Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Attack modelling). Showing records 1 – 9 of 9 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Aguessy, François-Xavier. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.

Degree: Docteur es, Informatique, 2016, Evry, Institut national des télécommunications

Les systèmes d'information sont une cible de plus en plus attractive pour les attaquants. Dans cette thèse de doctorat, nous construisons une méthodologie complète d'analyse… (more)

Subjects/Keywords: Graphes d'attaque; Évaluation dynamique de risque; Modélisation d'attaques; Modèles d’attaques bayésiens; Attack graph; Dynamic risk assessment; Attack modelling; Bayesian attack model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aguessy, F. (2016). Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2016TELE0016

Chicago Manual of Style (16th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed March 28, 2020. http://www.theses.fr/2016TELE0016.

MLA Handbook (7th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Web. 28 Mar 2020.

Vancouver:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2016. [cited 2020 Mar 28]. Available from: http://www.theses.fr/2016TELE0016.

Council of Science Editors:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2016. Available from: http://www.theses.fr/2016TELE0016


University of New South Wales

2. Yu, Yuguo. Numerical Analysis of Mineralogical and Mechanical Deterioration of Cementitious Materials under Various Leaching and External Sulfate Attack.

Degree: Engineering & Information Technology, 2017, University of New South Wales

 The excellent performance of cementitious materials in normal service environment has long been recognised. However, cementitious materials may suffer from serious deterioration when subjected to… (more)

Subjects/Keywords: Durability; Cementitious material; Chemical attack; Material deterioration; Mechanical deterioration; Numerical modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, Y. (2017). Numerical Analysis of Mineralogical and Mechanical Deterioration of Cementitious Materials under Various Leaching and External Sulfate Attack. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/57985 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45239/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Yu, Yuguo. “Numerical Analysis of Mineralogical and Mechanical Deterioration of Cementitious Materials under Various Leaching and External Sulfate Attack.” 2017. Doctoral Dissertation, University of New South Wales. Accessed March 28, 2020. http://handle.unsw.edu.au/1959.4/57985 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45239/SOURCE02?view=true.

MLA Handbook (7th Edition):

Yu, Yuguo. “Numerical Analysis of Mineralogical and Mechanical Deterioration of Cementitious Materials under Various Leaching and External Sulfate Attack.” 2017. Web. 28 Mar 2020.

Vancouver:

Yu Y. Numerical Analysis of Mineralogical and Mechanical Deterioration of Cementitious Materials under Various Leaching and External Sulfate Attack. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2020 Mar 28]. Available from: http://handle.unsw.edu.au/1959.4/57985 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45239/SOURCE02?view=true.

Council of Science Editors:

Yu Y. Numerical Analysis of Mineralogical and Mechanical Deterioration of Cementitious Materials under Various Leaching and External Sulfate Attack. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/57985 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45239/SOURCE02?view=true


University of Ottawa

3. Roshan, Arman. Different Approaches to Model Cover-Cracking of RC Structures due to Corrosion .

Degree: 2018, University of Ottawa

 This thesis presents three different approaches to model corrosion-induced crack propagation in reinforced concrete structures. The first approach is solved numerically using finite differences to… (more)

Subjects/Keywords: Corrosion; Modelling; Cover-Cracking; RC Structures; Thick-Walled Cylinder; Finite Differences; Finite Element; TWC; Rust Compressibility; Rust Diffusion; Critical Attack Penetration; Visual Critical Attack Penetration; Elasto Plastic Cylinder; Brittle Elastic Cylinder; Maximum Internal Pressure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roshan, A. (2018). Different Approaches to Model Cover-Cracking of RC Structures due to Corrosion . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/37104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Roshan, Arman. “Different Approaches to Model Cover-Cracking of RC Structures due to Corrosion .” 2018. Thesis, University of Ottawa. Accessed March 28, 2020. http://hdl.handle.net/10393/37104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Roshan, Arman. “Different Approaches to Model Cover-Cracking of RC Structures due to Corrosion .” 2018. Web. 28 Mar 2020.

Vancouver:

Roshan A. Different Approaches to Model Cover-Cracking of RC Structures due to Corrosion . [Internet] [Thesis]. University of Ottawa; 2018. [cited 2020 Mar 28]. Available from: http://hdl.handle.net/10393/37104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Roshan A. Different Approaches to Model Cover-Cracking of RC Structures due to Corrosion . [Thesis]. University of Ottawa; 2018. Available from: http://hdl.handle.net/10393/37104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

4. Gill, Rupinder S. Intrusion detection techniques in wireless local area networks.

Degree: 2009, Queensland University of Technology

 This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security… (more)

Subjects/Keywords: wireless intrusion detection, 802.11 wireless networks, specification-based intrusion detection, anomaly-based intrusion detection, state transition modelling, security policy compliance monitoring, cross sensor correlation; cross detection technique correlation, automatic attack scenario recognition, attack scenario prioritization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gill, R. S. (2009). Intrusion detection techniques in wireless local area networks. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/29351/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gill, Rupinder S. “Intrusion detection techniques in wireless local area networks.” 2009. Thesis, Queensland University of Technology. Accessed March 28, 2020. https://eprints.qut.edu.au/29351/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gill, Rupinder S. “Intrusion detection techniques in wireless local area networks.” 2009. Web. 28 Mar 2020.

Vancouver:

Gill RS. Intrusion detection techniques in wireless local area networks. [Internet] [Thesis]. Queensland University of Technology; 2009. [cited 2020 Mar 28]. Available from: https://eprints.qut.edu.au/29351/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gill RS. Intrusion detection techniques in wireless local area networks. [Thesis]. Queensland University of Technology; 2009. Available from: https://eprints.qut.edu.au/29351/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Faria , Hugo Alexandre Reis. Modelação Comportamental de Agentes Inteligentes.

Degree: 2013, RCAAP

Os estudos mais recentes identificam as áreas portuárias como um alvo provável de atividade terrorista, não só devido à importância que representam para o comércio… (more)

Subjects/Keywords: Agentes inteligentes, comportamento, exercício real, máquinas de estado, modelação, perfis de ataque.; Agents, behaviour, real data collection exercise, state machines, modelling, attack profile.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Faria , H. A. R. (2013). Modelação Comportamental de Agentes Inteligentes. (Thesis). RCAAP. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:comum.rcaap.pt:10400.26/12638

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Faria , Hugo Alexandre Reis. “Modelação Comportamental de Agentes Inteligentes.” 2013. Thesis, RCAAP. Accessed March 28, 2020. https://www.rcaap.pt/detail.jsp?id=oai:comum.rcaap.pt:10400.26/12638.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Faria , Hugo Alexandre Reis. “Modelação Comportamental de Agentes Inteligentes.” 2013. Web. 28 Mar 2020.

Vancouver:

Faria HAR. Modelação Comportamental de Agentes Inteligentes. [Internet] [Thesis]. RCAAP; 2013. [cited 2020 Mar 28]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:comum.rcaap.pt:10400.26/12638.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Faria HAR. Modelação Comportamental de Agentes Inteligentes. [Thesis]. RCAAP; 2013. Available from: https://www.rcaap.pt/detail.jsp?id=oai:comum.rcaap.pt:10400.26/12638

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

6. Smith, Jason. Denial of service : prevention, modelling and detection.

Degree: 2007, Queensland University of Technology

 This research investigates the denial of service problem, in the context of services provided over a network, and contributes to improved techniques for modelling, detecting,… (more)

Subjects/Keywords: denial of service resistance; key establishment; attack prevention; specificationbased intrusion detection; security modelling; cost-based modelling; mobile IP; IEEE 802.11 wireless networks; crypto-based identifiers.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, J. (2007). Denial of service : prevention, modelling and detection. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16392/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Jason. “Denial of service : prevention, modelling and detection.” 2007. Thesis, Queensland University of Technology. Accessed March 28, 2020. https://eprints.qut.edu.au/16392/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Jason. “Denial of service : prevention, modelling and detection.” 2007. Web. 28 Mar 2020.

Vancouver:

Smith J. Denial of service : prevention, modelling and detection. [Internet] [Thesis]. Queensland University of Technology; 2007. [cited 2020 Mar 28]. Available from: https://eprints.qut.edu.au/16392/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith J. Denial of service : prevention, modelling and detection. [Thesis]. Queensland University of Technology; 2007. Available from: https://eprints.qut.edu.au/16392/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

7. Virdi, Amandeep Singh. AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

Attack simulations provide a viable means to test the cyber security of a system. The simulations trace the steps taken by the attacker to… (more)

Subjects/Keywords: Domain Specific Language; Cyber Security; Threat Modelling; Attack Graphs; Amazon Web Services; Domänspecifikt Språk; Cybersäkerhet; Hotmodellering; Attackgrafer; Amazon Web Services; Computer and Information Sciences; Data- och informationsvetenskap; Electrical Engineering, Electronic Engineering, Information Engineering; Elektroteknik och elektronik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Virdi, A. S. (2018). AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Virdi, Amandeep Singh. “AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment.” 2018. Thesis, KTH. Accessed March 28, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Virdi, Amandeep Singh. “AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment.” 2018. Web. 28 Mar 2020.

Vancouver:

Virdi AS. AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment. [Internet] [Thesis]. KTH; 2018. [cited 2020 Mar 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Virdi AS. AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Nunes Leal Franqueira, V. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients.

Degree: Faculty of Electrical Engineering, Mathematics and Computer Science, 2009, University of Twente

 An important aspect of IT security governance is the proactive and continuous identification of possible attacks in computer networks. This is complicated due to the… (more)

Subjects/Keywords: IR-68417; EWI-16513; PageRank; HITS; Link Analysis Ranking algorithms; Attack Modelling; METIS-264151

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nunes Leal Franqueira, V. (2009). Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients. (Doctoral Dissertation). University of Twente. Retrieved from https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html ; urn:nbn:nl:ui:28-68417 ; 7c6fc70e-2d77-492f-9cda-207152830727 ; 10.3990/1.9789036529235 ; urn:isbn:978-90-365-2923-5 ; urn:nbn:nl:ui:28-68417 ; https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html

Chicago Manual of Style (16th Edition):

Nunes Leal Franqueira, V. “Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients.” 2009. Doctoral Dissertation, University of Twente. Accessed March 28, 2020. https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html ; urn:nbn:nl:ui:28-68417 ; 7c6fc70e-2d77-492f-9cda-207152830727 ; 10.3990/1.9789036529235 ; urn:isbn:978-90-365-2923-5 ; urn:nbn:nl:ui:28-68417 ; https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html.

MLA Handbook (7th Edition):

Nunes Leal Franqueira, V. “Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients.” 2009. Web. 28 Mar 2020.

Vancouver:

Nunes Leal Franqueira V. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients. [Internet] [Doctoral dissertation]. University of Twente; 2009. [cited 2020 Mar 28]. Available from: https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html ; urn:nbn:nl:ui:28-68417 ; 7c6fc70e-2d77-492f-9cda-207152830727 ; 10.3990/1.9789036529235 ; urn:isbn:978-90-365-2923-5 ; urn:nbn:nl:ui:28-68417 ; https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html.

Council of Science Editors:

Nunes Leal Franqueira V. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients. [Doctoral Dissertation]. University of Twente; 2009. Available from: https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html ; urn:nbn:nl:ui:28-68417 ; 7c6fc70e-2d77-492f-9cda-207152830727 ; 10.3990/1.9789036529235 ; urn:isbn:978-90-365-2923-5 ; urn:nbn:nl:ui:28-68417 ; https://research.utwente.nl/en/publications/finding-multistep-attacks-in-computer-networks-using-heuristic-search-and-mobile-ambients(7c6fc70e-2d77-492f-9cda-207152830727).html


University of Queensland

9. Shao, Wen. A study of rock cutting with point attack picks.

Degree: School of Mechanical and Mining Engineering, 2016, University of Queensland

Subjects/Keywords: Rock cutting; Point attack pick; SMART*CUT pick; TSDC; WC pick; Cutting forces; Force prediction; Temperature measurement; Rock chips; Specific energy; Finite element modelling; 0913 Mechanical Engineering; 0914 Resources Engineering and Extractive Metallurgy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shao, W. (2016). A study of rock cutting with point attack picks. (Thesis). University of Queensland. Retrieved from http://espace.library.uq.edu.au/view/UQ:397290

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shao, Wen. “A study of rock cutting with point attack picks.” 2016. Thesis, University of Queensland. Accessed March 28, 2020. http://espace.library.uq.edu.au/view/UQ:397290.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shao, Wen. “A study of rock cutting with point attack picks.” 2016. Web. 28 Mar 2020.

Vancouver:

Shao W. A study of rock cutting with point attack picks. [Internet] [Thesis]. University of Queensland; 2016. [cited 2020 Mar 28]. Available from: http://espace.library.uq.edu.au/view/UQ:397290.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shao W. A study of rock cutting with point attack picks. [Thesis]. University of Queensland; 2016. Available from: http://espace.library.uq.edu.au/view/UQ:397290

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.