Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Colluding Targeted Reconnaissance Attack). Showing records 1 – 30 of 3317 total matches.

[1] [2] [3] [4] [5] … [111]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Florida International University

1. Kamhoua, Georges Arsene K. Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms.

Degree: PhD, Computer Science, 2019, Florida International University

  Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers  – with these new avenues… (more)

Subjects/Keywords: Cybersecurity; Colluding Attacks; Online Social Networks; Crowdsourcing; Threats and Solutions; Social Network Analysis; Colluding Targeted Reconnaissance Attack; Identity Clone Attack; Community Detection; Communication Technology and New Media; Mass Communication; Other Electrical and Computer Engineering; Social Media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kamhoua, G. A. K. (2019). Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms. (Doctoral Dissertation). Florida International University. Retrieved from https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703

Chicago Manual of Style (16th Edition):

Kamhoua, Georges Arsene K. “Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms.” 2019. Doctoral Dissertation, Florida International University. Accessed March 06, 2021. https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703.

MLA Handbook (7th Edition):

Kamhoua, Georges Arsene K. “Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms.” 2019. Web. 06 Mar 2021.

Vancouver:

Kamhoua GAK. Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms. [Internet] [Doctoral dissertation]. Florida International University; 2019. [cited 2021 Mar 06]. Available from: https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703.

Council of Science Editors:

Kamhoua GAK. Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms. [Doctoral Dissertation]. Florida International University; 2019. Available from: https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703


Virginia Tech

2. Meyur, Rounak. Cascading Events in the Aftermath of a Targeted Physical Attack on the Power Grid.

Degree: MS, Electrical Engineering, 2019, Virginia Tech

 The modern day power system has been identified as a critical infrastructure providing crucial support to the economy of a country. Prior experience has shown… (more)

Subjects/Keywords: Cascading failures; targeted attack; hidden failures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meyur, R. (2019). Cascading Events in the Aftermath of a Targeted Physical Attack on the Power Grid. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/88795

Chicago Manual of Style (16th Edition):

Meyur, Rounak. “Cascading Events in the Aftermath of a Targeted Physical Attack on the Power Grid.” 2019. Masters Thesis, Virginia Tech. Accessed March 06, 2021. http://hdl.handle.net/10919/88795.

MLA Handbook (7th Edition):

Meyur, Rounak. “Cascading Events in the Aftermath of a Targeted Physical Attack on the Power Grid.” 2019. Web. 06 Mar 2021.

Vancouver:

Meyur R. Cascading Events in the Aftermath of a Targeted Physical Attack on the Power Grid. [Internet] [Masters thesis]. Virginia Tech; 2019. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/10919/88795.

Council of Science Editors:

Meyur R. Cascading Events in the Aftermath of a Targeted Physical Attack on the Power Grid. [Masters Thesis]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/88795


NSYSU

3. Ou, Ya-Hui. Detecting Targeted Attacks by Risk Evaluation.

Degree: PhD, Information Management, 2017, NSYSU

 More recently, the problems of targeted attack have been the major subject of study in the fields of network attack research due to the increase… (more)

Subjects/Keywords: targeted attack; feature reduce; rough set theory; intrusion detection system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ou, Y. (2017). Detecting Targeted Attacks by Risk Evaluation. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151

Chicago Manual of Style (16th Edition):

Ou, Ya-Hui. “Detecting Targeted Attacks by Risk Evaluation.” 2017. Doctoral Dissertation, NSYSU. Accessed March 06, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151.

MLA Handbook (7th Edition):

Ou, Ya-Hui. “Detecting Targeted Attacks by Risk Evaluation.” 2017. Web. 06 Mar 2021.

Vancouver:

Ou Y. Detecting Targeted Attacks by Risk Evaluation. [Internet] [Doctoral dissertation]. NSYSU; 2017. [cited 2021 Mar 06]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151.

Council of Science Editors:

Ou Y. Detecting Targeted Attacks by Risk Evaluation. [Doctoral Dissertation]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151


NSYSU

4. LAI, CHIPING. Detecting Intrusions Using Social Network Analysis And Bayesian Network.

Degree: Master, Information Management, 2015, NSYSU

 The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target… (more)

Subjects/Keywords: Bayesian Network Model; Intrusion Detection System; Targeted Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

LAI, C. (2015). Detecting Intrusions Using Social Network Analysis And Bayesian Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Thesis, NSYSU. Accessed March 06, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Web. 06 Mar 2021.

Vancouver:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Internet] [Thesis]. NSYSU; 2015. [cited 2021 Mar 06]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

5. Yao, Ming. A security architecture for protecting dynamic components of mobile agents.

Degree: 2004, Queensland University of Technology

 New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the… (more)

Subjects/Keywords: Mobile agents; offer integrity; offer privacy; forward integrity; security architecture; modification attack; insertion attack; colluding servers attack; truncation attack; stemming attack; interleaving attack; hash chaining relationship; recoverable key commitment; joint keys.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yao, M. (2004). A security architecture for protecting dynamic components of mobile agents. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/15913/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yao, Ming. “A security architecture for protecting dynamic components of mobile agents.” 2004. Thesis, Queensland University of Technology. Accessed March 06, 2021. https://eprints.qut.edu.au/15913/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yao, Ming. “A security architecture for protecting dynamic components of mobile agents.” 2004. Web. 06 Mar 2021.

Vancouver:

Yao M. A security architecture for protecting dynamic components of mobile agents. [Internet] [Thesis]. Queensland University of Technology; 2004. [cited 2021 Mar 06]. Available from: https://eprints.qut.edu.au/15913/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yao M. A security architecture for protecting dynamic components of mobile agents. [Thesis]. Queensland University of Technology; 2004. Available from: https://eprints.qut.edu.au/15913/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

6. Sibma, Arjan. Countering Passive Reconnaissance Activities of Adversaries.

Degree: 2020, Leiden University

 This report describes the results of the research in the context of the Master's degree in Cyber Security. This study researched the problem that public… (more)

Subjects/Keywords: design science; tenders; open data; open source intelligence (OSINT); reconnaissance; cyber-attack; risks of open data; automation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sibma, A. (2020). Countering Passive Reconnaissance Activities of Adversaries. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/87653

Chicago Manual of Style (16th Edition):

Sibma, Arjan. “Countering Passive Reconnaissance Activities of Adversaries.” 2020. Masters Thesis, Leiden University. Accessed March 06, 2021. http://hdl.handle.net/1887/87653.

MLA Handbook (7th Edition):

Sibma, Arjan. “Countering Passive Reconnaissance Activities of Adversaries.” 2020. Web. 06 Mar 2021.

Vancouver:

Sibma A. Countering Passive Reconnaissance Activities of Adversaries. [Internet] [Masters thesis]. Leiden University; 2020. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/1887/87653.

Council of Science Editors:

Sibma A. Countering Passive Reconnaissance Activities of Adversaries. [Masters Thesis]. Leiden University; 2020. Available from: http://hdl.handle.net/1887/87653

7. Vibert, Benoît. Contributions à l'évaluation de systèmes biométriques embarqués : Contributions to the evaluation of embedded biometric systems.

Degree: Docteur es, Informatique, 2017, Normandie

La biométrie suscite de plus en plus d’intérêt de la part des industriels car nous avons besoin de nouvelles méthodes d’authentification d’un individu : pour… (more)

Subjects/Keywords: Element sécurisé; Reconnaissance du type d'empreinte; Réduction template biométrique; Attaque (informatique); Secure Element; Fingerprint type recognition; Ingerprint size reduction; Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vibert, B. (2017). Contributions à l'évaluation de systèmes biométriques embarqués : Contributions to the evaluation of embedded biometric systems. (Doctoral Dissertation). Normandie. Retrieved from http://www.theses.fr/2017NORMC208

Chicago Manual of Style (16th Edition):

Vibert, Benoît. “Contributions à l'évaluation de systèmes biométriques embarqués : Contributions to the evaluation of embedded biometric systems.” 2017. Doctoral Dissertation, Normandie. Accessed March 06, 2021. http://www.theses.fr/2017NORMC208.

MLA Handbook (7th Edition):

Vibert, Benoît. “Contributions à l'évaluation de systèmes biométriques embarqués : Contributions to the evaluation of embedded biometric systems.” 2017. Web. 06 Mar 2021.

Vancouver:

Vibert B. Contributions à l'évaluation de systèmes biométriques embarqués : Contributions to the evaluation of embedded biometric systems. [Internet] [Doctoral dissertation]. Normandie; 2017. [cited 2021 Mar 06]. Available from: http://www.theses.fr/2017NORMC208.

Council of Science Editors:

Vibert B. Contributions à l'évaluation de systèmes biométriques embarqués : Contributions to the evaluation of embedded biometric systems. [Doctoral Dissertation]. Normandie; 2017. Available from: http://www.theses.fr/2017NORMC208


Texas A&M University

8. Nadimpalli, Srinath. Universal Skeptic Binder-Droid - Towards Arresting Malicious Communication of Colluding Apps in Android.

Degree: MS, Computer Science, 2015, Texas A&M University

 Since its first release, Android has been increasingly adopted by people and companies worldwide. It is currently estimated that around 1.1 billion Android devices are… (more)

Subjects/Keywords: Android; security; binder; policy; colluding apps; covert channel; overt channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nadimpalli, S. (2015). Universal Skeptic Binder-Droid - Towards Arresting Malicious Communication of Colluding Apps in Android. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/155280

Chicago Manual of Style (16th Edition):

Nadimpalli, Srinath. “Universal Skeptic Binder-Droid - Towards Arresting Malicious Communication of Colluding Apps in Android.” 2015. Masters Thesis, Texas A&M University. Accessed March 06, 2021. http://hdl.handle.net/1969.1/155280.

MLA Handbook (7th Edition):

Nadimpalli, Srinath. “Universal Skeptic Binder-Droid - Towards Arresting Malicious Communication of Colluding Apps in Android.” 2015. Web. 06 Mar 2021.

Vancouver:

Nadimpalli S. Universal Skeptic Binder-Droid - Towards Arresting Malicious Communication of Colluding Apps in Android. [Internet] [Masters thesis]. Texas A&M University; 2015. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/1969.1/155280.

Council of Science Editors:

Nadimpalli S. Universal Skeptic Binder-Droid - Towards Arresting Malicious Communication of Colluding Apps in Android. [Masters Thesis]. Texas A&M University; 2015. Available from: http://hdl.handle.net/1969.1/155280


North Carolina State University

9. Gegick, Michael. Predicting Attack-prone Components with Source Code Static Analyzers.

Degree: PhD, Computer Science, 2009, North Carolina State University

 No single vulnerability detection technique can identify all vulnerabilities in a software system. However, the vulnerabilities that are identified from a detection technique may be… (more)

Subjects/Keywords: attack-prone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gegick, M. (2009). Predicting Attack-prone Components with Source Code Static Analyzers. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5294

Chicago Manual of Style (16th Edition):

Gegick, Michael. “Predicting Attack-prone Components with Source Code Static Analyzers.” 2009. Doctoral Dissertation, North Carolina State University. Accessed March 06, 2021. http://www.lib.ncsu.edu/resolver/1840.16/5294.

MLA Handbook (7th Edition):

Gegick, Michael. “Predicting Attack-prone Components with Source Code Static Analyzers.” 2009. Web. 06 Mar 2021.

Vancouver:

Gegick M. Predicting Attack-prone Components with Source Code Static Analyzers. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2021 Mar 06]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5294.

Council of Science Editors:

Gegick M. Predicting Attack-prone Components with Source Code Static Analyzers. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5294


Oklahoma State University

10. Huynh, Hai. Investigate the effect of neural network representations on the transferability of adversarial attacks.

Degree: Computer Science, 2020, Oklahoma State University

 Deep neural networks have been widely applied in various fields of many industries such as medical, security, and self-driving cars. They even surpass human performance… (more)

Subjects/Keywords: adversarial attack; black-box attack; transferability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huynh, H. (2020). Investigate the effect of neural network representations on the transferability of adversarial attacks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/325546

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huynh, Hai. “Investigate the effect of neural network representations on the transferability of adversarial attacks.” 2020. Thesis, Oklahoma State University. Accessed March 06, 2021. http://hdl.handle.net/11244/325546.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huynh, Hai. “Investigate the effect of neural network representations on the transferability of adversarial attacks.” 2020. Web. 06 Mar 2021.

Vancouver:

Huynh H. Investigate the effect of neural network representations on the transferability of adversarial attacks. [Internet] [Thesis]. Oklahoma State University; 2020. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/11244/325546.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huynh H. Investigate the effect of neural network representations on the transferability of adversarial attacks. [Thesis]. Oklahoma State University; 2020. Available from: http://hdl.handle.net/11244/325546

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado School of Mines

11. Lin, Jian. Privacy and security in crowdsensing.

Degree: PhD, Computer Science, 2019, Colorado School of Mines

 The rapid proliferation of sensor-embedded devices has enabled crowdsensing, a new paradigm which effectively collects sensing data from pervasive users. However, both the openness of… (more)

Subjects/Keywords: incentive mechanism; Sybil attack; inference attack; crowdsensing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2019). Privacy and security in crowdsensing. (Doctoral Dissertation). Colorado School of Mines. Retrieved from http://hdl.handle.net/11124/173985

Chicago Manual of Style (16th Edition):

Lin, Jian. “Privacy and security in crowdsensing.” 2019. Doctoral Dissertation, Colorado School of Mines. Accessed March 06, 2021. http://hdl.handle.net/11124/173985.

MLA Handbook (7th Edition):

Lin, Jian. “Privacy and security in crowdsensing.” 2019. Web. 06 Mar 2021.

Vancouver:

Lin J. Privacy and security in crowdsensing. [Internet] [Doctoral dissertation]. Colorado School of Mines; 2019. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/11124/173985.

Council of Science Editors:

Lin J. Privacy and security in crowdsensing. [Doctoral Dissertation]. Colorado School of Mines; 2019. Available from: http://hdl.handle.net/11124/173985


Texas A&M University

12. Chang, Ting-Jui. Enhancing Resilience Against Adversarial Attacks of Deep Neural Networks Using Efficient Two-Step Adversarial Defense.

Degree: MS, Computer Engineering, 2018, Texas A&M University

 In recent years, deep neural networks have demonstrated outstanding performance in many machine learning tasks. However, researchers have discovered that these state-of-the-art models are vulnerable… (more)

Subjects/Keywords: Adversarial attack; white box; iterative attack methods

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, T. (2018). Enhancing Resilience Against Adversarial Attacks of Deep Neural Networks Using Efficient Two-Step Adversarial Defense. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/174573

Chicago Manual of Style (16th Edition):

Chang, Ting-Jui. “Enhancing Resilience Against Adversarial Attacks of Deep Neural Networks Using Efficient Two-Step Adversarial Defense.” 2018. Masters Thesis, Texas A&M University. Accessed March 06, 2021. http://hdl.handle.net/1969.1/174573.

MLA Handbook (7th Edition):

Chang, Ting-Jui. “Enhancing Resilience Against Adversarial Attacks of Deep Neural Networks Using Efficient Two-Step Adversarial Defense.” 2018. Web. 06 Mar 2021.

Vancouver:

Chang T. Enhancing Resilience Against Adversarial Attacks of Deep Neural Networks Using Efficient Two-Step Adversarial Defense. [Internet] [Masters thesis]. Texas A&M University; 2018. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/1969.1/174573.

Council of Science Editors:

Chang T. Enhancing Resilience Against Adversarial Attacks of Deep Neural Networks Using Efficient Two-Step Adversarial Defense. [Masters Thesis]. Texas A&M University; 2018. Available from: http://hdl.handle.net/1969.1/174573

13. Soltani Esterabadi, Afshin. Attack Analysis Methodologies .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsteknik, 2019, Chalmers University of Technology

 new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although… (more)

Subjects/Keywords: Automotive; Cybersecurity; Cyberattack; Attack surface; Attack analysis; Risk assessment; Threat analysis; Attack feasibility; Attack potentials.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soltani Esterabadi, A. (2019). Attack Analysis Methodologies . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Thesis, Chalmers University of Technology. Accessed March 06, 2021. http://hdl.handle.net/20.500.12380/300610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soltani Esterabadi, Afshin. “Attack Analysis Methodologies .” 2019. Web. 06 Mar 2021.

Vancouver:

Soltani Esterabadi A. Attack Analysis Methodologies . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.12380/300610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soltani Esterabadi A. Attack Analysis Methodologies . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Sherbrooke

14. Rainville-Lajoie, Marie-Christine. Élaboration et validation d'un instrument de mesure des pratiques de reconnaissance informelle au travail.

Degree: 2011, Université de Sherbrooke

 Dans un contexte social en mouvance et en constant changement, tous les leviers doivent être considérés afm de maintenir la satisfaction et la rétention des… (more)

Subjects/Keywords: Épuisement professionnel; Valorisation; Soutien; Habilitation; Récompense; Reconnaissance non monétaire; Reconnaissance informelle; Reconnaissance au travail

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rainville-Lajoie, M. (2011). Élaboration et validation d'un instrument de mesure des pratiques de reconnaissance informelle au travail. (Doctoral Dissertation). Université de Sherbrooke. Retrieved from http://savoirs.usherbrooke.ca/handle/11143/2844

Chicago Manual of Style (16th Edition):

Rainville-Lajoie, Marie-Christine. “Élaboration et validation d'un instrument de mesure des pratiques de reconnaissance informelle au travail.” 2011. Doctoral Dissertation, Université de Sherbrooke. Accessed March 06, 2021. http://savoirs.usherbrooke.ca/handle/11143/2844.

MLA Handbook (7th Edition):

Rainville-Lajoie, Marie-Christine. “Élaboration et validation d'un instrument de mesure des pratiques de reconnaissance informelle au travail.” 2011. Web. 06 Mar 2021.

Vancouver:

Rainville-Lajoie M. Élaboration et validation d'un instrument de mesure des pratiques de reconnaissance informelle au travail. [Internet] [Doctoral dissertation]. Université de Sherbrooke; 2011. [cited 2021 Mar 06]. Available from: http://savoirs.usherbrooke.ca/handle/11143/2844.

Council of Science Editors:

Rainville-Lajoie M. Élaboration et validation d'un instrument de mesure des pratiques de reconnaissance informelle au travail. [Doctoral Dissertation]. Université de Sherbrooke; 2011. Available from: http://savoirs.usherbrooke.ca/handle/11143/2844


Oregon State University

15. Chou, Chung-di. The effect of uncertainty representation on information integration performance in a simulated ocean surveillance task.

Degree: MS, Industrial Engineering, 1986, Oregon State University

 Human operator performance was evaluated using two types of displays in a simulated ocean surveillance task. The two types of displays studied included a display… (more)

Subjects/Keywords: Naval reconnaissance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chou, C. (1986). The effect of uncertainty representation on information integration performance in a simulated ocean surveillance task. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/40822

Chicago Manual of Style (16th Edition):

Chou, Chung-di. “The effect of uncertainty representation on information integration performance in a simulated ocean surveillance task.” 1986. Masters Thesis, Oregon State University. Accessed March 06, 2021. http://hdl.handle.net/1957/40822.

MLA Handbook (7th Edition):

Chou, Chung-di. “The effect of uncertainty representation on information integration performance in a simulated ocean surveillance task.” 1986. Web. 06 Mar 2021.

Vancouver:

Chou C. The effect of uncertainty representation on information integration performance in a simulated ocean surveillance task. [Internet] [Masters thesis]. Oregon State University; 1986. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/1957/40822.

Council of Science Editors:

Chou C. The effect of uncertainty representation on information integration performance in a simulated ocean surveillance task. [Masters Thesis]. Oregon State University; 1986. Available from: http://hdl.handle.net/1957/40822


Université du Québec à Montréal

16. Jacques, Mathieu. Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film.

Degree: 2012, Université du Québec à Montréal

 Le Projet populaire prend le prétexte narratif d'une enquête sur le rôle social de l'artiste pour observer comment les dynamiques de lutte pour la reconnaissance(more)

Subjects/Keywords: entrevue; installation; processualité; reconnaissance; cool

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacques, M. (2012). Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film. (Thesis). Université du Québec à Montréal. Retrieved from http://www.archipel.uqam.ca/9419/1/M14681.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jacques, Mathieu. “Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film.” 2012. Thesis, Université du Québec à Montréal. Accessed March 06, 2021. http://www.archipel.uqam.ca/9419/1/M14681.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jacques, Mathieu. “Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film.” 2012. Web. 06 Mar 2021.

Vancouver:

Jacques M. Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film. [Internet] [Thesis]. Université du Québec à Montréal; 2012. [cited 2021 Mar 06]. Available from: http://www.archipel.uqam.ca/9419/1/M14681.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jacques M. Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film. [Thesis]. Université du Québec à Montréal; 2012. Available from: http://www.archipel.uqam.ca/9419/1/M14681.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université du Québec à Montréal

17. Jacques, Mathieu. Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film.

Degree: 2012, Université du Québec à Montréal

 Le Projet populaire prend le prétexte narratif d'une enquête sur le rôle social de l'artiste pour observer comment les dynamiques de lutte pour la reconnaissance(more)

Subjects/Keywords: entrevue; installation; processualité; reconnaissance; cool

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacques, M. (2012). Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film. (Thesis). Université du Québec à Montréal. Retrieved from http://archipel.uqam.ca/9419/1/M14681.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jacques, Mathieu. “Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film.” 2012. Thesis, Université du Québec à Montréal. Accessed March 06, 2021. http://archipel.uqam.ca/9419/1/M14681.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jacques, Mathieu. “Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film.” 2012. Web. 06 Mar 2021.

Vancouver:

Jacques M. Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film. [Internet] [Thesis]. Université du Québec à Montréal; 2012. [cited 2021 Mar 06]. Available from: http://archipel.uqam.ca/9419/1/M14681.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jacques M. Projet populaire : faire apparaître des tensions ambivalentes entre l'image, l'identité, l'individu et le groupe par l'installation d'artefacts résultant d'expériences plastiques processuelles en dessin, estampe et film. [Thesis]. Université du Québec à Montréal; 2012. Available from: http://archipel.uqam.ca/9419/1/M14681.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Aissaoui, Amel. Reconnaissance bimodale de visages par fusion de caractéristiques visuelles et de profondeur : Bimodal face recognition by fusion of visual and depth features.

Degree: Docteur es, Informatique, 2014, Université Lille I – Sciences et Technologies

Ce travail s’inscrit dans la thématique de la reconnaissance de visages. Il s’agit de décider de manière automatique de l’identité d’une personne en fonction des… (more)

Subjects/Keywords: Reconnaissance bimodale des visages; 006.37

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aissaoui, A. (2014). Reconnaissance bimodale de visages par fusion de caractéristiques visuelles et de profondeur : Bimodal face recognition by fusion of visual and depth features. (Doctoral Dissertation). Université Lille I – Sciences et Technologies. Retrieved from http://www.theses.fr/2014LIL10030

Chicago Manual of Style (16th Edition):

Aissaoui, Amel. “Reconnaissance bimodale de visages par fusion de caractéristiques visuelles et de profondeur : Bimodal face recognition by fusion of visual and depth features.” 2014. Doctoral Dissertation, Université Lille I – Sciences et Technologies. Accessed March 06, 2021. http://www.theses.fr/2014LIL10030.

MLA Handbook (7th Edition):

Aissaoui, Amel. “Reconnaissance bimodale de visages par fusion de caractéristiques visuelles et de profondeur : Bimodal face recognition by fusion of visual and depth features.” 2014. Web. 06 Mar 2021.

Vancouver:

Aissaoui A. Reconnaissance bimodale de visages par fusion de caractéristiques visuelles et de profondeur : Bimodal face recognition by fusion of visual and depth features. [Internet] [Doctoral dissertation]. Université Lille I – Sciences et Technologies; 2014. [cited 2021 Mar 06]. Available from: http://www.theses.fr/2014LIL10030.

Council of Science Editors:

Aissaoui A. Reconnaissance bimodale de visages par fusion de caractéristiques visuelles et de profondeur : Bimodal face recognition by fusion of visual and depth features. [Doctoral Dissertation]. Université Lille I – Sciences et Technologies; 2014. Available from: http://www.theses.fr/2014LIL10030

19. Drira, Hassen. Statistical computing on manifolds for 3D face analysis and recognition : Calcul statistique sur des variétés de formes 3D pour la reconnaissance de visages 3D.

Degree: Docteur es, Informatique, 2011, Université Lille I – Sciences et Technologies

La reconnaissance de visage automatique offre de nombreux avantages par rapport aux autres technologies biométriques en raison de la nature non-intrusive. Ainsi, les techniques de… (more)

Subjects/Keywords: Reconnaissance de visages tridimensionnelle; 006.4

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Drira, H. (2011). Statistical computing on manifolds for 3D face analysis and recognition : Calcul statistique sur des variétés de formes 3D pour la reconnaissance de visages 3D. (Doctoral Dissertation). Université Lille I – Sciences et Technologies. Retrieved from http://www.theses.fr/2011LIL10075

Chicago Manual of Style (16th Edition):

Drira, Hassen. “Statistical computing on manifolds for 3D face analysis and recognition : Calcul statistique sur des variétés de formes 3D pour la reconnaissance de visages 3D.” 2011. Doctoral Dissertation, Université Lille I – Sciences et Technologies. Accessed March 06, 2021. http://www.theses.fr/2011LIL10075.

MLA Handbook (7th Edition):

Drira, Hassen. “Statistical computing on manifolds for 3D face analysis and recognition : Calcul statistique sur des variétés de formes 3D pour la reconnaissance de visages 3D.” 2011. Web. 06 Mar 2021.

Vancouver:

Drira H. Statistical computing on manifolds for 3D face analysis and recognition : Calcul statistique sur des variétés de formes 3D pour la reconnaissance de visages 3D. [Internet] [Doctoral dissertation]. Université Lille I – Sciences et Technologies; 2011. [cited 2021 Mar 06]. Available from: http://www.theses.fr/2011LIL10075.

Council of Science Editors:

Drira H. Statistical computing on manifolds for 3D face analysis and recognition : Calcul statistique sur des variétés de formes 3D pour la reconnaissance de visages 3D. [Doctoral Dissertation]. Université Lille I – Sciences et Technologies; 2011. Available from: http://www.theses.fr/2011LIL10075

20. De Smedt, Quentin. Dynamic hand gesture recognition : from traditional handcrafted to recent deep learning approaches : Reconnaissance de gestes dynamiques de la main : des méthodes traditionnelles aux récentes avancées en apprentissage profond.

Degree: Docteur es, Informatique, 2017, Université Lille I – Sciences et Technologies

Les gestes de la main sont le moyen de communication non verbal le plus naturel et le plus intuitif lorsqu'il est question d'interaction avec un… (more)

Subjects/Keywords: Reconnaissance des gestes; 006.37

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

De Smedt, Q. (2017). Dynamic hand gesture recognition : from traditional handcrafted to recent deep learning approaches : Reconnaissance de gestes dynamiques de la main : des méthodes traditionnelles aux récentes avancées en apprentissage profond. (Doctoral Dissertation). Université Lille I – Sciences et Technologies. Retrieved from http://www.theses.fr/2017LIL10139

Chicago Manual of Style (16th Edition):

De Smedt, Quentin. “Dynamic hand gesture recognition : from traditional handcrafted to recent deep learning approaches : Reconnaissance de gestes dynamiques de la main : des méthodes traditionnelles aux récentes avancées en apprentissage profond.” 2017. Doctoral Dissertation, Université Lille I – Sciences et Technologies. Accessed March 06, 2021. http://www.theses.fr/2017LIL10139.

MLA Handbook (7th Edition):

De Smedt, Quentin. “Dynamic hand gesture recognition : from traditional handcrafted to recent deep learning approaches : Reconnaissance de gestes dynamiques de la main : des méthodes traditionnelles aux récentes avancées en apprentissage profond.” 2017. Web. 06 Mar 2021.

Vancouver:

De Smedt Q. Dynamic hand gesture recognition : from traditional handcrafted to recent deep learning approaches : Reconnaissance de gestes dynamiques de la main : des méthodes traditionnelles aux récentes avancées en apprentissage profond. [Internet] [Doctoral dissertation]. Université Lille I – Sciences et Technologies; 2017. [cited 2021 Mar 06]. Available from: http://www.theses.fr/2017LIL10139.

Council of Science Editors:

De Smedt Q. Dynamic hand gesture recognition : from traditional handcrafted to recent deep learning approaches : Reconnaissance de gestes dynamiques de la main : des méthodes traditionnelles aux récentes avancées en apprentissage profond. [Doctoral Dissertation]. Université Lille I – Sciences et Technologies; 2017. Available from: http://www.theses.fr/2017LIL10139

21. Sélo-Carreau, Aude. Rôle du monoxyde d'azote dans la reconnaissance cellulaire : étude d'un modèle endothélial lié au mélanome : Role of nitric oxide in the modulation of cell recognition : study of a melanoma-related endothelial model.

Degree: Docteur es, Biologie cellulaire et moléculaire, 2010, Université d'Orléans

Le mélanome est le cancer de la peau le plus rare, mais celui qui cause le plus de mortalité. L’étapecritique de sa progression est l’angiogenèse,… (more)

Subjects/Keywords: Reconnaissance cellulaire; Cellular recognition

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sélo-Carreau, A. (2010). Rôle du monoxyde d'azote dans la reconnaissance cellulaire : étude d'un modèle endothélial lié au mélanome : Role of nitric oxide in the modulation of cell recognition : study of a melanoma-related endothelial model. (Doctoral Dissertation). Université d'Orléans. Retrieved from http://www.theses.fr/2010ORLE2028

Chicago Manual of Style (16th Edition):

Sélo-Carreau, Aude. “Rôle du monoxyde d'azote dans la reconnaissance cellulaire : étude d'un modèle endothélial lié au mélanome : Role of nitric oxide in the modulation of cell recognition : study of a melanoma-related endothelial model.” 2010. Doctoral Dissertation, Université d'Orléans. Accessed March 06, 2021. http://www.theses.fr/2010ORLE2028.

MLA Handbook (7th Edition):

Sélo-Carreau, Aude. “Rôle du monoxyde d'azote dans la reconnaissance cellulaire : étude d'un modèle endothélial lié au mélanome : Role of nitric oxide in the modulation of cell recognition : study of a melanoma-related endothelial model.” 2010. Web. 06 Mar 2021.

Vancouver:

Sélo-Carreau A. Rôle du monoxyde d'azote dans la reconnaissance cellulaire : étude d'un modèle endothélial lié au mélanome : Role of nitric oxide in the modulation of cell recognition : study of a melanoma-related endothelial model. [Internet] [Doctoral dissertation]. Université d'Orléans; 2010. [cited 2021 Mar 06]. Available from: http://www.theses.fr/2010ORLE2028.

Council of Science Editors:

Sélo-Carreau A. Rôle du monoxyde d'azote dans la reconnaissance cellulaire : étude d'un modèle endothélial lié au mélanome : Role of nitric oxide in the modulation of cell recognition : study of a melanoma-related endothelial model. [Doctoral Dissertation]. Université d'Orléans; 2010. Available from: http://www.theses.fr/2010ORLE2028


University of Ottawa

22. Fournier, Priscilla. La reconnaissance des musulmans en contexte de laïcité : médiation et dialogue chez Mohammed Arkoun et Tariq Ramadan .

Degree: 2014, University of Ottawa

 Certaines demandes de reconnaissance formulées par les musulmans sont parfois perçues comme autant de potentielles atteintes à la neutralité des États qui se veulent laïcs.… (more)

Subjects/Keywords: laïcité; islam; reconnaissance; médiation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fournier, P. (2014). La reconnaissance des musulmans en contexte de laïcité : médiation et dialogue chez Mohammed Arkoun et Tariq Ramadan . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/31632

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fournier, Priscilla. “La reconnaissance des musulmans en contexte de laïcité : médiation et dialogue chez Mohammed Arkoun et Tariq Ramadan .” 2014. Thesis, University of Ottawa. Accessed March 06, 2021. http://hdl.handle.net/10393/31632.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fournier, Priscilla. “La reconnaissance des musulmans en contexte de laïcité : médiation et dialogue chez Mohammed Arkoun et Tariq Ramadan .” 2014. Web. 06 Mar 2021.

Vancouver:

Fournier P. La reconnaissance des musulmans en contexte de laïcité : médiation et dialogue chez Mohammed Arkoun et Tariq Ramadan . [Internet] [Thesis]. University of Ottawa; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/10393/31632.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fournier P. La reconnaissance des musulmans en contexte de laïcité : médiation et dialogue chez Mohammed Arkoun et Tariq Ramadan . [Thesis]. University of Ottawa; 2014. Available from: http://hdl.handle.net/10393/31632

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Keita, Abou. Modèles statistiques précoces et robustes pour l’estimation de la concentration d’agents biologiques dans un système de surveillance en continu dans l’environnement : Early and robust statistical models to estimate the concentration of biological agents in a continuous monitoring system in the environment.

Degree: Docteur es, Informatique, 2014, Rouen, INSA

Cette thèse s'inscrit dans le cadre du projet ANR Génétic EquipemeNt for biothrEat enviroNmental Analysis and SurveillancE (GENEASE). Ce projet porte sur l'étude d'un système… (more)

Subjects/Keywords: Reconnaissance d'agents biologiques; Biological threat

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Keita, A. (2014). Modèles statistiques précoces et robustes pour l’estimation de la concentration d’agents biologiques dans un système de surveillance en continu dans l’environnement : Early and robust statistical models to estimate the concentration of biological agents in a continuous monitoring system in the environment. (Doctoral Dissertation). Rouen, INSA. Retrieved from http://www.theses.fr/2014ISAM0017

Chicago Manual of Style (16th Edition):

Keita, Abou. “Modèles statistiques précoces et robustes pour l’estimation de la concentration d’agents biologiques dans un système de surveillance en continu dans l’environnement : Early and robust statistical models to estimate the concentration of biological agents in a continuous monitoring system in the environment.” 2014. Doctoral Dissertation, Rouen, INSA. Accessed March 06, 2021. http://www.theses.fr/2014ISAM0017.

MLA Handbook (7th Edition):

Keita, Abou. “Modèles statistiques précoces et robustes pour l’estimation de la concentration d’agents biologiques dans un système de surveillance en continu dans l’environnement : Early and robust statistical models to estimate the concentration of biological agents in a continuous monitoring system in the environment.” 2014. Web. 06 Mar 2021.

Vancouver:

Keita A. Modèles statistiques précoces et robustes pour l’estimation de la concentration d’agents biologiques dans un système de surveillance en continu dans l’environnement : Early and robust statistical models to estimate the concentration of biological agents in a continuous monitoring system in the environment. [Internet] [Doctoral dissertation]. Rouen, INSA; 2014. [cited 2021 Mar 06]. Available from: http://www.theses.fr/2014ISAM0017.

Council of Science Editors:

Keita A. Modèles statistiques précoces et robustes pour l’estimation de la concentration d’agents biologiques dans un système de surveillance en continu dans l’environnement : Early and robust statistical models to estimate the concentration of biological agents in a continuous monitoring system in the environment. [Doctoral Dissertation]. Rouen, INSA; 2014. Available from: http://www.theses.fr/2014ISAM0017


Université Catholique de Louvain

24. Laborderie, Vincent. Les déterminants de la reconnaissance internationale : les Etats européens face au cas du Kosovo.

Degree: 2017, Université Catholique de Louvain

In February 2008 became a fully independent state. But almost ten years after that, recognition of Kosovo remains a problematic and divisive case for international… (more)

Subjects/Keywords: Kosovo; Reconnaissance internationale; PESC; Séparatisme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laborderie, V. (2017). Les déterminants de la reconnaissance internationale : les Etats européens face au cas du Kosovo. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/186558

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laborderie, Vincent. “Les déterminants de la reconnaissance internationale : les Etats européens face au cas du Kosovo.” 2017. Thesis, Université Catholique de Louvain. Accessed March 06, 2021. http://hdl.handle.net/2078.1/186558.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laborderie, Vincent. “Les déterminants de la reconnaissance internationale : les Etats européens face au cas du Kosovo.” 2017. Web. 06 Mar 2021.

Vancouver:

Laborderie V. Les déterminants de la reconnaissance internationale : les Etats européens face au cas du Kosovo. [Internet] [Thesis]. Université Catholique de Louvain; 2017. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2078.1/186558.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laborderie V. Les déterminants de la reconnaissance internationale : les Etats européens face au cas du Kosovo. [Thesis]. Université Catholique de Louvain; 2017. Available from: http://hdl.handle.net/2078.1/186558

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. LIU XIAO. DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS.

Degree: 2015, National University of Singapore

Subjects/Keywords: differential privacy; collaborative recommendation system; online learning; lower bound; algorithm; colluding attackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

XIAO, L. (2015). DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/123732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

XIAO, LIU. “DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS.” 2015. Thesis, National University of Singapore. Accessed March 06, 2021. http://scholarbank.nus.edu.sg/handle/10635/123732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

XIAO, LIU. “DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS.” 2015. Web. 06 Mar 2021.

Vancouver:

XIAO L. DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS. [Internet] [Thesis]. National University of Singapore; 2015. [cited 2021 Mar 06]. Available from: http://scholarbank.nus.edu.sg/handle/10635/123732.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

XIAO L. DIFFERENTIALLY PRIVATE ONLINE COLLABORATIVE RECOMMENDATION SYSTEMS. [Thesis]. National University of Singapore; 2015. Available from: http://scholarbank.nus.edu.sg/handle/10635/123732

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

26. Teklay, Gebremichael. Preventing Flooding Attack in MANETs using the reserved bits of AODV messages .

Degree: 2014, Addis Ababa University

 The flexibility and other advantages of mobile ad-hoc networks come with different security flaws, and flooding attack is one of the common attacks in reactive… (more)

Subjects/Keywords: Preventing flooding attack; Data flooding attac; Route request flooding attack; Route request flooding attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Teklay, G. (2014). Preventing Flooding Attack in MANETs using the reserved bits of AODV messages . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/5233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Teklay, Gebremichael. “Preventing Flooding Attack in MANETs using the reserved bits of AODV messages .” 2014. Thesis, Addis Ababa University. Accessed March 06, 2021. http://etd.aau.edu.et/dspace/handle/123456789/5233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Teklay, Gebremichael. “Preventing Flooding Attack in MANETs using the reserved bits of AODV messages .” 2014. Web. 06 Mar 2021.

Vancouver:

Teklay G. Preventing Flooding Attack in MANETs using the reserved bits of AODV messages . [Internet] [Thesis]. Addis Ababa University; 2014. [cited 2021 Mar 06]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/5233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Teklay G. Preventing Flooding Attack in MANETs using the reserved bits of AODV messages . [Thesis]. Addis Ababa University; 2014. Available from: http://etd.aau.edu.et/dspace/handle/123456789/5233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

27. Liu, Ming-Che. APT Attack Detection Based on DNS Time Frequency Analysis.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 Recently, malware infection has become one of the most serious threats against information security. Analysis and detection against malware are regarded as an important issue… (more)

Subjects/Keywords: Malware; Traffic Analysis; APT Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, M. (2013). APT Attack Detection Based on DNS Time Frequency Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Thesis, NSYSU. Accessed March 06, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Web. 06 Mar 2021.

Vancouver:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Internet] [Thesis]. NSYSU; 2013. [cited 2021 Mar 06]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. CHITTAPHONE PHONHARATH. Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Inference attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

PHONHARATH, C. (n.d.). Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/7608

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

PHONHARATH, CHITTAPHONE. “Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed March 06, 2021. http://hdl.handle.net/10061/7608.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

PHONHARATH, CHITTAPHONE. “Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ.” Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

PHONHARATH C. Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2021 Mar 06]. Available from: http://hdl.handle.net/10061/7608.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

PHONHARATH C. Verification of the Security against Inference Attacks on XML Databases : XMLデータベースにおける推論攻撃に対する安全性検証; XML データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/7608

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Georgia Tech

29. Alzahrani, Ibtehaj M. Identifying and clustering attack-driven crash reports using machine learning.

Degree: MS, Computer Science, 2019, Georgia Tech

 We propose a tool to identify crashes caused by filed exploits from benign crashes, and cluster them based on the exploited vulnerabilities to prioritize crashes… (more)

Subjects/Keywords: Attack-driven crash reports

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alzahrani, I. M. (2019). Identifying and clustering attack-driven crash reports using machine learning. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62701

Chicago Manual of Style (16th Edition):

Alzahrani, Ibtehaj M. “Identifying and clustering attack-driven crash reports using machine learning.” 2019. Masters Thesis, Georgia Tech. Accessed March 06, 2021. http://hdl.handle.net/1853/62701.

MLA Handbook (7th Edition):

Alzahrani, Ibtehaj M. “Identifying and clustering attack-driven crash reports using machine learning.” 2019. Web. 06 Mar 2021.

Vancouver:

Alzahrani IM. Identifying and clustering attack-driven crash reports using machine learning. [Internet] [Masters thesis]. Georgia Tech; 2019. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/1853/62701.

Council of Science Editors:

Alzahrani IM. Identifying and clustering attack-driven crash reports using machine learning. [Masters Thesis]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62701


Queens University

30. Fahim Hashemi, Hana Sadat. A Hybrid Approach to Detect Tabnabbing Attacks .

Degree: Computing, 2014, Queens University

 Phishing is one of the most prevalent types of modern attacks, costing significant financial losses to enterprises and users each day. Despite the emergence of… (more)

Subjects/Keywords: Tabnabbing ; Attack Detection ; Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fahim Hashemi, H. S. (2014). A Hybrid Approach to Detect Tabnabbing Attacks . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fahim Hashemi, Hana Sadat. “A Hybrid Approach to Detect Tabnabbing Attacks .” 2014. Thesis, Queens University. Accessed March 06, 2021. http://hdl.handle.net/1974/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fahim Hashemi, Hana Sadat. “A Hybrid Approach to Detect Tabnabbing Attacks .” 2014. Web. 06 Mar 2021.

Vancouver:

Fahim Hashemi HS. A Hybrid Approach to Detect Tabnabbing Attacks . [Internet] [Thesis]. Queens University; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/1974/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fahim Hashemi HS. A Hybrid Approach to Detect Tabnabbing Attacks . [Thesis]. Queens University; 2014. Available from: http://hdl.handle.net/1974/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [111]

.