Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Attack graph). Showing records 1 – 23 of 23 total matches.

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


California State University – Sacramento

1. Appana, Pranavi. Mission impact analysis in enterprise networks.

Degree: MS, Computer Science, 2017, California State University – Sacramento

 An intruder attacks a computer network and breaks into it by exploiting a combination of system vulnerabilities. An attack graph models security vulnerabilities of a… (more)

Subjects/Keywords: Mission impact analysis; Mission impact graph; Attack graph; Ranking for mission impact graph

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Appana, P. (2017). Mission impact analysis in enterprise networks. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.3/198818

Chicago Manual of Style (16th Edition):

Appana, Pranavi. “Mission impact analysis in enterprise networks.” 2017. Masters Thesis, California State University – Sacramento. Accessed October 16, 2019. http://hdl.handle.net/10211.3/198818.

MLA Handbook (7th Edition):

Appana, Pranavi. “Mission impact analysis in enterprise networks.” 2017. Web. 16 Oct 2019.

Vancouver:

Appana P. Mission impact analysis in enterprise networks. [Internet] [Masters thesis]. California State University – Sacramento; 2017. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10211.3/198818.

Council of Science Editors:

Appana P. Mission impact analysis in enterprise networks. [Masters Thesis]. California State University – Sacramento; 2017. Available from: http://hdl.handle.net/10211.3/198818

2. Aguessy, François-Xavier. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.

Degree: Docteur es, Informatique, 2016, Evry, Institut national des télécommunications

Les systèmes d'information sont une cible de plus en plus attractive pour les attaquants. Dans cette thèse de doctorat, nous construisons une méthodologie complète d'analyse… (more)

Subjects/Keywords: Graphes d'attaque; Évaluation dynamique de risque; Modélisation d'attaques; Modèles d’attaques bayésiens; Attack graph; Dynamic risk assessment; Attack modelling; Bayesian attack model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aguessy, F. (2016). Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2016TELE0016

Chicago Manual of Style (16th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed October 16, 2019. http://www.theses.fr/2016TELE0016.

MLA Handbook (7th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Web. 16 Oct 2019.

Vancouver:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2016. [cited 2019 Oct 16]. Available from: http://www.theses.fr/2016TELE0016.

Council of Science Editors:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2016. Available from: http://www.theses.fr/2016TELE0016


Virginia Tech

3. Saha, Sudip. Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Many real word networks exhibit cascading phenomena, e.g., disease outbreaks in social contact networks, malware propagation in computer networks, failures in cyber-physical systems such as… (more)

Subjects/Keywords: Failure Cacades; Epidemic Containment; Stealthy diffusion; Game theory; Attack graph

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saha, S. (2016). Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/82711

Chicago Manual of Style (16th Edition):

Saha, Sudip. “Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity.” 2016. Doctoral Dissertation, Virginia Tech. Accessed October 16, 2019. http://hdl.handle.net/10919/82711.

MLA Handbook (7th Edition):

Saha, Sudip. “Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity.” 2016. Web. 16 Oct 2019.

Vancouver:

Saha S. Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10919/82711.

Council of Science Editors:

Saha S. Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/82711


Rochester Institute of Technology

4. Rawlins, Ryan T. Scalable Automation of Online Network Attack Characterization.

Degree: MS, Computer Engineering, 2014, Rochester Institute of Technology

  Cyber attacks to enterprise networks and critical infrastructures are becoming more prevalent and diverse. Timely recognition of attack strategies and behaviors will assist analysts… (more)

Subjects/Keywords: Attack social graph; Cyber security; Feature selection; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawlins, R. T. (2014). Scalable Automation of Online Network Attack Characterization. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8369

Chicago Manual of Style (16th Edition):

Rawlins, Ryan T. “Scalable Automation of Online Network Attack Characterization.” 2014. Masters Thesis, Rochester Institute of Technology. Accessed October 16, 2019. https://scholarworks.rit.edu/theses/8369.

MLA Handbook (7th Edition):

Rawlins, Ryan T. “Scalable Automation of Online Network Attack Characterization.” 2014. Web. 16 Oct 2019.

Vancouver:

Rawlins RT. Scalable Automation of Online Network Attack Characterization. [Internet] [Masters thesis]. Rochester Institute of Technology; 2014. [cited 2019 Oct 16]. Available from: https://scholarworks.rit.edu/theses/8369.

Council of Science Editors:

Rawlins RT. Scalable Automation of Online Network Attack Characterization. [Masters Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8369


Iowa State University

5. Wang, Wei. A graph oriented approach for network forensic analysis.

Degree: 2010, Iowa State University

 Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario.… (more)

Subjects/Keywords: attack scenario reconstruction; evidence graph; hierarchical reasoning framework; network forensics; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, W. (2010). A graph oriented approach for network forensic analysis. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/11736

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Wei. “A graph oriented approach for network forensic analysis.” 2010. Thesis, Iowa State University. Accessed October 16, 2019. https://lib.dr.iastate.edu/etd/11736.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Wei. “A graph oriented approach for network forensic analysis.” 2010. Web. 16 Oct 2019.

Vancouver:

Wang W. A graph oriented approach for network forensic analysis. [Internet] [Thesis]. Iowa State University; 2010. [cited 2019 Oct 16]. Available from: https://lib.dr.iastate.edu/etd/11736.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang W. A graph oriented approach for network forensic analysis. [Thesis]. Iowa State University; 2010. Available from: https://lib.dr.iastate.edu/etd/11736

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Hamid, Thaier K. A. Attack graph approach to dynamic network vulnerability analysis and countermeasures.

Degree: PhD, 2014, University of Bedfordshire

 It is widely accepted that modern computer networks (often presented as a heterogeneous collection of functioning organisations, applications, software, and hardware) contain vulnerabilities. This research… (more)

Subjects/Keywords: 005.8; attack graph; dynamic network; attack graphs; computer networking; Dynamic Vulnerability Scoring System; G490 Computing Science not elsewhere classified; network attacks; network vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hamid, T. K. A. (2014). Attack graph approach to dynamic network vulnerability analysis and countermeasures. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/576432

Chicago Manual of Style (16th Edition):

Hamid, Thaier K A. “Attack graph approach to dynamic network vulnerability analysis and countermeasures.” 2014. Doctoral Dissertation, University of Bedfordshire. Accessed October 16, 2019. http://hdl.handle.net/10547/576432.

MLA Handbook (7th Edition):

Hamid, Thaier K A. “Attack graph approach to dynamic network vulnerability analysis and countermeasures.” 2014. Web. 16 Oct 2019.

Vancouver:

Hamid TKA. Attack graph approach to dynamic network vulnerability analysis and countermeasures. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2014. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10547/576432.

Council of Science Editors:

Hamid TKA. Attack graph approach to dynamic network vulnerability analysis and countermeasures. [Doctoral Dissertation]. University of Bedfordshire; 2014. Available from: http://hdl.handle.net/10547/576432


KTH

7. Mao, Xinyue. Visualization and Natural Language Representation of Simulated Cyber Attacks.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators… (more)

Subjects/Keywords: attack path visualization; taxonomy for attack graph; natural language representation; attackvägsvisualisering; taxonomi för attackgraf; naturlig språkrepresentation; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mao, X. (2018). Visualization and Natural Language Representation of Simulated Cyber Attacks. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mao, Xinyue. “Visualization and Natural Language Representation of Simulated Cyber Attacks.” 2018. Thesis, KTH. Accessed October 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mao, Xinyue. “Visualization and Natural Language Representation of Simulated Cyber Attacks.” 2018. Web. 16 Oct 2019.

Vancouver:

Mao X. Visualization and Natural Language Representation of Simulated Cyber Attacks. [Internet] [Thesis]. KTH; 2018. [cited 2019 Oct 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mao X. Visualization and Natural Language Representation of Simulated Cyber Attacks. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

8. Lemay, Elizabeth. Adversary-driven state-based system security evaluation.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 Quantitative metrics can aid decision-makers in making informed trade-off decisions. In system-level security decisions, quantitative security metrics allow decision-makers to compare the relative security of… (more)

Subjects/Keywords: model-based quantitative security metrics; system security analysis; attack execution graph; executable security models; attack step decision function; state look-ahead tree; ADversary VIew Security Evaluation (ADVISE) method

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lemay, E. (2012). Adversary-driven state-based system security evaluation. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/29707

Chicago Manual of Style (16th Edition):

Lemay, Elizabeth. “Adversary-driven state-based system security evaluation.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 16, 2019. http://hdl.handle.net/2142/29707.

MLA Handbook (7th Edition):

Lemay, Elizabeth. “Adversary-driven state-based system security evaluation.” 2012. Web. 16 Oct 2019.

Vancouver:

Lemay E. Adversary-driven state-based system security evaluation. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/2142/29707.

Council of Science Editors:

Lemay E. Adversary-driven state-based system security evaluation. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/29707


Linnaeus University

9. Frankeline, Tanyi. Attack Modeling and Risk Assessments in Software Defined networking (SDN).

Degree: computer science and media technology (CM), 2019, Linnaeus University

  Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made… (more)

Subjects/Keywords: SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis; Other Engineering and Technologies not elsewhere specified; Övrig annan teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frankeline, T. (2019). Attack Modeling and Risk Assessments in Software Defined networking (SDN). (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-88806

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frankeline, Tanyi. “Attack Modeling and Risk Assessments in Software Defined networking (SDN).” 2019. Thesis, Linnaeus University. Accessed October 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-88806.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frankeline, Tanyi. “Attack Modeling and Risk Assessments in Software Defined networking (SDN).” 2019. Web. 16 Oct 2019.

Vancouver:

Frankeline T. Attack Modeling and Risk Assessments in Software Defined networking (SDN). [Internet] [Thesis]. Linnaeus University; 2019. [cited 2019 Oct 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-88806.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frankeline T. Attack Modeling and Risk Assessments in Software Defined networking (SDN). [Thesis]. Linnaeus University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-88806

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

10. Ibrahim, Mariam Wajdi. Metrics for Secrecy and Resilience in Cyber-Physical-Systems.

Degree: 2016, Iowa State University

 In this dissertation, we study the problem of Secrecy and Resiliency quantification for cyber physical systems. Secrecy (also known as confidentiality) refers to the ability… (more)

Subjects/Keywords: attack graph; Jensen-Shannon Divergence; mutual information; partially-observed stochastic discrete event systems; resiliency; Secrecy; Electrical and Electronics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ibrahim, M. W. (2016). Metrics for Secrecy and Resilience in Cyber-Physical-Systems. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/15724

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ibrahim, Mariam Wajdi. “Metrics for Secrecy and Resilience in Cyber-Physical-Systems.” 2016. Thesis, Iowa State University. Accessed October 16, 2019. https://lib.dr.iastate.edu/etd/15724.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ibrahim, Mariam Wajdi. “Metrics for Secrecy and Resilience in Cyber-Physical-Systems.” 2016. Web. 16 Oct 2019.

Vancouver:

Ibrahim MW. Metrics for Secrecy and Resilience in Cyber-Physical-Systems. [Internet] [Thesis]. Iowa State University; 2016. [cited 2019 Oct 16]. Available from: https://lib.dr.iastate.edu/etd/15724.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ibrahim MW. Metrics for Secrecy and Resilience in Cyber-Physical-Systems. [Thesis]. Iowa State University; 2016. Available from: https://lib.dr.iastate.edu/etd/15724

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Sacramento

11. Suryavanshi, Rajani Mohan. Ranking system object instance graph.

Degree: 2019, California State University – Sacramento

 Defending today???s enterprise network has become more and more challenging considering the increasing amount of cyber-attacks. It is critical to understand how an attack happens… (more)

Subjects/Keywords: Asset rank; Page rank; Network security; Enterprise security; System object instance graph; Zero-day attack path

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Suryavanshi, R. M. (2019). Ranking system object instance graph. (Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.3/207979

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Suryavanshi, Rajani Mohan. “Ranking system object instance graph.” 2019. Thesis, California State University – Sacramento. Accessed October 16, 2019. http://hdl.handle.net/10211.3/207979.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Suryavanshi, Rajani Mohan. “Ranking system object instance graph.” 2019. Web. 16 Oct 2019.

Vancouver:

Suryavanshi RM. Ranking system object instance graph. [Internet] [Thesis]. California State University – Sacramento; 2019. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10211.3/207979.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Suryavanshi RM. Ranking system object instance graph. [Thesis]. California State University – Sacramento; 2019. Available from: http://hdl.handle.net/10211.3/207979

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Homer, John. A comprehensive approach to enterprise network security management.

Degree: PhD, Department of Computing and Information Sciences, 2009, Kansas State University

 Enterprise network security management is a vitally important task, more so now than ever before. Networks grow ever larger and more complex, and corporations, universities,… (more)

Subjects/Keywords: Enterprise network security analysis; Risk assessment; Attack Graph; Enterprise network configuration management; Security metric; Computer Science (0984)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Homer, J. (2009). A comprehensive approach to enterprise network security management. (Doctoral Dissertation). Kansas State University. Retrieved from http://hdl.handle.net/2097/1372

Chicago Manual of Style (16th Edition):

Homer, John. “A comprehensive approach to enterprise network security management.” 2009. Doctoral Dissertation, Kansas State University. Accessed October 16, 2019. http://hdl.handle.net/2097/1372.

MLA Handbook (7th Edition):

Homer, John. “A comprehensive approach to enterprise network security management.” 2009. Web. 16 Oct 2019.

Vancouver:

Homer J. A comprehensive approach to enterprise network security management. [Internet] [Doctoral dissertation]. Kansas State University; 2009. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/2097/1372.

Council of Science Editors:

Homer J. A comprehensive approach to enterprise network security management. [Doctoral Dissertation]. Kansas State University; 2009. Available from: http://hdl.handle.net/2097/1372


Mississippi State University

13. Nandi, Apurba Kumer. Network interdiction models and algorithms for information security.

Degree: PhD, Industrial and Systems Engineering, 2016, Mississippi State University

  Major cyber attacks against the cyber networks of organizations has become a common phenomenon nowadays. Cyber attacks are carried out both through the spread… (more)

Subjects/Keywords: constraint and column generation; multi-level programming; bi-level programming; Mixed Integer programming; cyber security; Attack graph; Network; Interdiction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nandi, A. K. (2016). Network interdiction models and algorithms for information security. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;

Chicago Manual of Style (16th Edition):

Nandi, Apurba Kumer. “Network interdiction models and algorithms for information security.” 2016. Doctoral Dissertation, Mississippi State University. Accessed October 16, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;.

MLA Handbook (7th Edition):

Nandi, Apurba Kumer. “Network interdiction models and algorithms for information security.” 2016. Web. 16 Oct 2019.

Vancouver:

Nandi AK. Network interdiction models and algorithms for information security. [Internet] [Doctoral dissertation]. Mississippi State University; 2016. [cited 2019 Oct 16]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;.

Council of Science Editors:

Nandi AK. Network interdiction models and algorithms for information security. [Doctoral Dissertation]. Mississippi State University; 2016. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;


Linnaeus University

14. Nariman, Goran Saman. A Framework for Secure Structural Adaptation.

Degree: computer science and media technology (CM), 2018, Linnaeus University

  A (self-) adaptive system is a system that can dynamically adapt its behavior or structure during execution to "adapt" to changes to its environment… (more)

Subjects/Keywords: Self-Adaptive System; Adaptive System; Security; Threat Models; Security Metrics; Structural Adaptation; Reconfiguration Plan; Security Level; Graph-based Threat Models; Dynamic Reconfiguration; Structural Reconfiguration; Attack Graphs; T-HARM; Attack Trees; Attack Graphs Generation; MulVAL; Computer Sciences; Datavetenskap (datalogi); Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nariman, G. S. (2018). A Framework for Secure Structural Adaptation. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nariman, Goran Saman. “A Framework for Secure Structural Adaptation.” 2018. Thesis, Linnaeus University. Accessed October 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nariman, Goran Saman. “A Framework for Secure Structural Adaptation.” 2018. Web. 16 Oct 2019.

Vancouver:

Nariman GS. A Framework for Secure Structural Adaptation. [Internet] [Thesis]. Linnaeus University; 2018. [cited 2019 Oct 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nariman GS. A Framework for Secure Structural Adaptation. [Thesis]. Linnaeus University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. SUHENDRY EFFENDY. GRAPH PROPERTIES AND ALGORITHMS IN SOCIAL NETWORKS: PRIVACY, SYBIL ATTACKS, AND THE COMPUTER SCIENCE COMMUNITY.

Degree: 2017, National University of Singapore

Subjects/Keywords: graph; social network; privacy; sybil attack; relatedness measure; automatic conference categorization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

EFFENDY, S. (2017). GRAPH PROPERTIES AND ALGORITHMS IN SOCIAL NETWORKS: PRIVACY, SYBIL ATTACKS, AND THE COMPUTER SCIENCE COMMUNITY. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/144397

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

EFFENDY, SUHENDRY. “GRAPH PROPERTIES AND ALGORITHMS IN SOCIAL NETWORKS: PRIVACY, SYBIL ATTACKS, AND THE COMPUTER SCIENCE COMMUNITY.” 2017. Thesis, National University of Singapore. Accessed October 16, 2019. http://scholarbank.nus.edu.sg/handle/10635/144397.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

EFFENDY, SUHENDRY. “GRAPH PROPERTIES AND ALGORITHMS IN SOCIAL NETWORKS: PRIVACY, SYBIL ATTACKS, AND THE COMPUTER SCIENCE COMMUNITY.” 2017. Web. 16 Oct 2019.

Vancouver:

EFFENDY S. GRAPH PROPERTIES AND ALGORITHMS IN SOCIAL NETWORKS: PRIVACY, SYBIL ATTACKS, AND THE COMPUTER SCIENCE COMMUNITY. [Internet] [Thesis]. National University of Singapore; 2017. [cited 2019 Oct 16]. Available from: http://scholarbank.nus.edu.sg/handle/10635/144397.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

EFFENDY S. GRAPH PROPERTIES AND ALGORITHMS IN SOCIAL NETWORKS: PRIVACY, SYBIL ATTACKS, AND THE COMPUTER SCIENCE COMMUNITY. [Thesis]. National University of Singapore; 2017. Available from: http://scholarbank.nus.edu.sg/handle/10635/144397

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Chatterjee, Swapnanjan. DrAGON: A Framework for Computing Preferred Defense Policies from Logical Attack Graphs.

Degree: 2014, Iowa State University

Attack graphs provide formalism for modelling the vulnerabilities using a compact representation scheme. Two of the most popular attack graph representations are scenario attack graphs,… (more)

Subjects/Keywords: attack graph; defense policy; logical attack graphs; network; preference; security; Computer Sciences

…of the most popular attack graph representations are scenario attack graphs, and logical… …develop a framework for analyzing the attack graph from a defender perspective. Given an acyclic… …logical dependency attack graph we compute defense policies that cover all known exploits that… …are assigned to the vulnerabilities (exploits), our framework allows attack graph… …for vulnerabilities in the attack graph. Our framework generates a preferred order of… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chatterjee, S. (2014). DrAGON: A Framework for Computing Preferred Defense Policies from Logical Attack Graphs. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/13954

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chatterjee, Swapnanjan. “DrAGON: A Framework for Computing Preferred Defense Policies from Logical Attack Graphs.” 2014. Thesis, Iowa State University. Accessed October 16, 2019. https://lib.dr.iastate.edu/etd/13954.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chatterjee, Swapnanjan. “DrAGON: A Framework for Computing Preferred Defense Policies from Logical Attack Graphs.” 2014. Web. 16 Oct 2019.

Vancouver:

Chatterjee S. DrAGON: A Framework for Computing Preferred Defense Policies from Logical Attack Graphs. [Internet] [Thesis]. Iowa State University; 2014. [cited 2019 Oct 16]. Available from: https://lib.dr.iastate.edu/etd/13954.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chatterjee S. DrAGON: A Framework for Computing Preferred Defense Policies from Logical Attack Graphs. [Thesis]. Iowa State University; 2014. Available from: https://lib.dr.iastate.edu/etd/13954

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Liu, Changwei. A Probabilistic Logic Programming Based Model for Network Forensics .

Degree: 2015, George Mason University

 Network forensics is the science that addresses the capture, recording and analysis of network events and traffic for detecting intrusions and investigating them, attributing blame… (more)

Subjects/Keywords: Computer science; Attack scenario; Cyber attack; Digital evidence; Evidence graph; Logic programming; Network forensics

…101 7.2.1 MulVAL, XSB and Logical Attack Graph… …9 Figure 2.2: MulVAL generated attack graph… …17 Figure 3.1: An Example Attack Graph… …24 Figure 3.2: Example Probabilistic Attack Graph… …30 Figure 3.4: Experiment Probabilistic Attack graph… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, C. (2015). A Probabilistic Logic Programming Based Model for Network Forensics . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/10197

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Changwei. “A Probabilistic Logic Programming Based Model for Network Forensics .” 2015. Thesis, George Mason University. Accessed October 16, 2019. http://hdl.handle.net/1920/10197.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Changwei. “A Probabilistic Logic Programming Based Model for Network Forensics .” 2015. Web. 16 Oct 2019.

Vancouver:

Liu C. A Probabilistic Logic Programming Based Model for Network Forensics . [Internet] [Thesis]. George Mason University; 2015. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/1920/10197.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu C. A Probabilistic Logic Programming Based Model for Network Forensics . [Thesis]. George Mason University; 2015. Available from: http://hdl.handle.net/1920/10197

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Arizona State University

18. Chung, Chun-Jen. SDN-based Proactive Defense Mechanism in a Cloud System.

Degree: Computer Science, 2015, Arizona State University

Subjects/Keywords: Computer science; Attack Graph; Cloud Computing; Cloud Security; Cybersecurity; Network security; Software Defined Networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung, C. (2015). SDN-based Proactive Defense Mechanism in a Cloud System. (Doctoral Dissertation). Arizona State University. Retrieved from http://repository.asu.edu/items/34850

Chicago Manual of Style (16th Edition):

Chung, Chun-Jen. “SDN-based Proactive Defense Mechanism in a Cloud System.” 2015. Doctoral Dissertation, Arizona State University. Accessed October 16, 2019. http://repository.asu.edu/items/34850.

MLA Handbook (7th Edition):

Chung, Chun-Jen. “SDN-based Proactive Defense Mechanism in a Cloud System.” 2015. Web. 16 Oct 2019.

Vancouver:

Chung C. SDN-based Proactive Defense Mechanism in a Cloud System. [Internet] [Doctoral dissertation]. Arizona State University; 2015. [cited 2019 Oct 16]. Available from: http://repository.asu.edu/items/34850.

Council of Science Editors:

Chung C. SDN-based Proactive Defense Mechanism in a Cloud System. [Doctoral Dissertation]. Arizona State University; 2015. Available from: http://repository.asu.edu/items/34850


University of Florida

19. VEREMYEV,ALEXANDER F. Modeling and Optimization Approaches for Ensuring Robustness in Networked and Financial Systems.

Degree: PhD, Industrial and Systems Engineering, 2011, University of Florida

Our work develops theoretical principles and optimization Advisors/Committee Members: Uryasev, Stanislav (committee chair), Pardalos, Panagote M (committee member), Yan, Liqing (committee member).

Subjects/Keywords: Connectivity; Credit ratings; Data smoothing; Diameters; Entropy; Linear programming; Mathematical robustness; Natural logarithms; Optimal solutions; Payments; ATTACK  – CDO  – CLIQUE  – CLUSTER  – DESIGN  – ENTROPY  – GRAPH  – NETWORK  – OPTIMIZATION  – RANDOM  – ROBUST

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

F, V. (2011). Modeling and Optimization Approaches for Ensuring Robustness in Networked and Financial Systems. (Doctoral Dissertation). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0042699

Chicago Manual of Style (16th Edition):

F, VEREMYEV,ALEXANDER. “Modeling and Optimization Approaches for Ensuring Robustness in Networked and Financial Systems.” 2011. Doctoral Dissertation, University of Florida. Accessed October 16, 2019. http://ufdc.ufl.edu/UFE0042699.

MLA Handbook (7th Edition):

F, VEREMYEV,ALEXANDER. “Modeling and Optimization Approaches for Ensuring Robustness in Networked and Financial Systems.” 2011. Web. 16 Oct 2019.

Vancouver:

F V. Modeling and Optimization Approaches for Ensuring Robustness in Networked and Financial Systems. [Internet] [Doctoral dissertation]. University of Florida; 2011. [cited 2019 Oct 16]. Available from: http://ufdc.ufl.edu/UFE0042699.

Council of Science Editors:

F V. Modeling and Optimization Approaches for Ensuring Robustness in Networked and Financial Systems. [Doctoral Dissertation]. University of Florida; 2011. Available from: http://ufdc.ufl.edu/UFE0042699

20. Zhang, Su. Quantitative risk assessment under multi-context environments.

Degree: PhD, Department of Computing and Information Sciences, 2014, Kansas State University

 If you cannot measure it, you cannot improve it. Quantifying security with metrics is important not only because we want to have a scoring system… (more)

Subjects/Keywords: Vulnerability assessment; Quantitative risk assessment; Cloud computing security; Zero-day vulnerability assessment; Software dependency risk assessment; Network security (attack graph); Computer Science (0984)

…its attack graph . . . . . . . . . . . . . . . . . . 16 2.2 Scenario of example two and… …its attack graph . . . . . . . . . . . . . . . . . . 17 2.3 Before and after reachability… …Existing work like attack graph and risk assessment algorithm on top of it has been developed in… …need to be well addressed. Attack graph for a mid-sized network can be difficult to… …Security Evaluation Attack graph technique has become a common tool for network security… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, S. (2014). Quantitative risk assessment under multi-context environments. (Doctoral Dissertation). Kansas State University. Retrieved from http://hdl.handle.net/2097/18634

Chicago Manual of Style (16th Edition):

Zhang, Su. “Quantitative risk assessment under multi-context environments.” 2014. Doctoral Dissertation, Kansas State University. Accessed October 16, 2019. http://hdl.handle.net/2097/18634.

MLA Handbook (7th Edition):

Zhang, Su. “Quantitative risk assessment under multi-context environments.” 2014. Web. 16 Oct 2019.

Vancouver:

Zhang S. Quantitative risk assessment under multi-context environments. [Internet] [Doctoral dissertation]. Kansas State University; 2014. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/2097/18634.

Council of Science Editors:

Zhang S. Quantitative risk assessment under multi-context environments. [Doctoral Dissertation]. Kansas State University; 2014. Available from: http://hdl.handle.net/2097/18634

21. Tan, Enhua. Spam Analysis and Detection for User Generated Content in Online Social Networks.

Degree: PhD, Computer Science and Engineering, 2013, The Ohio State University

 Recent years have witnessed the success of a number of online social networks(OSNs) and explosive increasing of social media. These social networking andsocial media sites… (more)

Subjects/Keywords: Computer Engineering; Computer Science; user generated content; online social networks; user behavior; stretched exponential distribution; spam filtering; spam detection; spam classification; decision tree; social graph; user-link graph; Sybil attack; community detection; BARS; UNIK

…1.2.2 Analysis and Detection of Spam in User Generated Content 1.2.3 Social Graph based… …39 42 42 45 47 49 51 53 54 55 56 56 59 60 61 62 64 64 65 65 68 70 71 73 Social Graph based… …Attack . . . . . . . . . . . . . . . . 4.5.5 Legitimate URL Inclusion Attack… …Blog post stats over time (stack graph) . . . . . . . . . . . . . . . . . 45 xv… …Conductance of the user graph (social graph + user-link graph) of original dataset… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, E. (2013). Spam Analysis and Detection for User Generated Content in Online Social Networks. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334

Chicago Manual of Style (16th Edition):

Tan, Enhua. “Spam Analysis and Detection for User Generated Content in Online Social Networks.” 2013. Doctoral Dissertation, The Ohio State University. Accessed October 16, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.

MLA Handbook (7th Edition):

Tan, Enhua. “Spam Analysis and Detection for User Generated Content in Online Social Networks.” 2013. Web. 16 Oct 2019.

Vancouver:

Tan E. Spam Analysis and Detection for User Generated Content in Online Social Networks. [Internet] [Doctoral dissertation]. The Ohio State University; 2013. [cited 2019 Oct 16]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334.

Council of Science Editors:

Tan E. Spam Analysis and Detection for User Generated Content in Online Social Networks. [Doctoral Dissertation]. The Ohio State University; 2013. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1365520334

22. Karlström, Daniel. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level.

Degree: Design and Engineering, 2012, Mälardalen University

Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking… (more)

Subjects/Keywords: pmacct; statistical analysis; bgp; peer; peering; routing; route; quagga; virtual router; virtual; router; linux; graph; graphing; mrtg; database; mysql; script; scripting; python; bash; libpcap; mdh; data collection; data; collection; collecting; ISP; internet service provider; DoS; DDoS; attack; pmacct; statistisk analys; bgp; peer; peering; peera; routing; route; quagga; virtuell router; virtuell; router; linux; graf; grafa; mrtg; databas; mysql; script; scripting; python; bash; libpcap; mdh; datainsamling; insamling; data; ISP; internetleverantör; DoS; DDoS; attack; Computer Engineering; Datorteknik

…particular address. Also called a gateway. DoS Denial of Service, an attack that consists of… …of DoS-attacks that utilizes several computers working in unison to attack a target. GNS3… …outside world, in case of an attack. These attacks vary both in difficulty and execution time… …users would experience the site as slow or unresponsive. Another type of attack involves… …timestamps and history. Illustration 6: Example MRTG graph. Image courtesy of Tobias Oetiker 23… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karlström, D. (2012). Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level. (Thesis). Mälardalen University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-16140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Karlström, Daniel. “Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level.” 2012. Thesis, Mälardalen University. Accessed October 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-16140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Karlström, Daniel. “Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level.” 2012. Web. 16 Oct 2019.

Vancouver:

Karlström D. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level. [Internet] [Thesis]. Mälardalen University; 2012. [cited 2019 Oct 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-16140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Karlström D. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level. [Thesis]. Mälardalen University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-16140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Thames, John Lane. Advancing cyber security with a semantic path merger packet classification algorithm.

Degree: PhD, Electrical and Computer Engineering, 2012, Georgia Tech

 This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active… (more)

Subjects/Keywords: Computational semantics; Graph theory; Hardware algorithms; Attack detection; Distributed internet security; Packet classification; Intrusion detection; Semantic association; Semantic networks; Content addressable memory; SRAM-based trie pipelines; Hardware-based trie pipelines; Computational intelligence; Neural networks; Parametric optimization; Genetic algorithms; Self-organizing maps; Ensemble intelligence; Firewalls; Routing; Packet filters; Cyber intelligence (Computer security); Algorithms; Cyberterrorism; Denial of service attacks; Anomaly detection (Computer security)

…83 33 The family of graph transformations of the semantic association system. . . 88 34… …graph transformation of the MBTs from Figure 35. 97 37 The directed acyclic graph produced… …CPHG Colored Path Hypergraph. DAG Directed Acyclycic Graph. DARPA Defense Advanced… …Operation. FCF Firewall Collaboration Framework. FDAG Filter Directed Acyclic Graph. FDR… …Directed Acyclic Graph. PMM Policy Management Module. PMP Path Merger Process. PPR Positive… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thames, J. L. (2012). Advancing cyber security with a semantic path merger packet classification algorithm. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/45872

Chicago Manual of Style (16th Edition):

Thames, John Lane. “Advancing cyber security with a semantic path merger packet classification algorithm.” 2012. Doctoral Dissertation, Georgia Tech. Accessed October 16, 2019. http://hdl.handle.net/1853/45872.

MLA Handbook (7th Edition):

Thames, John Lane. “Advancing cyber security with a semantic path merger packet classification algorithm.” 2012. Web. 16 Oct 2019.

Vancouver:

Thames JL. Advancing cyber security with a semantic path merger packet classification algorithm. [Internet] [Doctoral dissertation]. Georgia Tech; 2012. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/1853/45872.

Council of Science Editors:

Thames JL. Advancing cyber security with a semantic path merger packet classification algorithm. [Doctoral Dissertation]. Georgia Tech; 2012. Available from: http://hdl.handle.net/1853/45872

.