Improving operating systems security: two case studies. [Internet] [Doctoral dissertation]. Georgia Tech; 2009. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/31849.

Council of Science Editors:

Wei J. Improving operating systems security: two case studies. [Doctoral Dissertation]. Georgia Tech; 2009. Available from: http://hdl.handle.net/1853/31849


Georgia Tech

9. Singh, Kapil. Designing security policies and frameworks for web applications.

Degree: PhD, Computing, 2011, Georgia Tech

 The new developments behind Web 2.0 have increased the complexity of web systems making the task of securing these systems a challenging problem. As a… (more)

Subjects/Keywords: Security policies; Web security; Web applications; Web 2.0; User-generated content; Social media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singh, K. (2011). Designing security policies and frameworks for web applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/41122

Chicago Manual of Style (16th Edition):

Singh, Kapil. “Designing security policies and frameworks for web applications.” 2011. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/41122.

MLA Handbook (7th Edition):

Singh, Kapil. “Designing security policies and frameworks for web applications.” 2011. Web. 13 Oct 2019.

Vancouver:

Singh K. Designing security policies and frameworks for web applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2011. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/41122.

Council of Science Editors:

Singh K. Designing security policies and frameworks for web applications. [Doctoral Dissertation]. Georgia Tech; 2011. Available from: http://hdl.handle.net/1853/41122


Georgia Tech

10. Nayak, Ankur Kumar. Flexible access control for campus and enterprise networks.

Degree: MS, Computing, 2010, Georgia Tech

 We consider the problem of designing enterprise network security systems which are easy to manage, robust and flexible. This problem is challenging. Today, most approaches… (more)

Subjects/Keywords: Access control; Security; Enterprise networks; Programmable networks; Computer networks Security measures; Computer networks Management; Computer networks; Local area networks (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nayak, A. K. (2010). Flexible access control for campus and enterprise networks. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33813

Chicago Manual of Style (16th Edition):

Nayak, Ankur Kumar. “Flexible access control for campus and enterprise networks.” 2010. Masters Thesis, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/33813.

MLA Handbook (7th Edition):

Nayak, Ankur Kumar. “Flexible access control for campus and enterprise networks.” 2010. Web. 13 Oct 2019.

Vancouver:

Nayak AK. Flexible access control for campus and enterprise networks. [Internet] [Masters thesis]. Georgia Tech; 2010. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/33813.

Council of Science Editors:

Nayak AK. Flexible access control for campus and enterprise networks. [Masters Thesis]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33813


Queens University

11. Iqbal, Md Shahrear. Towards A Security Framework for Smartphone Operating Systems .

Degree: Computing, Queens University

 Smartphones have become an integral part of our daily lives that offer a multitude of features in a small form factor. Users store sensitive personal… (more)

Subjects/Keywords: Smartphone Security; Operating System Security; Anti-Malware Framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Iqbal, M. S. (n.d.). Towards A Security Framework for Smartphone Operating Systems . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/23774

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Iqbal, Md Shahrear. “Towards A Security Framework for Smartphone Operating Systems .” Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/23774.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Iqbal, Md Shahrear. “Towards A Security Framework for Smartphone Operating Systems .” Web. 13 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Iqbal MS. Towards A Security Framework for Smartphone Operating Systems . [Internet] [Thesis]. Queens University; [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/23774.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Iqbal MS. Towards A Security Framework for Smartphone Operating Systems . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/23774

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Queens University

12. Alharkan, Turki. IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS .

Degree: Computing, 2013, Queens University

 In a public cloud computing environment, consumers cannot always just depend on the cloud provider’s security infrastructure. They may need to monitor and protect their… (more)

Subjects/Keywords: Intrusion Detection System; IDSaaS; Cloud Computing; Computer Science; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alharkan, T. (2013). IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/7740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alharkan, Turki. “IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS .” 2013. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/7740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alharkan, Turki. “IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS .” 2013. Web. 13 Oct 2019.

Vancouver:

Alharkan T. IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS . [Internet] [Thesis]. Queens University; 2013. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/7740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alharkan T. IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS . [Thesis]. Queens University; 2013. Available from: http://hdl.handle.net/1974/7740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

13. Godfrey, Michael. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .

Degree: Computing, 2013, Queens University

 As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage… (more)

Subjects/Keywords: CPU Cache; Server Side Defense; Cloud Computing; Security; Side Channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Godfrey, M. (2013). On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/8320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Godfrey, Michael. “On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .” 2013. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/8320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Godfrey, Michael. “On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .” 2013. Web. 13 Oct 2019.

Vancouver:

Godfrey M. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . [Internet] [Thesis]. Queens University; 2013. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/8320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Godfrey M. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . [Thesis]. Queens University; 2013. Available from: http://hdl.handle.net/1974/8320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

14. AbdAllah, Eslam. DEFENDING AGAINST DDOS AND UNAUTHORIZED ACCESS ATTACKS IN INFORMATION CENTRIC NETWORKING .

Degree: Computing, Queens University

 Information Centric Networking (ICN) is a new communication paradigm that focuses on content retrieval from the network regardless of the content storage location. ICN changes… (more)

Subjects/Keywords: Information Centric Networking; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

AbdAllah, E. (n.d.). DEFENDING AGAINST DDOS AND UNAUTHORIZED ACCESS ATTACKS IN INFORMATION CENTRIC NETWORKING . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/15610

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

AbdAllah, Eslam. “DEFENDING AGAINST DDOS AND UNAUTHORIZED ACCESS ATTACKS IN INFORMATION CENTRIC NETWORKING .” Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/15610.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

AbdAllah, Eslam. “DEFENDING AGAINST DDOS AND UNAUTHORIZED ACCESS ATTACKS IN INFORMATION CENTRIC NETWORKING .” Web. 13 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

AbdAllah E. DEFENDING AGAINST DDOS AND UNAUTHORIZED ACCESS ATTACKS IN INFORMATION CENTRIC NETWORKING . [Internet] [Thesis]. Queens University; [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/15610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

AbdAllah E. DEFENDING AGAINST DDOS AND UNAUTHORIZED ACCESS ATTACKS IN INFORMATION CENTRIC NETWORKING . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/15610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Queens University

15. Rahul, Ranjan. An SCL-Based Constraint Representation Language for Intrusion Detection .

Degree: Computing, Queens University

 In this thesis, we have extended the SCL (Structured and Context Language) network protocol description language to describe the complex constraints for the network engineer.… (more)

Subjects/Keywords: Language Design; Security; Network Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rahul, R. (n.d.). An SCL-Based Constraint Representation Language for Intrusion Detection . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/23645

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rahul, Ranjan. “An SCL-Based Constraint Representation Language for Intrusion Detection .” Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/23645.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rahul, Ranjan. “An SCL-Based Constraint Representation Language for Intrusion Detection .” Web. 13 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Rahul R. An SCL-Based Constraint Representation Language for Intrusion Detection . [Internet] [Thesis]. Queens University; [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/23645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Rahul R. An SCL-Based Constraint Representation Language for Intrusion Detection . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/23645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Queens University

16. Aboelfotoh, Muhammad. An Empirical Study of a Language - based Security Testing Technique .

Degree: Computing, 2008, Queens University

 Application layer protocols have become sophisticated to the level that they have become languages in their own right. Security testing of network applications is indisputably… (more)

Subjects/Keywords: testing; security; protocol; DRDA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aboelfotoh, M. (2008). An Empirical Study of a Language - based Security Testing Technique . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/1499

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aboelfotoh, Muhammad. “An Empirical Study of a Language - based Security Testing Technique .” 2008. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/1499.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aboelfotoh, Muhammad. “An Empirical Study of a Language - based Security Testing Technique .” 2008. Web. 13 Oct 2019.

Vancouver:

Aboelfotoh M. An Empirical Study of a Language - based Security Testing Technique . [Internet] [Thesis]. Queens University; 2008. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/1499.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aboelfotoh M. An Empirical Study of a Language - based Security Testing Technique . [Thesis]. Queens University; 2008. Available from: http://hdl.handle.net/1974/1499

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

17. Kam, Ben W. Y. Syntax-based Security Testing for Text-based Communication Protocols .

Degree: Computing, 2010, Queens University

 We introduce a novel Syntax-based Security Testing (SST) framework that uses a protocol specification to effectively perform security testing on text-based communication protocols. A protocol… (more)

Subjects/Keywords: Security Testing; Mutation Testing; Text-Based Communication Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kam, B. W. Y. (2010). Syntax-based Security Testing for Text-based Communication Protocols . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/5652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kam, Ben W Y. “Syntax-based Security Testing for Text-based Communication Protocols .” 2010. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/5652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kam, Ben W Y. “Syntax-based Security Testing for Text-based Communication Protocols .” 2010. Web. 13 Oct 2019.

Vancouver:

Kam BWY. Syntax-based Security Testing for Text-based Communication Protocols . [Internet] [Thesis]. Queens University; 2010. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/5652.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kam BWY. Syntax-based Security Testing for Text-based Communication Protocols . [Thesis]. Queens University; 2010. Available from: http://hdl.handle.net/1974/5652

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

18. Sawilla, Reginald Elias. Ranks and Partial Cuts in Forward Hypergraphs .

Degree: Computing, 2011, Queens University

 Many real-world relations are networks that can be modelled with a kind of directed hypergraph named a forward hypergraph (F-graph). F-graphs capture the semantics of… (more)

Subjects/Keywords: Hypergraph Ranks; Hypergraph Cuts; Cyber Security; Decision Support

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sawilla, R. E. (2011). Ranks and Partial Cuts in Forward Hypergraphs . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sawilla, Reginald Elias. “Ranks and Partial Cuts in Forward Hypergraphs .” 2011. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sawilla, Reginald Elias. “Ranks and Partial Cuts in Forward Hypergraphs .” 2011. Web. 13 Oct 2019.

Vancouver:

Sawilla RE. Ranks and Partial Cuts in Forward Hypergraphs . [Internet] [Thesis]. Queens University; 2011. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sawilla RE. Ranks and Partial Cuts in Forward Hypergraphs . [Thesis]. Queens University; 2011. Available from: http://hdl.handle.net/1974/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

19. Huang, Yi-an. Intrusion Detection and Response Systems for Mobile Ad Hoc Networks.

Degree: PhD, Computing, 2006, Georgia Tech

 A mobile ad hoc network (MANET) consists of a group of autonomous mobile nodes with no infrastructure support. In this research, we develop a distributed… (more)

Subjects/Keywords: Data mining; Intrusion detection; Routing security; Mobile ad hoc networks; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2006). Intrusion Detection and Response Systems for Mobile Ad Hoc Networks. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/14053

Chicago Manual of Style (16th Edition):

Huang, Yi-an. “Intrusion Detection and Response Systems for Mobile Ad Hoc Networks.” 2006. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/14053.

MLA Handbook (7th Edition):

Huang, Yi-an. “Intrusion Detection and Response Systems for Mobile Ad Hoc Networks.” 2006. Web. 13 Oct 2019.

Vancouver:

Huang Y. Intrusion Detection and Response Systems for Mobile Ad Hoc Networks. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/14053.

Council of Science Editors:

Huang Y. Intrusion Detection and Response Systems for Mobile Ad Hoc Networks. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/14053


Georgia Tech

20. Sung, Minho. Scalable and efficient distributed algorithms for defending against malicious Internet activity.

Degree: PhD, Computing, 2006, Georgia Tech

 The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, spam emails or Internet worms/viruses has been increasing in the last… (more)

Subjects/Keywords: Network security; DDoS attack; Computer networks Security measures; Computer networks Monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sung, M. (2006). Scalable and efficient distributed algorithms for defending against malicious Internet activity. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/14090

Chicago Manual of Style (16th Edition):

Sung, Minho. “Scalable and efficient distributed algorithms for defending against malicious Internet activity.” 2006. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/14090.

MLA Handbook (7th Edition):

Sung, Minho. “Scalable and efficient distributed algorithms for defending against malicious Internet activity.” 2006. Web. 13 Oct 2019.

Vancouver:

Sung M. Scalable and efficient distributed algorithms for defending against malicious Internet activity. [Internet] [Doctoral dissertation]. Georgia Tech; 2006. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/14090.

Council of Science Editors:

Sung M. Scalable and efficient distributed algorithms for defending against malicious Internet activity. [Doctoral Dissertation]. Georgia Tech; 2006. Available from: http://hdl.handle.net/1853/14090

21. Dacosta, Italo. Practical authentication in large-scale internet applications.

Degree: PhD, Computing, 2012, Georgia Tech

 Due to their massive user base and request load, large-scale Internet applications have mainly focused on goals such as performance and scalability. As a result,… (more)

Subjects/Keywords: Network security; Web security; VoIP security; Session hijacking; Man-in-the-middle attacks; Computer networks Security measures; Computer architecture

Security and Threat Analysis . . . . . . . . . . . . . . . . . . 99 5.5.3 5.6 77 5.3.1 5.5… …Description . . . . . . . . . . . . . . . . . . . . . . . 115 OTC Security Analysis… …146 7.3 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 7.4… …162 ix APPENDIX A — OTC SECURITY VERIFICATION USING PROVERIF V.1.86… …164 APPENDIX B — DVCERT SECURITY VERIFICATION USING PROVERIF V.1.86… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dacosta, I. (2012). Practical authentication in large-scale internet applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/44863

Chicago Manual of Style (16th Edition):

Dacosta, Italo. “Practical authentication in large-scale internet applications.” 2012. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/44863.

MLA Handbook (7th Edition):

Dacosta, Italo. “Practical authentication in large-scale internet applications.” 2012. Web. 13 Oct 2019.

Vancouver:

Dacosta I. Practical authentication in large-scale internet applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/44863.

Council of Science Editors:

Dacosta I. Practical authentication in large-scale internet applications. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/44863


Queens University

22. Rashwan, Abdulmonem. Context-Aware and Real-time Entrustment Framework for Securing Next Generation Internet Communications .

Degree: Computing, Queens University

 The Internet has been repeatedly demonstrated to be insufficiently secure for transferring sensitive information worldwide. This insecurity is an inherent characteristic as the Internet did… (more)

Subjects/Keywords: Communication Security; Entrustment; Security Framework; Next Generation Internet; IoT; Context-Aware; Adaptive Security; Cryptography; Hashing; Privacy; Tracing; Resource Management; Security Aiding; Resource Aiding

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rashwan, A. (n.d.). Context-Aware and Real-time Entrustment Framework for Securing Next Generation Internet Communications . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/24059

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rashwan, Abdulmonem. “Context-Aware and Real-time Entrustment Framework for Securing Next Generation Internet Communications .” Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/24059.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rashwan, Abdulmonem. “Context-Aware and Real-time Entrustment Framework for Securing Next Generation Internet Communications .” Web. 13 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Rashwan A. Context-Aware and Real-time Entrustment Framework for Securing Next Generation Internet Communications . [Internet] [Thesis]. Queens University; [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/24059.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Rashwan A. Context-Aware and Real-time Entrustment Framework for Securing Next Generation Internet Communications . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/24059

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Queens University

23. Alam, Swawibe. Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data .

Degree: Computing, Queens University

 Nowadays, the automobile industry is integrating many new features into vehicles. To provide these features, various electronic systems are being added. These systems are coordinated… (more)

Subjects/Keywords: Connected vehicles; Vehicle data security; Blockchain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alam, S. (n.d.). Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/24854

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alam, Swawibe. “Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data .” Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/24854.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alam, Swawibe. “Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data .” Web. 13 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Alam S. Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data . [Internet] [Thesis]. Queens University; [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/24854.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Alam S. Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/24854

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Queens University

24. Anis, Arafa Mohd. Securing Web Applications with Secure Coding Practices and Integrity Verification .

Degree: Computing, Queens University

 The concept of security in web applications is not new. However, it is often ignored in the development stages of the web applications. Being multitiered… (more)

Subjects/Keywords: Web Application Security; Javascript; Integrity Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anis, A. M. (n.d.). Securing Web Applications with Secure Coding Practices and Integrity Verification . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/23984

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anis, Arafa Mohd. “Securing Web Applications with Secure Coding Practices and Integrity Verification .” Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/23984.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anis, Arafa Mohd. “Securing Web Applications with Secure Coding Practices and Integrity Verification .” Web. 13 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Anis AM. Securing Web Applications with Secure Coding Practices and Integrity Verification . [Internet] [Thesis]. Queens University; [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/23984.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Anis AM. Securing Web Applications with Secure Coding Practices and Integrity Verification . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/23984

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Queens University

25. Hussain, Mohammed. The Design and Applications of a Privacy-Preserving Identity and Trust-Management System .

Degree: Computing, 2010, Queens University

 Identities are present in the interactions between individuals and organizations. Online shopping requires credit card information, while e-government services require social security or passport numbers.… (more)

Subjects/Keywords: Security; Privacy; Reputation Management; Identity Management; Anonymity; Secure Interactions; Unlinkability; Cloud Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hussain, M. (2010). The Design and Applications of a Privacy-Preserving Identity and Trust-Management System . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/5520

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hussain, Mohammed. “The Design and Applications of a Privacy-Preserving Identity and Trust-Management System .” 2010. Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/5520.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hussain, Mohammed. “The Design and Applications of a Privacy-Preserving Identity and Trust-Management System .” 2010. Web. 13 Oct 2019.

Vancouver:

Hussain M. The Design and Applications of a Privacy-Preserving Identity and Trust-Management System . [Internet] [Thesis]. Queens University; 2010. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/5520.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hussain M. The Design and Applications of a Privacy-Preserving Identity and Trust-Management System . [Thesis]. Queens University; 2010. Available from: http://hdl.handle.net/1974/5520

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

26. Singaravelu, Lenin. End-to-End Security of Information Flow in Web-based Applications.

Degree: PhD, Computing, 2007, Georgia Tech

 Web-based applications and services are increasingly being used in security-sensitive tasks. Current security protocols rely on two crucial assumptions to protect the confidentiality and integrity… (more)

Subjects/Keywords: Software refactoring; Web service compositions; Web service middleware; End-to-end security; World Wide Web Security measures; Internet Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Singaravelu, L. (2007). End-to-End Security of Information Flow in Web-based Applications. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/16142

Chicago Manual of Style (16th Edition):

Singaravelu, Lenin. “End-to-End Security of Information Flow in Web-based Applications.” 2007. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/16142.

MLA Handbook (7th Edition):

Singaravelu, Lenin. “End-to-End Security of Information Flow in Web-based Applications.” 2007. Web. 13 Oct 2019.

Vancouver:

Singaravelu L. End-to-End Security of Information Flow in Web-based Applications. [Internet] [Doctoral dissertation]. Georgia Tech; 2007. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/16142.

Council of Science Editors:

Singaravelu L. End-to-End Security of Information Flow in Web-based Applications. [Doctoral Dissertation]. Georgia Tech; 2007. Available from: http://hdl.handle.net/1853/16142


Georgia Tech

27. Srivatsa, Mudhakar. Security Architecture and Protocols for Overlay Network Services.

Degree: PhD, Computing, 2007, Georgia Tech

 Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive… (more)

Subjects/Keywords: Performance and scalability; Applied cryptography; Systems security; Overlay networks; Plug-ins (Computer programs); Computer networks Security measures; Computer architecture Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Srivatsa, M. (2007). Security Architecture and Protocols for Overlay Network Services. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/16284

Chicago Manual of Style (16th Edition):

Srivatsa, Mudhakar. “Security Architecture and Protocols for Overlay Network Services.” 2007. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/16284.

MLA Handbook (7th Edition):

Srivatsa, Mudhakar. “Security Architecture and Protocols for Overlay Network Services.” 2007. Web. 13 Oct 2019.

Vancouver:

Srivatsa M. Security Architecture and Protocols for Overlay Network Services. [Internet] [Doctoral dissertation]. Georgia Tech; 2007. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/16284.

Council of Science Editors:

Srivatsa M. Security Architecture and Protocols for Overlay Network Services. [Doctoral Dissertation]. Georgia Tech; 2007. Available from: http://hdl.handle.net/1853/16284


Georgia Tech

28. Fogla, Prahlad. Improving the Efficiency and Robustness of Intrusion Detection Systems.

Degree: PhD, Computing, 2007, Georgia Tech

 With the increase in the complexity of computer systems, existing security measures are not enough to prevent attacks. Intrusion detection systems have become an integral… (more)

Subjects/Keywords: Computer security; Network security; Intrusion detection system; Approximate string matching; Q-gram matching; Anomaly detection (Computer security)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fogla, P. (2007). Improving the Efficiency and Robustness of Intrusion Detection Systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/19772

Chicago Manual of Style (16th Edition):

Fogla, Prahlad. “Improving the Efficiency and Robustness of Intrusion Detection Systems.” 2007. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/19772.

MLA Handbook (7th Edition):

Fogla, Prahlad. “Improving the Efficiency and Robustness of Intrusion Detection Systems.” 2007. Web. 13 Oct 2019.

Vancouver:

Fogla P. Improving the Efficiency and Robustness of Intrusion Detection Systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2007. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/19772.

Council of Science Editors:

Fogla P. Improving the Efficiency and Robustness of Intrusion Detection Systems. [Doctoral Dissertation]. Georgia Tech; 2007. Available from: http://hdl.handle.net/1853/19772


Queens University

29. Elsayed, Marwa. Advancing Security Services for Cloud Applications .

Degree: Computing, Queens University

 With cloud computing taking roots, Software as a Service (SaaS) is transforming the future of Information Technology (IT). SaaS is a modern pervasive software delivery… (more)

Subjects/Keywords: Cloud applications; Security; Security as a Service; Software as a Service; Program analysis; Data analytics; Security Monitoring; Vulnerability Scanning; Cloud Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elsayed, M. (n.d.). Advancing Security Services for Cloud Applications . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/24937

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Elsayed, Marwa. “Advancing Security Services for Cloud Applications .” Thesis, Queens University. Accessed October 13, 2019. http://hdl.handle.net/1974/24937.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Elsayed, Marwa. “Advancing Security Services for Cloud Applications .” Web. 13 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Elsayed M. Advancing Security Services for Cloud Applications . [Internet] [Thesis]. Queens University; [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1974/24937.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Elsayed M. Advancing Security Services for Cloud Applications . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/24937

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

30. Antonakakis, Emmanouil Konstantinos. Improving internet security via large-scale passive and active dns monitoring.

Degree: PhD, Computing, 2012, Georgia Tech

 The Domain Name System (DNS) is a critical component of the Internet. DNS provides the ability to map human-readable and memorable domain names to machine-level… (more)

Subjects/Keywords: Anomaly detection; DNS monitoring; Internet security; Internet Management; Anomaly detection (Computer security); Computer security; Malware (Computer software)

…records to evade blacklists and resist takedowns [84, 89, 90]. To date, the security… …blacklists up-to-date. The security community is in need of methods that would enable DNS operators… …overcome the limitations of static domain blacklists, the security community needs a new… …take down effort would require security operators to pre-register a very large number of… …domains per day, which quickly becomes very costly. Alternatively, security operators may seek… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Antonakakis, E. K. (2012). Improving internet security via large-scale passive and active dns monitoring. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/44780

Chicago Manual of Style (16th Edition):

Antonakakis, Emmanouil Konstantinos. “Improving internet security via large-scale passive and active dns monitoring.” 2012. Doctoral Dissertation, Georgia Tech. Accessed October 13, 2019. http://hdl.handle.net/1853/44780.

MLA Handbook (7th Edition):

Antonakakis, Emmanouil Konstantinos. “Improving internet security via large-scale passive and active dns monitoring.” 2012. Web. 13 Oct 2019.

Vancouver:

Antonakakis EK. Improving internet security via large-scale passive and active dns monitoring. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Oct 13]. Available from: http://hdl.handle.net/1853/44780.

Council of Science Editors:

Antonakakis EK. Improving internet security via large-scale passive and active dns monitoring. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/44780

[1] [2]

.