Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Attackers). Showing records 1 – 13 of 13 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Springall, Andrew. Nation-State Attackers and their Effects on Computer Security.

Degree: PhD, Computer Science & Engineering, 2018, University of Michigan

 Nation-state intelligence agencies have long attempted to operate in secret, but recent revelations have drawn the attention of security researchers as well as the general… (more)

Subjects/Keywords: Nation-State Attackers; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Springall, A. (2018). Nation-State Attackers and their Effects on Computer Security. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/143907

Chicago Manual of Style (16th Edition):

Springall, Andrew. “Nation-State Attackers and their Effects on Computer Security.” 2018. Doctoral Dissertation, University of Michigan. Accessed January 20, 2021. http://hdl.handle.net/2027.42/143907.

MLA Handbook (7th Edition):

Springall, Andrew. “Nation-State Attackers and their Effects on Computer Security.” 2018. Web. 20 Jan 2021.

Vancouver:

Springall A. Nation-State Attackers and their Effects on Computer Security. [Internet] [Doctoral dissertation]. University of Michigan; 2018. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/2027.42/143907.

Council of Science Editors:

Springall A. Nation-State Attackers and their Effects on Computer Security. [Doctoral Dissertation]. University of Michigan; 2018. Available from: http://hdl.handle.net/2027.42/143907


NSYSU

2. Tseng, Shih-Ming. Physical-Layer Security Design for Distributed Detection with Attackers.

Degree: Master, Communications Engineering, 2018, NSYSU

 Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the… (more)

Subjects/Keywords: wireless sensor networks; physical-layer security; eavedroppers; attackers; distributed detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2018). Physical-Layer Security Design for Distributed Detection with Attackers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Thesis, NSYSU. Accessed January 20, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shih-Ming. “Physical-Layer Security Design for Distributed Detection with Attackers.” 2018. Web. 20 Jan 2021.

Vancouver:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Internet] [Thesis]. NSYSU; 2018. [cited 2021 Jan 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Physical-Layer Security Design for Distributed Detection with Attackers. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0525118-113804

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


The Ohio State University

3. Jiang, Tianyu. Data-Driven Cyber Vulnerability Maintenance of Network Vulnerabilities with Markov Decision Processes.

Degree: MS, Industrial and Systems Engineering, 2017, The Ohio State University

 Cyber vulnerability can be exploited by cyber-attackers to achieve valuable information, alter or destroy a cyber-target. Finding a way to generate appropriate cyber vulnerability maintenance… (more)

Subjects/Keywords: Operations Research; Cyber attackers, Data-Driven Cyber Vulnerability Maintenance of Network Vulnerabilities; Markov Decision Processes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, T. (2017). Data-Driven Cyber Vulnerability Maintenance of Network Vulnerabilities with Markov Decision Processes. (Masters Thesis). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1494203777781845

Chicago Manual of Style (16th Edition):

Jiang, Tianyu. “Data-Driven Cyber Vulnerability Maintenance of Network Vulnerabilities with Markov Decision Processes.” 2017. Masters Thesis, The Ohio State University. Accessed January 20, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=osu1494203777781845.

MLA Handbook (7th Edition):

Jiang, Tianyu. “Data-Driven Cyber Vulnerability Maintenance of Network Vulnerabilities with Markov Decision Processes.” 2017. Web. 20 Jan 2021.

Vancouver:

Jiang T. Data-Driven Cyber Vulnerability Maintenance of Network Vulnerabilities with Markov Decision Processes. [Internet] [Masters thesis]. The Ohio State University; 2017. [cited 2021 Jan 20]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1494203777781845.

Council of Science Editors:

Jiang T. Data-Driven Cyber Vulnerability Maintenance of Network Vulnerabilities with Markov Decision Processes. [Masters Thesis]. The Ohio State University; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1494203777781845


Anna University

4. Kalpana R. Certain Improvements In Secure Anonymous Routing Using Optimized Trust Model For Ad Hoc Networks;.

Degree: communication engineering, 2013, Anna University

Security in ad hoc routing protocol is incorporated using encryption newlineauthentication anonymity and trust factors Though encryption and newlineauthentication provides endtoend security mechanisms of data… (more)

Subjects/Keywords: Ad Hoc Networks; anonymity mechanisms; encryption authentication; MACT; malicious attackers; Optimized Trust Model; protocol; Secure Anonymous Routing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

R, K. (2013). Certain Improvements In Secure Anonymous Routing Using Optimized Trust Model For Ad Hoc Networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/22978

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

R, Kalpana. “Certain Improvements In Secure Anonymous Routing Using Optimized Trust Model For Ad Hoc Networks;.” 2013. Thesis, Anna University. Accessed January 20, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/22978.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

R, Kalpana. “Certain Improvements In Secure Anonymous Routing Using Optimized Trust Model For Ad Hoc Networks;.” 2013. Web. 20 Jan 2021.

Vancouver:

R K. Certain Improvements In Secure Anonymous Routing Using Optimized Trust Model For Ad Hoc Networks;. [Internet] [Thesis]. Anna University; 2013. [cited 2021 Jan 20]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22978.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

R K. Certain Improvements In Secure Anonymous Routing Using Optimized Trust Model For Ad Hoc Networks;. [Thesis]. Anna University; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22978

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Pontifícia Universidade Católica de São Paulo

5. Valéria Lúcia de Camargo. Matar-se em nome de Deus?: uma análise do suicídio praticado pelos homens e mulheres bombas no islamismo.

Degree: 2007, Pontifícia Universidade Católica de São Paulo

Esta dissertação tem como objetivo investigar o suicídio praticado por homens e mulheres bombas no âmbito do Islã, um fenômeno com características peculiares, aparentemente vinculado… (more)

Subjects/Keywords: Suicidio  – Aspectos religiosos  – Islamismo; suicide attackers; Islam; Terrorismo  – Aspectos religiosos; Islamismo; pós-modernidade; religião; post-modernity; islamismo; religion; TEOLOGIA; suicídio; bombas humanas; non muslin readings

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Camargo, V. L. d. (2007). Matar-se em nome de Deus?: uma análise do suicídio praticado pelos homens e mulheres bombas no islamismo. (Thesis). Pontifícia Universidade Católica de São Paulo. Retrieved from http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=4744

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Camargo, Valéria Lúcia de. “Matar-se em nome de Deus?: uma análise do suicídio praticado pelos homens e mulheres bombas no islamismo.” 2007. Thesis, Pontifícia Universidade Católica de São Paulo. Accessed January 20, 2021. http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=4744.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Camargo, Valéria Lúcia de. “Matar-se em nome de Deus?: uma análise do suicídio praticado pelos homens e mulheres bombas no islamismo.” 2007. Web. 20 Jan 2021.

Vancouver:

Camargo VLd. Matar-se em nome de Deus?: uma análise do suicídio praticado pelos homens e mulheres bombas no islamismo. [Internet] [Thesis]. Pontifícia Universidade Católica de São Paulo; 2007. [cited 2021 Jan 20]. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=4744.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Camargo VLd. Matar-se em nome de Deus?: uma análise do suicídio praticado pelos homens e mulheres bombas no islamismo. [Thesis]. Pontifícia Universidade Católica de São Paulo; 2007. Available from: http://www.sapientia.pucsp.br//tde_busca/arquivo.php?codArquivo=4744

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. LIU XIAO. DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS.

Degree: 2015, National University of Singapore

Subjects/Keywords: differential privacy; collaborative recommendation system; online learning; lower bound; algorithm; colluding attackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

XIAO, L. (2015). DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/123732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

XIAO, LIU. “DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS.” 2015. Thesis, National University of Singapore. Accessed January 20, 2021. http://scholarbank.nus.edu.sg/handle/10635/123732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

XIAO, LIU. “DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS.” 2015. Web. 20 Jan 2021.

Vancouver:

XIAO L. DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS. [Internet] [Thesis]. National University of Singapore; 2015. [cited 2021 Jan 20]. Available from: http://scholarbank.nus.edu.sg/handle/10635/123732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

XIAO L. DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS. [Thesis]. National University of Singapore; 2015. Available from: http://scholarbank.nus.edu.sg/handle/10635/123732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Sobesto, Bertrand. EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR.

Degree: Reliability Engineering, 2015, University of Maryland

 The cybersecurity community has made substantial efforts to understand and mitigate security flaws in information systems. Oftentimes when a compromise is discovered, it is difficult… (more)

Subjects/Keywords: engineering; computer science; attackers' behavior; cybersecurity; empirical studies; honeypot

…46 Chapter 4 – An Empirical Study to Analyze Attacks and Attackers… …49 4.3.1 Attackers and Crimes Identification… …58 v 4.4.2 Attackers’ Origin… …59 4.4.3 Attackers’ Characteristics… …121 Chapter 7 – Effects of a Banner on the Commands Typed by Attackers: Differences… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sobesto, B. (2015). EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR. (Thesis). University of Maryland. Retrieved from http://hdl.handle.net/1903/16563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sobesto, Bertrand. “EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR.” 2015. Thesis, University of Maryland. Accessed January 20, 2021. http://hdl.handle.net/1903/16563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sobesto, Bertrand. “EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR.” 2015. Web. 20 Jan 2021.

Vancouver:

Sobesto B. EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR. [Internet] [Thesis]. University of Maryland; 2015. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/1903/16563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sobesto B. EMPIRICAL STUDIES BASED ON HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR. [Thesis]. University of Maryland; 2015. Available from: http://hdl.handle.net/1903/16563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Kantzavelou, Ioanna. Ανίχνευση εισβολών στην ασφάλεια της τεχνολογίας της πληροφορίας.

Degree: 2011, University of the Aegean; Πανεπιστήμιο Αιγαίου

Our aim is to expand Intrusion Detection to the area of Game Theory, to borrow concepts required to study the interactions between users and Intrusion… (more)

Subjects/Keywords: Ανίχνευση εισβολών; Θεωρία παιγνίων; Εσωτερικοί επιτιθέμενοι; Γενικό μοντέλο παίγνιου; Παίγνια σημάτων; Μοντέλα εφαρμογής παιγνίων; Αβεβαιότητα; Εμπιστοσύνη; Υπόληψη; Φήμη; Intrusion detection; Game theory; Internal attackers (Insiders); Generic game model; Signaling games; Quantal response equilibria - QRE; Game-based application models; Uncertainty; Trust; Reputation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kantzavelou, I. (2011). Ανίχνευση εισβολών στην ασφάλεια της τεχνολογίας της πληροφορίας. (Thesis). University of the Aegean; Πανεπιστήμιο Αιγαίου. Retrieved from http://hdl.handle.net/10442/hedi/26057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kantzavelou, Ioanna. “Ανίχνευση εισβολών στην ασφάλεια της τεχνολογίας της πληροφορίας.” 2011. Thesis, University of the Aegean; Πανεπιστήμιο Αιγαίου. Accessed January 20, 2021. http://hdl.handle.net/10442/hedi/26057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kantzavelou, Ioanna. “Ανίχνευση εισβολών στην ασφάλεια της τεχνολογίας της πληροφορίας.” 2011. Web. 20 Jan 2021.

Vancouver:

Kantzavelou I. Ανίχνευση εισβολών στην ασφάλεια της τεχνολογίας της πληροφορίας. [Internet] [Thesis]. University of the Aegean; Πανεπιστήμιο Αιγαίου; 2011. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/10442/hedi/26057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kantzavelou I. Ανίχνευση εισβολών στην ασφάλεια της τεχνολογίας της πληροφορίας. [Thesis]. University of the Aegean; Πανεπιστήμιο Αιγαίου; 2011. Available from: http://hdl.handle.net/10442/hedi/26057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cambridge

9. Vetterl, Alexander. Honeypots in the age of universal attacks and the Internet of Things.

Degree: PhD, 2020, University of Cambridge

 Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on… (more)

Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/303171

Chicago Manual of Style (16th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 20, 2021. https://www.repository.cam.ac.uk/handle/1810/303171.

MLA Handbook (7th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 20 Jan 2021.

Vancouver:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 20]. Available from: https://www.repository.cam.ac.uk/handle/1810/303171.

Council of Science Editors:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://www.repository.cam.ac.uk/handle/1810/303171

10. Murray, Athena Renee. Why She Did It: Battle for the Meaning of the Female Suicide Attackers of the Liberation Tigers of Tamil Eelam.

Degree: MA, Communication Studies, 2010, University of Kansas

 Suicide bombings are quickly becoming the tactic of choice for resistance groups around the globe, and increasingly, women are becoming the chosen perpetrators. However, the… (more)

Subjects/Keywords: Communication; Women's studies; Agency; Female suicide attackers; Gender; Liberation tigers of tamil eelam; Motivation; Rhetoric

attackers. In this chapter, I discuss the interactions between narratives about motherhood in… …Tamil culture and female suicide attackers. The LTTE exploits narratives about motherhood to… …Publications, 2007), 197. 4 CHAPTER ONE: THE LTTE’S FEMALE SUICIDE ATTACKERS 5… …This study focuses specifically on female suicide attackers in the LTTE. I show that in… …the violence that they perpetrate. Narratives of female suicide attackers are overwhelmingly… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Murray, A. R. (2010). Why She Did It: Battle for the Meaning of the Female Suicide Attackers of the Liberation Tigers of Tamil Eelam. (Masters Thesis). University of Kansas. Retrieved from http://hdl.handle.net/1808/8552

Chicago Manual of Style (16th Edition):

Murray, Athena Renee. “Why She Did It: Battle for the Meaning of the Female Suicide Attackers of the Liberation Tigers of Tamil Eelam.” 2010. Masters Thesis, University of Kansas. Accessed January 20, 2021. http://hdl.handle.net/1808/8552.

MLA Handbook (7th Edition):

Murray, Athena Renee. “Why She Did It: Battle for the Meaning of the Female Suicide Attackers of the Liberation Tigers of Tamil Eelam.” 2010. Web. 20 Jan 2021.

Vancouver:

Murray AR. Why She Did It: Battle for the Meaning of the Female Suicide Attackers of the Liberation Tigers of Tamil Eelam. [Internet] [Masters thesis]. University of Kansas; 2010. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/1808/8552.

Council of Science Editors:

Murray AR. Why She Did It: Battle for the Meaning of the Female Suicide Attackers of the Liberation Tigers of Tamil Eelam. [Masters Thesis]. University of Kansas; 2010. Available from: http://hdl.handle.net/1808/8552


University of Cambridge

11. Vetterl, Alexander. Honeypots in the age of universal attacks and the Internet of Things.

Degree: PhD, 2020, University of Cambridge

 Today's Internet connects billions of physical devices. These devices are often immature and insecure, and share common vulnerabilities. The predominant form of attacks relies on… (more)

Subjects/Keywords: Network security; Honeypot; Fingerprinting; Attackers; Distributed Denial of Service (DDoS); Malware; Threat analysis; Honware; Network measurement; Internet of Things (IoT); Firmware; Emulation; Virtualisation; Warning messages; Deterrence; Detection; System trespassing; Unauthorized access; Customer Premise Equipment (CPE); Zero days; Network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825

Chicago Manual of Style (16th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Doctoral Dissertation, University of Cambridge. Accessed January 20, 2021. https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.

MLA Handbook (7th Edition):

Vetterl, Alexander. “Honeypots in the age of universal attacks and the Internet of Things.” 2020. Web. 20 Jan 2021.

Vancouver:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Internet] [Doctoral dissertation]. University of Cambridge; 2020. [cited 2021 Jan 20]. Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825.

Council of Science Editors:

Vetterl A. Honeypots in the age of universal attacks and the Internet of Things. [Doctoral Dissertation]. University of Cambridge; 2020. Available from: https://doi.org/10.17863/CAM.50250 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.801825


University of Oxford

12. Funk, T. Markus. Questions of value : an evaluative study of self-defense theory and practice in Germany, England, and the United States.

Degree: PhD, 2020, University of Oxford

 Self-defense is a topic about which scholars, legislators, judges, and laymen alike have strongly held—and often strongly divergent—opinions. While some favor ‘tough-on-crime’ approaches according broader… (more)

Subjects/Keywords: passive threats; personal sphere; waiver of rights; attacks by police; imminence; Justifications; subjective standard; rights theory; autonomy; necessity; equal standing; self-defence law; mistakes of fact; socio-ethical limitations; value-centric analysis; forfeiture of rights; proportionality; forced choice theory; excuse; Dadson principle; Germany; Notwehr; self-defense law; primacy of the legal process; innocent attackers; objective standard; public condemnation; duty to avoid conflict; comparative law; culpable attackers; United States; provocation; right to life; battered intimate partner or spouse; legitimacy of the legal process; trivial threats; state's monopoly on force; specific deterrence; duty to retreat; general deterrence; Justification; unknowingly justified defender; England; European Convention on Human Rights; unreasonable mistakes of fact

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Funk, T. M. (2020). Questions of value : an evaluative study of self-defense theory and practice in Germany, England, and the United States. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:f794ea71-baf3-46fd-bf78-8533ba84e230 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.804402

Chicago Manual of Style (16th Edition):

Funk, T Markus. “Questions of value : an evaluative study of self-defense theory and practice in Germany, England, and the United States.” 2020. Doctoral Dissertation, University of Oxford. Accessed January 20, 2021. http://ora.ox.ac.uk/objects/uuid:f794ea71-baf3-46fd-bf78-8533ba84e230 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.804402.

MLA Handbook (7th Edition):

Funk, T Markus. “Questions of value : an evaluative study of self-defense theory and practice in Germany, England, and the United States.” 2020. Web. 20 Jan 2021.

Vancouver:

Funk TM. Questions of value : an evaluative study of self-defense theory and practice in Germany, England, and the United States. [Internet] [Doctoral dissertation]. University of Oxford; 2020. [cited 2021 Jan 20]. Available from: http://ora.ox.ac.uk/objects/uuid:f794ea71-baf3-46fd-bf78-8533ba84e230 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.804402.

Council of Science Editors:

Funk TM. Questions of value : an evaluative study of self-defense theory and practice in Germany, England, and the United States. [Doctoral Dissertation]. University of Oxford; 2020. Available from: http://ora.ox.ac.uk/objects/uuid:f794ea71-baf3-46fd-bf78-8533ba84e230 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.804402

13. Rejthar Edvard. Detekce škodlivého kódu ve webových aplikacích .

Degree: Czech University of Technology

 Následující práce si klade za cíl zpracovat rešerši škodlivého kódu, který útočníci vkládají do napadených webových prezentací. Posléze navrhneme a implementujeme program, který bude schopný… (more)

Subjects/Keywords: Main subject of this work is to analyze the types of malware code that attackers include into hacked websites. Then we design and realize program capable of suspicious code detection in website scripts; that lists the IP addresses of malicious domains visitor's browser is redirected to. We implement the program in the current application Malicious Domain Manager that serves as an incident handling platform.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Edvard, R. (n.d.). Detekce škodlivého kódu ve webových aplikacích . (Thesis). Czech University of Technology. Retrieved from http://hdl.handle.net/10467/61686

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Edvard, Rejthar. “Detekce škodlivého kódu ve webových aplikacích .” Thesis, Czech University of Technology. Accessed January 20, 2021. http://hdl.handle.net/10467/61686.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Edvard, Rejthar. “Detekce škodlivého kódu ve webových aplikacích .” Web. 20 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Edvard R. Detekce škodlivého kódu ve webových aplikacích . [Internet] [Thesis]. Czech University of Technology; [cited 2021 Jan 20]. Available from: http://hdl.handle.net/10467/61686.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Edvard R. Detekce škodlivého kódu ve webových aplikacích . [Thesis]. Czech University of Technology; Available from: http://hdl.handle.net/10467/61686

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

.