Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Dates: 2000 – 2004

You searched for subject:( security). Showing records 1 – 30 of 544 total matches.

[1] [2] [3] [4] [5] … [19]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of KwaZulu-Natal

1. Stefano, Lynn. Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal.

Degree: M.Agric., Food security, 2004, University of KwaZulu-Natal

 Printed information access, preferences and use by small-scale farmers in KwaZulu-Natal, who are experimenting with or converting to organic farming, were investigated to establish the… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stefano, L. (2004). Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal. (Masters Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/6252

Chicago Manual of Style (16th Edition):

Stefano, Lynn. “Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal.” 2004. Masters Thesis, University of KwaZulu-Natal. Accessed October 21, 2019. http://hdl.handle.net/10413/6252.

MLA Handbook (7th Edition):

Stefano, Lynn. “Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal.” 2004. Web. 21 Oct 2019.

Vancouver:

Stefano L. Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal. [Internet] [Masters thesis]. University of KwaZulu-Natal; 2004. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/10413/6252.

Council of Science Editors:

Stefano L. Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal. [Masters Thesis]. University of KwaZulu-Natal; 2004. Available from: http://hdl.handle.net/10413/6252


University of Georgia

2. Mazzucco, Esteban. Security interests in intellectual property rights : the time has come for the enactment of new laws.

Degree: LLM, Law, 2003, University of Georgia

 This study deals with all the problematic issues surrounding the use of intellectual property as "collateral," analyzing two legal systems, and addressing that the time… (more)

Subjects/Keywords: Security interest

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mazzucco, E. (2003). Security interests in intellectual property rights : the time has come for the enactment of new laws. (Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mazzucco, Esteban. “Security interests in intellectual property rights : the time has come for the enactment of new laws.” 2003. Thesis, University of Georgia. Accessed October 21, 2019. http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mazzucco, Esteban. “Security interests in intellectual property rights : the time has come for the enactment of new laws.” 2003. Web. 21 Oct 2019.

Vancouver:

Mazzucco E. Security interests in intellectual property rights : the time has come for the enactment of new laws. [Internet] [Thesis]. University of Georgia; 2003. [cited 2019 Oct 21]. Available from: http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mazzucco E. Security interests in intellectual property rights : the time has come for the enactment of new laws. [Thesis]. University of Georgia; 2003. Available from: http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

3. Chelashaw, Karl. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .

Degree: 2001, University of Nairobi

 The Windows IP Security integrated into Windows 2000 Server should provide network managers with a critically important line of security. Windows IP Security is an… (more)

Subjects/Keywords: Protocol Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chelashaw, K. (2001). Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chelashaw, Karl. “Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .” 2001. Thesis, University of Nairobi. Accessed October 21, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chelashaw, Karl. “Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .” 2001. Web. 21 Oct 2019.

Vancouver:

Chelashaw K. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . [Internet] [Thesis]. University of Nairobi; 2001. [cited 2019 Oct 21]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chelashaw K. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . [Thesis]. University of Nairobi; 2001. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

4. Ndung'u, Catherine. A Framework for development of an information security auditing capability .

Degree: 2004, University of Nairobi

 The aim of this study was to determine how Kenyan organizations have embraced Information System (IS) security audit and development of a framework which the… (more)

Subjects/Keywords: Security Auditing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ndung'u, C. (2004). A Framework for development of an information security auditing capability . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ndung'u, Catherine. “A Framework for development of an information security auditing capability .” 2004. Thesis, University of Nairobi. Accessed October 21, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ndung'u, Catherine. “A Framework for development of an information security auditing capability .” 2004. Web. 21 Oct 2019.

Vancouver:

Ndung'u C. A Framework for development of an information security auditing capability . [Internet] [Thesis]. University of Nairobi; 2004. [cited 2019 Oct 21]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ndung'u C. A Framework for development of an information security auditing capability . [Thesis]. University of Nairobi; 2004. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

5. Van Dyke, Colin William. An in-depth analysis of common software vulnerabilities and their solutions.

Degree: MS, Electrical and Computer Engineering, 2004, Oregon State University

 With the current security climate throughout the Internet, a large emphasis is being placed on protecting software systems from attack by a malicious entity. Most… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Dyke, C. W. (2004). An in-depth analysis of common software vulnerabilities and their solutions. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/22487

Chicago Manual of Style (16th Edition):

Van Dyke, Colin William. “An in-depth analysis of common software vulnerabilities and their solutions.” 2004. Masters Thesis, Oregon State University. Accessed October 21, 2019. http://hdl.handle.net/1957/22487.

MLA Handbook (7th Edition):

Van Dyke, Colin William. “An in-depth analysis of common software vulnerabilities and their solutions.” 2004. Web. 21 Oct 2019.

Vancouver:

Van Dyke CW. An in-depth analysis of common software vulnerabilities and their solutions. [Internet] [Masters thesis]. Oregon State University; 2004. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/1957/22487.

Council of Science Editors:

Van Dyke CW. An in-depth analysis of common software vulnerabilities and their solutions. [Masters Thesis]. Oregon State University; 2004. Available from: http://hdl.handle.net/1957/22487


University of Tasmania

6. McMahon, JF. External and internal security in the Australian colonies from their founding to the end of the Macquarie era.

Degree: 2004, University of Tasmania

 This thesis considers external and internal security in the Australian colonies from the founding of New South Wales to the end of the Macquarie era.… (more)

Subjects/Keywords: Internal security; National security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McMahon, J. (2004). External and internal security in the Australian colonies from their founding to the end of the Macquarie era. (Thesis). University of Tasmania. Retrieved from https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McMahon, JF. “External and internal security in the Australian colonies from their founding to the end of the Macquarie era.” 2004. Thesis, University of Tasmania. Accessed October 21, 2019. https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McMahon, JF. “External and internal security in the Australian colonies from their founding to the end of the Macquarie era.” 2004. Web. 21 Oct 2019.

Vancouver:

McMahon J. External and internal security in the Australian colonies from their founding to the end of the Macquarie era. [Internet] [Thesis]. University of Tasmania; 2004. [cited 2019 Oct 21]. Available from: https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McMahon J. External and internal security in the Australian colonies from their founding to the end of the Macquarie era. [Thesis]. University of Tasmania; 2004. Available from: https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Al Shahri, Aied Fayez. SNAP : a distributed authentication protocol.

Degree: PhD, 2003, University of Strathclyde

 The explosive growth in network based applications and distributed systems allows the deployment of critical applications such as e-commerce, tele-banking, electronic government, etc. On the… (more)

Subjects/Keywords: 005; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Shahri, A. F. (2003). SNAP : a distributed authentication protocol. (Doctoral Dissertation). University of Strathclyde. Retrieved from http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21375 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288631

Chicago Manual of Style (16th Edition):

Al Shahri, Aied Fayez. “SNAP : a distributed authentication protocol.” 2003. Doctoral Dissertation, University of Strathclyde. Accessed October 21, 2019. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21375 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288631.

MLA Handbook (7th Edition):

Al Shahri, Aied Fayez. “SNAP : a distributed authentication protocol.” 2003. Web. 21 Oct 2019.

Vancouver:

Al Shahri AF. SNAP : a distributed authentication protocol. [Internet] [Doctoral dissertation]. University of Strathclyde; 2003. [cited 2019 Oct 21]. Available from: http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21375 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288631.

Council of Science Editors:

Al Shahri AF. SNAP : a distributed authentication protocol. [Doctoral Dissertation]. University of Strathclyde; 2003. Available from: http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21375 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288631


University of Nairobi

8. Gichuru, David C. An investigation of computer security status at the University of Nairobi .

Degree: 2000, University of Nairobi

 The problem addressed in this study is inadequacy in the current security mechanism in the relation to the three control mechanisms of physical control, logical… (more)

Subjects/Keywords: Computer Security Status

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gichuru, D. C. (2000). An investigation of computer security status at the University of Nairobi . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gichuru, David C. “An investigation of computer security status at the University of Nairobi .” 2000. Thesis, University of Nairobi. Accessed October 21, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gichuru, David C. “An investigation of computer security status at the University of Nairobi .” 2000. Web. 21 Oct 2019.

Vancouver:

Gichuru DC. An investigation of computer security status at the University of Nairobi . [Internet] [Thesis]. University of Nairobi; 2000. [cited 2019 Oct 21]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gichuru DC. An investigation of computer security status at the University of Nairobi . [Thesis]. University of Nairobi; 2000. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Lin, Tien-Lung. Analysis of China's Strategy for Energy Security.

Degree: Master, Mainland China Studies, 2002, NSYSU

 Abstract Chinaâs two decades of rapid economic growth have fueled a demand for energy that has outstripped domestic sources of supply. China became a net… (more)

Subjects/Keywords: energy security; China

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, T. (2002). Analysis of China's Strategy for Energy Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0708102-135142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Tien-Lung. “Analysis of China's Strategy for Energy Security.” 2002. Thesis, NSYSU. Accessed October 21, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0708102-135142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Tien-Lung. “Analysis of China's Strategy for Energy Security.” 2002. Web. 21 Oct 2019.

Vancouver:

Lin T. Analysis of China's Strategy for Energy Security. [Internet] [Thesis]. NSYSU; 2002. [cited 2019 Oct 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0708102-135142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin T. Analysis of China's Strategy for Energy Security. [Thesis]. NSYSU; 2002. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0708102-135142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


McGill University

10. Palsson, Ulrika. Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union.

Degree: Master of Laws, Institute of Comparative Law, 2002, McGill University

Note: title page missing

This thesis describes and analyzes the practice of 're-pledge', by which pledgees use the pledged collateral to secure their own borrowings… (more)

Subjects/Keywords: Security (Law)  – Europe.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palsson, U. (2002). Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union. (Masters Thesis). McGill University. Retrieved from http://digitool.library.mcgill.ca/thesisfile161869.pdf

Chicago Manual of Style (16th Edition):

Palsson, Ulrika. “Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union.” 2002. Masters Thesis, McGill University. Accessed October 21, 2019. http://digitool.library.mcgill.ca/thesisfile161869.pdf.

MLA Handbook (7th Edition):

Palsson, Ulrika. “Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union.” 2002. Web. 21 Oct 2019.

Vancouver:

Palsson U. Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union. [Internet] [Masters thesis]. McGill University; 2002. [cited 2019 Oct 21]. Available from: http://digitool.library.mcgill.ca/thesisfile161869.pdf.

Council of Science Editors:

Palsson U. Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union. [Masters Thesis]. McGill University; 2002. Available from: http://digitool.library.mcgill.ca/thesisfile161869.pdf

11. Damianou, Nicodemos Constantinou. A policy framework for management of distributed systems.

Degree: PhD, 2002, Imperial College London

Subjects/Keywords: 005; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Damianou, N. C. (2002). A policy framework for management of distributed systems. (Doctoral Dissertation). Imperial College London. Retrieved from http://hdl.handle.net/10044/1/8258

Chicago Manual of Style (16th Edition):

Damianou, Nicodemos Constantinou. “A policy framework for management of distributed systems.” 2002. Doctoral Dissertation, Imperial College London. Accessed October 21, 2019. http://hdl.handle.net/10044/1/8258.

MLA Handbook (7th Edition):

Damianou, Nicodemos Constantinou. “A policy framework for management of distributed systems.” 2002. Web. 21 Oct 2019.

Vancouver:

Damianou NC. A policy framework for management of distributed systems. [Internet] [Doctoral dissertation]. Imperial College London; 2002. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/10044/1/8258.

Council of Science Editors:

Damianou NC. A policy framework for management of distributed systems. [Doctoral Dissertation]. Imperial College London; 2002. Available from: http://hdl.handle.net/10044/1/8258

12. CHEW WAI MENG. Applying mobile agents technology to intrusion detection and response.

Degree: 2004, National University of Singapore

Subjects/Keywords: mobile agents security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MENG, C. W. (2004). Applying mobile agents technology to intrusion detection and response. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/13912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MENG, CHEW WAI. “Applying mobile agents technology to intrusion detection and response.” 2004. Thesis, National University of Singapore. Accessed October 21, 2019. http://scholarbank.nus.edu.sg/handle/10635/13912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MENG, CHEW WAI. “Applying mobile agents technology to intrusion detection and response.” 2004. Web. 21 Oct 2019.

Vancouver:

MENG CW. Applying mobile agents technology to intrusion detection and response. [Internet] [Thesis]. National University of Singapore; 2004. [cited 2019 Oct 21]. Available from: http://scholarbank.nus.edu.sg/handle/10635/13912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MENG CW. Applying mobile agents technology to intrusion detection and response. [Thesis]. National University of Singapore; 2004. Available from: http://scholarbank.nus.edu.sg/handle/10635/13912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

13. Cheung, Chun-Hom. A learning-based approach to false alarm reduction for signature-based intrusion detection systems.

Degree: 2004, Hong Kong University of Science and Technology

 Intrusion detection has become an important approach to computer and network security. However, existing intrusion detection systems usually generate too many alarm messages, most of… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheung, C. (2004). A learning-based approach to false alarm reduction for signature-based intrusion detection systems. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheung, Chun-Hom. “A learning-based approach to false alarm reduction for signature-based intrusion detection systems.” 2004. Thesis, Hong Kong University of Science and Technology. Accessed October 21, 2019. https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheung, Chun-Hom. “A learning-based approach to false alarm reduction for signature-based intrusion detection systems.” 2004. Web. 21 Oct 2019.

Vancouver:

Cheung C. A learning-based approach to false alarm reduction for signature-based intrusion detection systems. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2004. [cited 2019 Oct 21]. Available from: https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheung C. A learning-based approach to false alarm reduction for signature-based intrusion detection systems. [Thesis]. Hong Kong University of Science and Technology; 2004. Available from: https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

14. Lorch, Markus. PRIMA - Privilege Management and Authorization in Grid Computing Environments.

Degree: PhD, Computer Science, 2004, Virginia Tech

 Computational grids and other heterogeneous, large-scale distributed systems require more powerful and more flexible authorization mechanisms to realize fine-grained access-control of resources. Computational grids are… (more)

Subjects/Keywords: Distributed Systems; Grid Security; Computer Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lorch, M. (2004). PRIMA - Privilege Management and Authorization in Grid Computing Environments. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/26995

Chicago Manual of Style (16th Edition):

Lorch, Markus. “PRIMA - Privilege Management and Authorization in Grid Computing Environments.” 2004. Doctoral Dissertation, Virginia Tech. Accessed October 21, 2019. http://hdl.handle.net/10919/26995.

MLA Handbook (7th Edition):

Lorch, Markus. “PRIMA - Privilege Management and Authorization in Grid Computing Environments.” 2004. Web. 21 Oct 2019.

Vancouver:

Lorch M. PRIMA - Privilege Management and Authorization in Grid Computing Environments. [Internet] [Doctoral dissertation]. Virginia Tech; 2004. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/10919/26995.

Council of Science Editors:

Lorch M. PRIMA - Privilege Management and Authorization in Grid Computing Environments. [Doctoral Dissertation]. Virginia Tech; 2004. Available from: http://hdl.handle.net/10919/26995


Michigan State University

15. Westran, Timothy Robert. The last line of defense : a host-based, kernel-level intrusion detection system.

Degree: MS, Department of Computer Science, 2003, Michigan State University

Subjects/Keywords: Computer security; Computer networks – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Westran, T. R. (2003). The last line of defense : a host-based, kernel-level intrusion detection system. (Masters Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:32939

Chicago Manual of Style (16th Edition):

Westran, Timothy Robert. “The last line of defense : a host-based, kernel-level intrusion detection system.” 2003. Masters Thesis, Michigan State University. Accessed October 21, 2019. http://etd.lib.msu.edu/islandora/object/etd:32939.

MLA Handbook (7th Edition):

Westran, Timothy Robert. “The last line of defense : a host-based, kernel-level intrusion detection system.” 2003. Web. 21 Oct 2019.

Vancouver:

Westran TR. The last line of defense : a host-based, kernel-level intrusion detection system. [Internet] [Masters thesis]. Michigan State University; 2003. [cited 2019 Oct 21]. Available from: http://etd.lib.msu.edu/islandora/object/etd:32939.

Council of Science Editors:

Westran TR. The last line of defense : a host-based, kernel-level intrusion detection system. [Masters Thesis]. Michigan State University; 2003. Available from: http://etd.lib.msu.edu/islandora/object/etd:32939

16. Ivano Miranda dos Anjos. PUPSI :uma proposta de processo unificado para políticas de segurança da informação.

Degree: 2004, Universidade Federal do Rio Grande do Norte

 () trato com os ativos de informação representa hoje principal fator deteminante para o sucesso e, até mesmo, permanência das organizações no mundo globalizado. ()… (more)

Subjects/Keywords: Segurança da informação; Políticas de segurança; Processo unificado; RUP; Normas de segurança; SISTEMAS DE COMPUTACAO; Information security; Security policies; Unified process; RUP, Security rules

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anjos, I. M. d. (2004). PUPSI :uma proposta de processo unificado para políticas de segurança da informação. (Thesis). Universidade Federal do Rio Grande do Norte. Retrieved from http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anjos, Ivano Miranda dos. “PUPSI :uma proposta de processo unificado para políticas de segurança da informação.” 2004. Thesis, Universidade Federal do Rio Grande do Norte. Accessed October 21, 2019. http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anjos, Ivano Miranda dos. “PUPSI :uma proposta de processo unificado para políticas de segurança da informação.” 2004. Web. 21 Oct 2019.

Vancouver:

Anjos IMd. PUPSI :uma proposta de processo unificado para políticas de segurança da informação. [Internet] [Thesis]. Universidade Federal do Rio Grande do Norte; 2004. [cited 2019 Oct 21]. Available from: http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anjos IMd. PUPSI :uma proposta de processo unificado para políticas de segurança da informação. [Thesis]. Universidade Federal do Rio Grande do Norte; 2004. Available from: http://bdtd.bczm.ufrn.br/tedesimplificado//tde_busca/arquivo.php?codArquivo=747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

17. KASPAREK, JASON W. SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL.

Degree: M. Arch., Design, Architecture, Art and Planning : Architecture, 2004, University of Cincinnati

 The primary thesis of this project is that a successful implementation of security measures in a historic city hall must be mediated by the public… (more)

Subjects/Keywords: Architecture; Security Measures; City Halls; Public Buildings and Security; Security and Historic Buildings

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

KASPAREK, J. W. (2004). SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798

Chicago Manual of Style (16th Edition):

KASPAREK, JASON W. “SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL.” 2004. Masters Thesis, University of Cincinnati. Accessed October 21, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798.

MLA Handbook (7th Edition):

KASPAREK, JASON W. “SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL.” 2004. Web. 21 Oct 2019.

Vancouver:

KASPAREK JW. SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL. [Internet] [Masters thesis]. University of Cincinnati; 2004. [cited 2019 Oct 21]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798.

Council of Science Editors:

KASPAREK JW. SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL. [Masters Thesis]. University of Cincinnati; 2004. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798


Georgia Tech

18. Levine, John G. (John Glenn). A Methodology for Detecting and Classifying Rootkit Exploits.

Degree: PhD, Electrical and Computer Engineering, 2004, Georgia Tech

 A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect… (more)

Subjects/Keywords: Computer security; Rootkits; Computer security; Computer hackers; Computer networks (Security measures)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Levine, J. G. (. G. (2004). A Methodology for Detecting and Classifying Rootkit Exploits. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/5139

Chicago Manual of Style (16th Edition):

Levine, John G (John Glenn). “A Methodology for Detecting and Classifying Rootkit Exploits.” 2004. Doctoral Dissertation, Georgia Tech. Accessed October 21, 2019. http://hdl.handle.net/1853/5139.

MLA Handbook (7th Edition):

Levine, John G (John Glenn). “A Methodology for Detecting and Classifying Rootkit Exploits.” 2004. Web. 21 Oct 2019.

Vancouver:

Levine JG(G. A Methodology for Detecting and Classifying Rootkit Exploits. [Internet] [Doctoral dissertation]. Georgia Tech; 2004. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/1853/5139.

Council of Science Editors:

Levine JG(G. A Methodology for Detecting and Classifying Rootkit Exploits. [Doctoral Dissertation]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/5139


Penn State University

19. Ngamsuriyaroj, Sudsanguan. Performance Aspects of Security-Aware Database Systems.

Degree: PhD, Computer Science and Engineering, 2002, Penn State University

Security as well as performance are crucial requirements in every application design. However, security requirements of an application impose some limitations and typically have a… (more)

Subjects/Keywords: Multidatabases; Consistency; Log Management; Multilevel Security; Security Policy; Performance; Database Systems; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ngamsuriyaroj, S. (2002). Performance Aspects of Security-Aware Database Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/5923

Chicago Manual of Style (16th Edition):

Ngamsuriyaroj, Sudsanguan. “Performance Aspects of Security-Aware Database Systems.” 2002. Doctoral Dissertation, Penn State University. Accessed October 21, 2019. https://etda.libraries.psu.edu/catalog/5923.

MLA Handbook (7th Edition):

Ngamsuriyaroj, Sudsanguan. “Performance Aspects of Security-Aware Database Systems.” 2002. Web. 21 Oct 2019.

Vancouver:

Ngamsuriyaroj S. Performance Aspects of Security-Aware Database Systems. [Internet] [Doctoral dissertation]. Penn State University; 2002. [cited 2019 Oct 21]. Available from: https://etda.libraries.psu.edu/catalog/5923.

Council of Science Editors:

Ngamsuriyaroj S. Performance Aspects of Security-Aware Database Systems. [Doctoral Dissertation]. Penn State University; 2002. Available from: https://etda.libraries.psu.edu/catalog/5923


Michigan State University

20. Knoester, David B. Using developmental learning for network intrusion detection.

Degree: MS, Department of Computer Science, 2004, Michigan State University

Subjects/Keywords: Computer networks – Security measures; Internet – Security measures; Computer security; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Knoester, D. B. (2004). Using developmental learning for network intrusion detection. (Masters Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:32386

Chicago Manual of Style (16th Edition):

Knoester, David B. “Using developmental learning for network intrusion detection.” 2004. Masters Thesis, Michigan State University. Accessed October 21, 2019. http://etd.lib.msu.edu/islandora/object/etd:32386.

MLA Handbook (7th Edition):

Knoester, David B. “Using developmental learning for network intrusion detection.” 2004. Web. 21 Oct 2019.

Vancouver:

Knoester DB. Using developmental learning for network intrusion detection. [Internet] [Masters thesis]. Michigan State University; 2004. [cited 2019 Oct 21]. Available from: http://etd.lib.msu.edu/islandora/object/etd:32386.

Council of Science Editors:

Knoester DB. Using developmental learning for network intrusion detection. [Masters Thesis]. Michigan State University; 2004. Available from: http://etd.lib.msu.edu/islandora/object/etd:32386


Aberystwyth University

21. Bilgin, Hatice Pinar. Regional Security in the Middle East: A Critical Security Studies Perspective .

Degree: 2000, Aberystwyth University

 This is a study of regional security in the Middle East from a Critical Security Studies perspective. The main aim of the thesis is to… (more)

Subjects/Keywords: regional security; Cold War; Critical Security Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bilgin, H. P. (2000). Regional Security in the Middle East: A Critical Security Studies Perspective . (Thesis). Aberystwyth University. Retrieved from http://hdl.handle.net/2160/1929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bilgin, Hatice Pinar. “Regional Security in the Middle East: A Critical Security Studies Perspective .” 2000. Thesis, Aberystwyth University. Accessed October 21, 2019. http://hdl.handle.net/2160/1929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bilgin, Hatice Pinar. “Regional Security in the Middle East: A Critical Security Studies Perspective .” 2000. Web. 21 Oct 2019.

Vancouver:

Bilgin HP. Regional Security in the Middle East: A Critical Security Studies Perspective . [Internet] [Thesis]. Aberystwyth University; 2000. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/2160/1929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bilgin HP. Regional Security in the Middle East: A Critical Security Studies Perspective . [Thesis]. Aberystwyth University; 2000. Available from: http://hdl.handle.net/2160/1929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

22. Cheung, Lai-sze. Delegation of rights using PKI-based components.

Degree: M. Phil., 2004, University of Hong Kong

toc

published_or_final_version

abstract

Computer Science

Master

Master of Philosophy

Advisors/Committee Members: Hui, CK.

Subjects/Keywords: Computer security.; Internet - Security measures.; Public key cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheung, L. (2004). Delegation of rights using PKI-based components. (Masters Thesis). University of Hong Kong. Retrieved from Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428

Chicago Manual of Style (16th Edition):

Cheung, Lai-sze. “Delegation of rights using PKI-based components.” 2004. Masters Thesis, University of Hong Kong. Accessed October 21, 2019. Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428.

MLA Handbook (7th Edition):

Cheung, Lai-sze. “Delegation of rights using PKI-based components.” 2004. Web. 21 Oct 2019.

Vancouver:

Cheung L. Delegation of rights using PKI-based components. [Internet] [Masters thesis]. University of Hong Kong; 2004. [cited 2019 Oct 21]. Available from: Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428.

Council of Science Editors:

Cheung L. Delegation of rights using PKI-based components. [Masters Thesis]. University of Hong Kong; 2004. Available from: Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428


Hong Kong University of Science and Technology

23. Ye, Ruyi. An economic model of investment in information security.

Degree: 2004, Hong Kong University of Science and Technology

 Information security is becoming an increasingly serious problem faced by many enterprises and organizations that perform part of their business processes via the Internet. It… (more)

Subjects/Keywords: Computer security  – Economic aspects; Electronic commerce  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ye, R. (2004). An economic model of investment in information security. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ye, Ruyi. “An economic model of investment in information security.” 2004. Thesis, Hong Kong University of Science and Technology. Accessed October 21, 2019. https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ye, Ruyi. “An economic model of investment in information security.” 2004. Web. 21 Oct 2019.

Vancouver:

Ye R. An economic model of investment in information security. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2004. [cited 2019 Oct 21]. Available from: https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ye R. An economic model of investment in information security. [Thesis]. Hong Kong University of Science and Technology; 2004. Available from: https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

24. Wong, Yung. A risk analysis model for enterprise network.

Degree: 2001, Hong Kong University of Science and Technology

 For a long time, there existed only guidelines for network security risk analysis. In risk analysis, methodologies existed for calculating the risks or losses are… (more)

Subjects/Keywords: Computer networks  – Security measures; Computer security; Risk assessment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, Y. (2001). A risk analysis model for enterprise network. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wong, Yung. “A risk analysis model for enterprise network.” 2001. Thesis, Hong Kong University of Science and Technology. Accessed October 21, 2019. https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wong, Yung. “A risk analysis model for enterprise network.” 2001. Web. 21 Oct 2019.

Vancouver:

Wong Y. A risk analysis model for enterprise network. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2001. [cited 2019 Oct 21]. Available from: https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wong Y. A risk analysis model for enterprise network. [Thesis]. Hong Kong University of Science and Technology; 2001. Available from: https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

25. Li, Chi-Pan. A distributed scheme to detect and defend against distributed denial of service attacks.

Degree: 2003, Hong Kong University of Science and Technology

 Distributed denial of service (DDoS) attacks present a serious threat to the Internet. They exhaust the critical resources at a target by engaging the power… (more)

Subjects/Keywords: Internet  – Security measures; Computer networks  – Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, C. (2003). A distributed scheme to detect and defend against distributed denial of service attacks. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Chi-Pan. “A distributed scheme to detect and defend against distributed denial of service attacks.” 2003. Thesis, Hong Kong University of Science and Technology. Accessed October 21, 2019. https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Chi-Pan. “A distributed scheme to detect and defend against distributed denial of service attacks.” 2003. Web. 21 Oct 2019.

Vancouver:

Li C. A distributed scheme to detect and defend against distributed denial of service attacks. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2003. [cited 2019 Oct 21]. Available from: https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li C. A distributed scheme to detect and defend against distributed denial of service attacks. [Thesis]. Hong Kong University of Science and Technology; 2003. Available from: https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Montana Tech

26. Ke, Mei. Computer database security and Oracle security implementation.

Degree: MS, 2001, Montana Tech

Subjects/Keywords: Database security.; Database security. fast (OCoLC)fst00888063

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ke, M. (2001). Computer database security and Oracle security implementation. (Masters Thesis). Montana Tech. Retrieved from https://scholarworks.umt.edu/etd/5092

Chicago Manual of Style (16th Edition):

Ke, Mei. “Computer database security and Oracle security implementation.” 2001. Masters Thesis, Montana Tech. Accessed October 21, 2019. https://scholarworks.umt.edu/etd/5092.

MLA Handbook (7th Edition):

Ke, Mei. “Computer database security and Oracle security implementation.” 2001. Web. 21 Oct 2019.

Vancouver:

Ke M. Computer database security and Oracle security implementation. [Internet] [Masters thesis]. Montana Tech; 2001. [cited 2019 Oct 21]. Available from: https://scholarworks.umt.edu/etd/5092.

Council of Science Editors:

Ke M. Computer database security and Oracle security implementation. [Masters Thesis]. Montana Tech; 2001. Available from: https://scholarworks.umt.edu/etd/5092


McGill University

27. Milton-Feasby, Christine. An exploration of the domains of work insecurity.

Degree: PhD, Faculty of Management., 2003, McGill University

 This thesis explores insecurity about four types of involuntary work transition. These are labeled here domain insecurities and include job facet insecurity, job loss insecurity,… (more)

Subjects/Keywords: Job security.; Security (Psychology); Adjustment (Psychology); Career changes.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Milton-Feasby, C. (2003). An exploration of the domains of work insecurity. (Doctoral Dissertation). McGill University. Retrieved from http://digitool.library.mcgill.ca/thesisfile84532.pdf

Chicago Manual of Style (16th Edition):

Milton-Feasby, Christine. “An exploration of the domains of work insecurity.” 2003. Doctoral Dissertation, McGill University. Accessed October 21, 2019. http://digitool.library.mcgill.ca/thesisfile84532.pdf.

MLA Handbook (7th Edition):

Milton-Feasby, Christine. “An exploration of the domains of work insecurity.” 2003. Web. 21 Oct 2019.

Vancouver:

Milton-Feasby C. An exploration of the domains of work insecurity. [Internet] [Doctoral dissertation]. McGill University; 2003. [cited 2019 Oct 21]. Available from: http://digitool.library.mcgill.ca/thesisfile84532.pdf.

Council of Science Editors:

Milton-Feasby C. An exploration of the domains of work insecurity. [Doctoral Dissertation]. McGill University; 2003. Available from: http://digitool.library.mcgill.ca/thesisfile84532.pdf


Aberystwyth University

28. Bilgin, Hatice Pinar. Regional security in the Middle East : a critical security studies perspective.

Degree: PhD, 2000, Aberystwyth University

 This is a study of regional security in the Middle East from a Critical Security Studies perspective. The main aim of the thesis is to… (more)

Subjects/Keywords: 327.170956; regional security; Cold War; Critical Security Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bilgin, H. P. (2000). Regional security in the Middle East : a critical security studies perspective. (Doctoral Dissertation). Aberystwyth University. Retrieved from http://hdl.handle.net/2160/2cb22a06-5783-4d11-8387-7cc38dfe4fc2

Chicago Manual of Style (16th Edition):

Bilgin, Hatice Pinar. “Regional security in the Middle East : a critical security studies perspective.” 2000. Doctoral Dissertation, Aberystwyth University. Accessed October 21, 2019. http://hdl.handle.net/2160/2cb22a06-5783-4d11-8387-7cc38dfe4fc2.

MLA Handbook (7th Edition):

Bilgin, Hatice Pinar. “Regional security in the Middle East : a critical security studies perspective.” 2000. Web. 21 Oct 2019.

Vancouver:

Bilgin HP. Regional security in the Middle East : a critical security studies perspective. [Internet] [Doctoral dissertation]. Aberystwyth University; 2000. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/2160/2cb22a06-5783-4d11-8387-7cc38dfe4fc2.

Council of Science Editors:

Bilgin HP. Regional security in the Middle East : a critical security studies perspective. [Doctoral Dissertation]. Aberystwyth University; 2000. Available from: http://hdl.handle.net/2160/2cb22a06-5783-4d11-8387-7cc38dfe4fc2


Aberystwyth University

29. Bilgin, Hatice Pinar. Regional security in the Middle East : a critical security studies perspective.

Degree: PhD, 2000, Aberystwyth University

 This is a study of regional security in the Middle East from a Critical Security Studies perspective. The main aim of the thesis is to… (more)

Subjects/Keywords: 327.170956; regional security; Cold War; Critical Security Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bilgin, H. P. (2000). Regional security in the Middle East : a critical security studies perspective. (Doctoral Dissertation). Aberystwyth University. Retrieved from https://pure.aber.ac.uk/portal/en/theses/regional-security-in-the-middle-east(2cb22a06-5783-4d11-8387-7cc38dfe4fc2).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420875

Chicago Manual of Style (16th Edition):

Bilgin, Hatice Pinar. “Regional security in the Middle East : a critical security studies perspective.” 2000. Doctoral Dissertation, Aberystwyth University. Accessed October 21, 2019. https://pure.aber.ac.uk/portal/en/theses/regional-security-in-the-middle-east(2cb22a06-5783-4d11-8387-7cc38dfe4fc2).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420875.

MLA Handbook (7th Edition):

Bilgin, Hatice Pinar. “Regional security in the Middle East : a critical security studies perspective.” 2000. Web. 21 Oct 2019.

Vancouver:

Bilgin HP. Regional security in the Middle East : a critical security studies perspective. [Internet] [Doctoral dissertation]. Aberystwyth University; 2000. [cited 2019 Oct 21]. Available from: https://pure.aber.ac.uk/portal/en/theses/regional-security-in-the-middle-east(2cb22a06-5783-4d11-8387-7cc38dfe4fc2).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420875.

Council of Science Editors:

Bilgin HP. Regional security in the Middle East : a critical security studies perspective. [Doctoral Dissertation]. Aberystwyth University; 2000. Available from: https://pure.aber.ac.uk/portal/en/theses/regional-security-in-the-middle-east(2cb22a06-5783-4d11-8387-7cc38dfe4fc2).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420875

30. NG KENG SENG. Securing mobile ad hoc network routing protocols.

Degree: 2004, National University of Singapore

Subjects/Keywords: Ad hoc Networks; Security; Routing; Security Extension; Simulation; Performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

SENG, N. K. (2004). Securing mobile ad hoc network routing protocols. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/13862

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

SENG, NG KENG. “Securing mobile ad hoc network routing protocols.” 2004. Thesis, National University of Singapore. Accessed October 21, 2019. http://scholarbank.nus.edu.sg/handle/10635/13862.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

SENG, NG KENG. “Securing mobile ad hoc network routing protocols.” 2004. Web. 21 Oct 2019.

Vancouver:

SENG NK. Securing mobile ad hoc network routing protocols. [Internet] [Thesis]. National University of Singapore; 2004. [cited 2019 Oct 21]. Available from: http://scholarbank.nus.edu.sg/handle/10635/13862.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

SENG NK. Securing mobile ad hoc network routing protocols. [Thesis]. National University of Singapore; 2004. Available from: http://scholarbank.nus.edu.sg/handle/10635/13862

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [19]

.