Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Computer networks Security measures). Showing records 1 – 30 of 116306 total matches.

[1] [2] [3] [4] [5] … [3877]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Nelson Mandela Metropolitan University

1. Naudé, Kevin Alexander. Assessing program code through static structural similarity.

Degree: MSc, Faculty of Science, 2007, Nelson Mandela Metropolitan University

 Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been… (more)

Subjects/Keywords: Computer networks  – Security measures; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naudé, K. A. (2007). Assessing program code through static structural similarity. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/578

Chicago Manual of Style (16th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed July 20, 2019. http://hdl.handle.net/10948/578.

MLA Handbook (7th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Web. 20 Jul 2019.

Vancouver:

Naudé KA. Assessing program code through static structural similarity. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10948/578.

Council of Science Editors:

Naudé KA. Assessing program code through static structural similarity. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/578

2. Fragkos, Grigorios. Near real-time threat assessment using intrusion detection system's data.

Degree: PhD, University of Glamorgan, 2012, University of South Wales

 The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent… (more)

Subjects/Keywords: Computer networks Security measures; 005.8

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fragkos, G. (2012). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from http://hdl.handle.net/10265/569

Chicago Manual of Style (16th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Doctoral Dissertation, University of South Wales. Accessed July 20, 2019. http://hdl.handle.net/10265/569.

MLA Handbook (7th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Web. 20 Jul 2019.

Vancouver:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10265/569.

Council of Science Editors:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2012. Available from: http://hdl.handle.net/10265/569


University of North Carolina – Greensboro

3. Zou, Xiaocheng. Ant-based evidence distribution with periodic broadcast in attacked wireless network.

Degree: 2011, University of North Carolina – Greensboro

 In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so,… (more)

Subjects/Keywords: Computer networks – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zou, X. (2011). Ant-based evidence distribution with periodic broadcast in attacked wireless network. (Masters Thesis). University of North Carolina – Greensboro. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548

Chicago Manual of Style (16th Edition):

Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in attacked wireless network.” 2011. Masters Thesis, University of North Carolina – Greensboro. Accessed July 20, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.

MLA Handbook (7th Edition):

Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in attacked wireless network.” 2011. Web. 20 Jul 2019.

Vancouver:

Zou X. Ant-based evidence distribution with periodic broadcast in attacked wireless network. [Internet] [Masters thesis]. University of North Carolina – Greensboro; 2011. [cited 2019 Jul 20]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.

Council of Science Editors:

Zou X. Ant-based evidence distribution with periodic broadcast in attacked wireless network. [Masters Thesis]. University of North Carolina – Greensboro; 2011. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548

4. Fragkos, Grigorios. Near real-time threat assessment using intrusion detection system's data.

Degree: PhD, 2011, University of South Wales

 The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent… (more)

Subjects/Keywords: 005.8; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fragkos, G. (2011). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659

Chicago Manual of Style (16th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Doctoral Dissertation, University of South Wales. Accessed July 20, 2019. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.

MLA Handbook (7th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Web. 20 Jul 2019.

Vancouver:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2011. [cited 2019 Jul 20]. Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.

Council of Science Editors:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2011. Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659


Nelson Mandela Metropolitan University

5. Reid, Rayne. Guidelines for cybersecurity education campaigns.

Degree: 2017, Nelson Mandela Metropolitan University

 In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2017). Guidelines for cybersecurity education campaigns. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed July 20, 2019. http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Web. 20 Jul 2019.

Vancouver:

Reid R. Guidelines for cybersecurity education campaigns. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Reid R. Guidelines for cybersecurity education campaigns. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

6. Mayisela, Simphiwe Hector. Data-centric security : towards a utopian model for protecting corporate data on mobile devices.

Degree: Faculty of Science, Computer Science, 2014, Rhodes University

 Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures; Mobile communication systems  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mayisela, S. H. (2014). Data-centric security : towards a utopian model for protecting corporate data on mobile devices. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Thesis, Rhodes University. Accessed July 20, 2019. http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Web. 20 Jul 2019.

Vancouver:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Internet] [Thesis]. Rhodes University; 2014. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Thesis]. Rhodes University; 2014. Available from: http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

7. Yeung, Cheuk-yu. Towards secure, privacy-preserving, and trusted analytic about ad hoc network data.

Degree: PhD, 2017, University of Hong Kong

The boom of Big Data and Internet of Things (IoT) trends induces lots of hot topics including data security, users privacy, devices connectivity and usage… (more)

Subjects/Keywords: Security measures - Ad hoc networks (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yeung, C. (2017). Towards secure, privacy-preserving, and trusted analytic about ad hoc network data. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/250759

Chicago Manual of Style (16th Edition):

Yeung, Cheuk-yu. “Towards secure, privacy-preserving, and trusted analytic about ad hoc network data.” 2017. Doctoral Dissertation, University of Hong Kong. Accessed July 20, 2019. http://hdl.handle.net/10722/250759.

MLA Handbook (7th Edition):

Yeung, Cheuk-yu. “Towards secure, privacy-preserving, and trusted analytic about ad hoc network data.” 2017. Web. 20 Jul 2019.

Vancouver:

Yeung C. Towards secure, privacy-preserving, and trusted analytic about ad hoc network data. [Internet] [Doctoral dissertation]. University of Hong Kong; 2017. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10722/250759.

Council of Science Editors:

Yeung C. Towards secure, privacy-preserving, and trusted analytic about ad hoc network data. [Doctoral Dissertation]. University of Hong Kong; 2017. Available from: http://hdl.handle.net/10722/250759


Hong Kong University of Science and Technology

8. Guo, Ziyang ECE. Cyber-physical systems security : a control-theoretic approach.

Degree: 2018, Hong Kong University of Science and Technology

 This thesis investigates security issues for remote state estimation in the context of cyber-physical systems. Different problems are studied from the perspective of either a… (more)

Subjects/Keywords: Computer networks; Security measures; Wireless sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guo, Z. E. (2018). Cyber-physical systems security : a control-theoretic approach. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Guo, Ziyang ECE. “Cyber-physical systems security : a control-theoretic approach.” 2018. Thesis, Hong Kong University of Science and Technology. Accessed July 20, 2019. https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Guo, Ziyang ECE. “Cyber-physical systems security : a control-theoretic approach.” 2018. Web. 20 Jul 2019.

Vancouver:

Guo ZE. Cyber-physical systems security : a control-theoretic approach. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2018. [cited 2019 Jul 20]. Available from: https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Guo ZE. Cyber-physical systems security : a control-theoretic approach. [Thesis]. Hong Kong University of Science and Technology; 2018. Available from: https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

9. Frauenstein, Edwin Donald. A framework to mitigate phishing threats.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld… (more)

Subjects/Keywords: Computer networks  – Security measures; Mobile computing  – Security measures; Online social networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frauenstein, E. D. (2013). A framework to mitigate phishing threats. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed July 20, 2019. http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Web. 20 Jul 2019.

Vancouver:

Frauenstein ED. A framework to mitigate phishing threats. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frauenstein ED. A framework to mitigate phishing threats. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Joshuva, Justin. Identifying users on social networking using pattern recognition in messages.

Degree: 2017, University of Tennessee – Chattanooga

 Online social networks, such as Facebook and Twitter, have become a huge part of many people's lives, often as their main means of communication with… (more)

Subjects/Keywords: Online social networks  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joshuva, J. (2017). Identifying users on social networking using pattern recognition in messages. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/539

Chicago Manual of Style (16th Edition):

Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Masters Thesis, University of Tennessee – Chattanooga. Accessed July 20, 2019. https://scholar.utc.edu/theses/539.

MLA Handbook (7th Edition):

Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Web. 20 Jul 2019.

Vancouver:

Joshuva J. Identifying users on social networking using pattern recognition in messages. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2017. [cited 2019 Jul 20]. Available from: https://scholar.utc.edu/theses/539.

Council of Science Editors:

Joshuva J. Identifying users on social networking using pattern recognition in messages. [Masters Thesis]. University of Tennessee – Chattanooga; 2017. Available from: https://scholar.utc.edu/theses/539


University of Johannesburg

11. Van Buuren, Suzi. Information security in a distributed banking environment, with specific reference to security protocols.

Degree: 2012, University of Johannesburg

M.Comm.

The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment… (more)

Subjects/Keywords: Banks and banking - Security measures; Intranets (Computer networks) - Security measures; Internet - Security measures; Computer networks - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Buuren, S. (2012). Information security in a distributed banking environment, with specific reference to security protocols. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Thesis, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Web. 20 Jul 2019.

Vancouver:

Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

12. Coertze, Jacques Jacobus. A framework for information security governance in SMMEs.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved… (more)

Subjects/Keywords: Business  – Data processing  – Security measures; Management information systems  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coertze, J. J. (2012). A framework for information security governance in SMMEs. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed July 20, 2019. http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Web. 20 Jul 2019.

Vancouver:

Coertze JJ. A framework for information security governance in SMMEs. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coertze JJ. A framework for information security governance in SMMEs. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

13. Diakite, Soumaila Dit Moule. WISP: a wireless information security portal.

Degree: 2010, University of Johannesburg

M.Sc.

Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless… (more)

Subjects/Keywords: Wireless communication systems security measures; Wireless LANs security measures; Computer networks security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diakite, S. D. M. (2010). WISP: a wireless information security portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Thesis, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Web. 20 Jul 2019.

Vancouver:

Diakite SDM. WISP: a wireless information security portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diakite SDM. WISP: a wireless information security portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

14. Van der Merwe, Jacobus. Information security using intelligent software agents.

Degree: PhD, 2012, University of Johannesburg

 Many organisations are starting to make large parts of their information resources publicly accessible. For example, many organisations publish information using the Internet. Some organisations… (more)

Subjects/Keywords: Computer security; Computer networks - Security measures; Internet - Security measures; Intelligent agents (Computer software)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, J. (2012). Information security using intelligent software agents. (Doctoral Dissertation). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6231

Chicago Manual of Style (16th Edition):

Van der Merwe, Jacobus. “Information security using intelligent software agents.” 2012. Doctoral Dissertation, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/6231.

MLA Handbook (7th Edition):

Van der Merwe, Jacobus. “Information security using intelligent software agents.” 2012. Web. 20 Jul 2019.

Vancouver:

Van der Merwe J. Information security using intelligent software agents. [Internet] [Doctoral dissertation]. University of Johannesburg; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/6231.

Council of Science Editors:

Van der Merwe J. Information security using intelligent software agents. [Doctoral Dissertation]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6231


Drexel University

15. Huang, Tingshan. Adaptive Sampling and Statistical Inference for Anomaly Detection.

Degree: 2015, Drexel University

 Given the rising threat of malware and the increasing inadequacy of signature-based solutions, online performance monitoring has emerged as a critical component of the security(more)

Subjects/Keywords: Electrical engineering; Cyberinfrastructure – Security measures; Computer networks – Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, T. (2015). Adaptive Sampling and Statistical Inference for Anomaly Detection. (Thesis). Drexel University. Retrieved from http://hdl.handle.net/1860/idea:6647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Thesis, Drexel University. Accessed July 20, 2019. http://hdl.handle.net/1860/idea:6647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Web. 20 Jul 2019.

Vancouver:

Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Internet] [Thesis]. Drexel University; 2015. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/1860/idea:6647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Thesis]. Drexel University; 2015. Available from: http://hdl.handle.net/1860/idea:6647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

16. Guo, Qi, 1970-. A formal approach to the role mining problem.

Degree: PhD, Management, 2010, Rutgers University

Role-based access control (RBAC) has become the norm for enforcing security since it has been successfully implemented in various commercial systems. Roles, which are nothing… (more)

Subjects/Keywords: Computer networks – Security measures; Information technology – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guo, Qi, 1. (2010). A formal approach to the role mining problem. (Doctoral Dissertation). Rutgers University. Retrieved from http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099

Chicago Manual of Style (16th Edition):

Guo, Qi, 1970-. “A formal approach to the role mining problem.” 2010. Doctoral Dissertation, Rutgers University. Accessed July 20, 2019. http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099.

MLA Handbook (7th Edition):

Guo, Qi, 1970-. “A formal approach to the role mining problem.” 2010. Web. 20 Jul 2019.

Vancouver:

Guo, Qi 1. A formal approach to the role mining problem. [Internet] [Doctoral dissertation]. Rutgers University; 2010. [cited 2019 Jul 20]. Available from: http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099.

Council of Science Editors:

Guo, Qi 1. A formal approach to the role mining problem. [Doctoral Dissertation]. Rutgers University; 2010. Available from: http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099


University of Johannesburg

17. Venter, Hein S. Real-time risk analysis : a modern perspective on network security with a prototype.

Degree: 2012, University of Johannesburg

M.Sc.

The present study was undertaken in a bid within the realm of the existing Internet working environment to meet the need for a more… (more)

Subjects/Keywords: Internet - Security measures.; Computer networks - Security measures.; Risk assessment - Data processing.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venter, H. S. (2012). Real-time risk analysis : a modern perspective on network security with a prototype. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Thesis, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Web. 20 Jul 2019.

Vancouver:

Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

18. Deas, Matthew Burns. Towards a user centric model for identity and access management within the online environment.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks… (more)

Subjects/Keywords: Computers  – Access control; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deas, M. B. (2008). Towards a user centric model for identity and access management within the online environment. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed July 20, 2019. http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Web. 20 Jul 2019.

Vancouver:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

19. Cui, Xingmin. Data privacy of Android applications and name privacy of NDN.

Degree: PhD, 2016, University of Hong Kong

 We get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two… (more)

Subjects/Keywords: Computer networks - Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, X. (2016). Data privacy of Android applications and name privacy of NDN. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/236581

Chicago Manual of Style (16th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Doctoral Dissertation, University of Hong Kong. Accessed July 20, 2019. http://hdl.handle.net/10722/236581.

MLA Handbook (7th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Web. 20 Jul 2019.

Vancouver:

Cui X. Data privacy of Android applications and name privacy of NDN. [Internet] [Doctoral dissertation]. University of Hong Kong; 2016. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10722/236581.

Council of Science Editors:

Cui X. Data privacy of Android applications and name privacy of NDN. [Doctoral Dissertation]. University of Hong Kong; 2016. Available from: http://hdl.handle.net/10722/236581


Ryerson University

20. Peddi, Rajender D. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.

Degree: 2012, Ryerson University

  This thesis proposes two protocols for addressing collaborative blackhole attacks in MANETs, referred to as the Detecting Blackhole Attack-Dynamic Source Routing (DBA- DSR) and… (more)

Subjects/Keywords: Mobile communication systems; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peddi, R. D. (2012). Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Thesis, Ryerson University. Accessed July 20, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Web. 20 Jul 2019.

Vancouver:

Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Internet] [Thesis]. Ryerson University; 2012. [cited 2019 Jul 20]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Thesis]. Ryerson University; 2012. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

21. Nel, Yvette. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The… (more)

Subjects/Keywords: Computer networks - Security measures; Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nel, Y. (2014). 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/11576

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nel, Yvette. “'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.” 2014. Thesis, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/11576.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nel, Yvette. “'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.” 2014. Web. 20 Jul 2019.

Vancouver:

Nel Y. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/11576.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nel Y. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/11576

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

22. Gcaza, Noluxolo. A national strategy towards cultivating a cybersecurity culture in South Africa.

Degree: 2017, Nelson Mandela Metropolitan University

 In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to… (more)

Subjects/Keywords: Computer networks  – Security measures; Cyberspace  – Security measures; Computer security  – South Africa; Subculture  – South Africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gcaza, N. (2017). A national strategy towards cultivating a cybersecurity culture in South Africa. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/13735

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gcaza, Noluxolo. “A national strategy towards cultivating a cybersecurity culture in South Africa.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed July 20, 2019. http://hdl.handle.net/10948/13735.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gcaza, Noluxolo. “A national strategy towards cultivating a cybersecurity culture in South Africa.” 2017. Web. 20 Jul 2019.

Vancouver:

Gcaza N. A national strategy towards cultivating a cybersecurity culture in South Africa. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10948/13735.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gcaza N. A national strategy towards cultivating a cybersecurity culture in South Africa. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/13735

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

23. Pieterse, Theron Anton. The computer incident response framework (CIRF).

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

A company’s valuable information assets face many risks from internal and external sources. When these risks are exploited and reports on information assets… (more)

Subjects/Keywords: Information technology - Security measures; Computer networks - Security measures; Risk management; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pieterse, T. A. (2014). The computer incident response framework (CIRF). (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12368

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pieterse, Theron Anton. “The computer incident response framework (CIRF).” 2014. Thesis, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/12368.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pieterse, Theron Anton. “The computer incident response framework (CIRF).” 2014. Web. 20 Jul 2019.

Vancouver:

Pieterse TA. The computer incident response framework (CIRF). [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/12368.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pieterse TA. The computer incident response framework (CIRF). [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12368

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

24. Nayak, Ankur Kumar. Flexible access control for campus and enterprise networks.

Degree: MS, Computing, 2010, Georgia Tech

 We consider the problem of designing enterprise network security systems which are easy to manage, robust and flexible. This problem is challenging. Today, most approaches… (more)

Subjects/Keywords: Access control; Security; Enterprise networks; Programmable networks; Computer networks Security measures; Computer networks Management; Computer networks; Local area networks (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nayak, A. K. (2010). Flexible access control for campus and enterprise networks. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33813

Chicago Manual of Style (16th Edition):

Nayak, Ankur Kumar. “Flexible access control for campus and enterprise networks.” 2010. Masters Thesis, Georgia Tech. Accessed July 20, 2019. http://hdl.handle.net/1853/33813.

MLA Handbook (7th Edition):

Nayak, Ankur Kumar. “Flexible access control for campus and enterprise networks.” 2010. Web. 20 Jul 2019.

Vancouver:

Nayak AK. Flexible access control for campus and enterprise networks. [Internet] [Masters thesis]. Georgia Tech; 2010. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/1853/33813.

Council of Science Editors:

Nayak AK. Flexible access control for campus and enterprise networks. [Masters Thesis]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33813


Nelson Mandela Metropolitan University

25. Kortjan, Noloxolo. A cyber security awareness and education framework for South Africa.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive… (more)

Subjects/Keywords: Computer networks  – Security measures; Computer crimes  – Prevention; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kortjan, N. (2013). A cyber security awareness and education framework for South Africa. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1014829

Chicago Manual of Style (16th Edition):

Kortjan, Noloxolo. “A cyber security awareness and education framework for South Africa.” 2013. Masters Thesis, Nelson Mandela Metropolitan University. Accessed July 20, 2019. http://hdl.handle.net/10948/d1014829.

MLA Handbook (7th Edition):

Kortjan, Noloxolo. “A cyber security awareness and education framework for South Africa.” 2013. Web. 20 Jul 2019.

Vancouver:

Kortjan N. A cyber security awareness and education framework for South Africa. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10948/d1014829.

Council of Science Editors:

Kortjan N. A cyber security awareness and education framework for South Africa. [Masters Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1014829


Ryerson University

26. Razavi, Sanaz Hafezian. Evaluating security measures of a layered system.

Degree: 2009, Ryerson University

 Most distributed systems that we use in our daily lives have layered architecture since such architectures allow separation of processing between multiple processes in different… (more)

Subjects/Keywords: Computer networks  – Security measures; Computer architecture; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Razavi, S. H. (2009). Evaluating security measures of a layered system. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Razavi, Sanaz Hafezian. “Evaluating security measures of a layered system.” 2009. Thesis, Ryerson University. Accessed July 20, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Razavi, Sanaz Hafezian. “Evaluating security measures of a layered system.” 2009. Web. 20 Jul 2019.

Vancouver:

Razavi SH. Evaluating security measures of a layered system. [Internet] [Thesis]. Ryerson University; 2009. [cited 2019 Jul 20]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Razavi SH. Evaluating security measures of a layered system. [Thesis]. Ryerson University; 2009. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Macquarie University

27. Vo, Hanh Nguyen. Protecting web services from botnet exploitations.

Degree: 2012, Macquarie University

1. Introduction  – 2. Botnet  – 3. Web 2.0 botnet and current botnet detection techniques  – 4. API verifier: an application-based approach to detect Bot… (more)

Subjects/Keywords: Malware (Computer software); Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vo, H. N. (2012). Protecting web services from botnet exploitations. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/228419

Chicago Manual of Style (16th Edition):

Vo, Hanh Nguyen. “Protecting web services from botnet exploitations.” 2012. Doctoral Dissertation, Macquarie University. Accessed July 20, 2019. http://hdl.handle.net/1959.14/228419.

MLA Handbook (7th Edition):

Vo, Hanh Nguyen. “Protecting web services from botnet exploitations.” 2012. Web. 20 Jul 2019.

Vancouver:

Vo HN. Protecting web services from botnet exploitations. [Internet] [Doctoral dissertation]. Macquarie University; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/1959.14/228419.

Council of Science Editors:

Vo HN. Protecting web services from botnet exploitations. [Doctoral Dissertation]. Macquarie University; 2012. Available from: http://hdl.handle.net/1959.14/228419


University of Johannesburg

28. Kersten, Karin. The management of networks with specific reference to security management.

Degree: 2012, University of Johannesburg

M.Comm.

This dissertation is devoted to an investigation into the network-management environment, with special emphasis on the security aspects and the provision of a reference… (more)

Subjects/Keywords: Computer networks - Management; Computer networks - Security measures; Computer crimes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kersten, K. (2012). The management of networks with specific reference to security management. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kersten, Karin. “The management of networks with specific reference to security management.” 2012. Thesis, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/5739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kersten, Karin. “The management of networks with specific reference to security management.” 2012. Web. 20 Jul 2019.

Vancouver:

Kersten K. The management of networks with specific reference to security management. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/5739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kersten K. The management of networks with specific reference to security management. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

29. Geldenhuys, Jan Harm Steenkamp. Mosaic : model for secure anonymous Internet communication.

Degree: 2012, University of Johannesburg

D.Litt. et Phil.

It is said that computer security is like getting into bed with an elephant. You know you have a problem, but you… (more)

Subjects/Keywords: Internet - Security measures.; Computer networks - Security measures.; Intelligent agents (Computer software).; Mosaic (Computer file)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Geldenhuys, J. H. S. (2012). Mosaic : model for secure anonymous Internet communication. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7549

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Geldenhuys, Jan Harm Steenkamp. “Mosaic : model for secure anonymous Internet communication.” 2012. Thesis, University of Johannesburg. Accessed July 20, 2019. http://hdl.handle.net/10210/7549.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Geldenhuys, Jan Harm Steenkamp. “Mosaic : model for secure anonymous Internet communication.” 2012. Web. 20 Jul 2019.

Vancouver:

Geldenhuys JHS. Mosaic : model for secure anonymous Internet communication. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 20]. Available from: http://hdl.handle.net/10210/7549.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Geldenhuys JHS. Mosaic : model for secure anonymous Internet communication. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7549

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cape Peninsula University of Technology

30. Lububu, Steven. Perception of employees concerning information security policy compliance : case studies of a European and South African university .

Degree: 2018, Cape Peninsula University of Technology

 This study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures; Information technology  – Security measures; Data protection; Information resources management  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lububu, S. (2018). Perception of employees concerning information security policy compliance : case studies of a European and South African university . (Thesis). Cape Peninsula University of Technology. Retrieved from http://etd.cput.ac.za/handle/20.500.11838/2802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lububu, Steven. “Perception of employees concerning information security policy compliance : case studies of a European and South African university .” 2018. Thesis, Cape Peninsula University of Technology. Accessed July 20, 2019. http://etd.cput.ac.za/handle/20.500.11838/2802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lububu, Steven. “Perception of employees concerning information security policy compliance : case studies of a European and South African university .” 2018. Web. 20 Jul 2019.

Vancouver:

Lububu S. Perception of employees concerning information security policy compliance : case studies of a European and South African university . [Internet] [Thesis]. Cape Peninsula University of Technology; 2018. [cited 2019 Jul 20]. Available from: http://etd.cput.ac.za/handle/20.500.11838/2802.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lububu S. Perception of employees concerning information security policy compliance : case studies of a European and South African university . [Thesis]. Cape Peninsula University of Technology; 2018. Available from: http://etd.cput.ac.za/handle/20.500.11838/2802

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [3877]

.