Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Computer networks Security measures). Showing records 1 – 30 of 132308 total matches.

[1] [2] [3] [4] [5] … [4411]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


Nelson Mandela Metropolitan University

1. Naudé, Kevin Alexander. Assessing program code through static structural similarity.

Degree: MSc, Faculty of Science, 2007, Nelson Mandela Metropolitan University

 Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been… (more)

Subjects/Keywords: Computer networks  – Security measures; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naudé, K. A. (2007). Assessing program code through static structural similarity. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/578

Chicago Manual of Style (16th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/578.

MLA Handbook (7th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Web. 02 Mar 2021.

Vancouver:

Naudé KA. Assessing program code through static structural similarity. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/578.

Council of Science Editors:

Naudé KA. Assessing program code through static structural similarity. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/578

2. Fragkos, Grigorios. Near real-time threat assessment using intrusion detection system's data.

Degree: PhD, University of Glamorgan, 2012, University of South Wales

 The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent… (more)

Subjects/Keywords: Computer networks Security measures; 005.8

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fragkos, G. (2012). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from http://hdl.handle.net/10265/569

Chicago Manual of Style (16th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Doctoral Dissertation, University of South Wales. Accessed March 02, 2021. http://hdl.handle.net/10265/569.

MLA Handbook (7th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Web. 02 Mar 2021.

Vancouver:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2012. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10265/569.

Council of Science Editors:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2012. Available from: http://hdl.handle.net/10265/569

3. Fragkos, Grigorios. Near real-time threat assessment using intrusion detection system's data.

Degree: PhD, 2011, University of South Wales

 The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent… (more)

Subjects/Keywords: 005.8; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fragkos, G. (2011). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659

Chicago Manual of Style (16th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Doctoral Dissertation, University of South Wales. Accessed March 02, 2021. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.

MLA Handbook (7th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Web. 02 Mar 2021.

Vancouver:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2011. [cited 2021 Mar 02]. Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.

Council of Science Editors:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2011. Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659


University of North Carolina – Greensboro

4. Zou, Xiaocheng. Ant-based evidence distribution with periodic broadcast in attacked wireless network.

Degree: 2011, University of North Carolina – Greensboro

 In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so,… (more)

Subjects/Keywords: Computer networks – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zou, X. (2011). Ant-based evidence distribution with periodic broadcast in attacked wireless network. (Masters Thesis). University of North Carolina – Greensboro. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548

Chicago Manual of Style (16th Edition):

Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in attacked wireless network.” 2011. Masters Thesis, University of North Carolina – Greensboro. Accessed March 02, 2021. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.

MLA Handbook (7th Edition):

Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in attacked wireless network.” 2011. Web. 02 Mar 2021.

Vancouver:

Zou X. Ant-based evidence distribution with periodic broadcast in attacked wireless network. [Internet] [Masters thesis]. University of North Carolina – Greensboro; 2011. [cited 2021 Mar 02]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.

Council of Science Editors:

Zou X. Ant-based evidence distribution with periodic broadcast in attacked wireless network. [Masters Thesis]. University of North Carolina – Greensboro; 2011. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548


Nelson Mandela Metropolitan University

5. Maharaj, Rahul. A social networking approach to security awareness in end-user cyber-driven financial transactions.

Degree: 2018, Nelson Mandela Metropolitan University

 Cyberspace, including the internet and associated technologies have become critical to social users in their day to day lives. Social users have grown to become… (more)

Subjects/Keywords: Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maharaj, R. (2018). A social networking approach to security awareness in end-user cyber-driven financial transactions. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/48824

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maharaj, Rahul. “A social networking approach to security awareness in end-user cyber-driven financial transactions.” 2018. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/48824.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maharaj, Rahul. “A social networking approach to security awareness in end-user cyber-driven financial transactions.” 2018. Web. 02 Mar 2021.

Vancouver:

Maharaj R. A social networking approach to security awareness in end-user cyber-driven financial transactions. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2018. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/48824.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maharaj R. A social networking approach to security awareness in end-user cyber-driven financial transactions. [Thesis]. Nelson Mandela Metropolitan University; 2018. Available from: http://hdl.handle.net/10948/48824

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

6. Reid, Rayne. Guidelines for cybersecurity education campaigns.

Degree: 2017, Nelson Mandela Metropolitan University

 In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2017). Guidelines for cybersecurity education campaigns. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Web. 02 Mar 2021.

Vancouver:

Reid R. Guidelines for cybersecurity education campaigns. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Reid R. Guidelines for cybersecurity education campaigns. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

7. Mayisela, Simphiwe Hector. Data-centric security : towards a utopian model for protecting corporate data on mobile devices.

Degree: Faculty of Science, Computer Science, 2014, Rhodes University

 Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures; Mobile communication systems  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mayisela, S. H. (2014). Data-centric security : towards a utopian model for protecting corporate data on mobile devices. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Thesis, Rhodes University. Accessed March 02, 2021. http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Web. 02 Mar 2021.

Vancouver:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Internet] [Thesis]. Rhodes University; 2014. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Thesis]. Rhodes University; 2014. Available from: http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

8. Guo, Ziyang ECE. Cyber-physical systems security : a control-theoretic approach.

Degree: 2018, Hong Kong University of Science and Technology

 This thesis investigates security issues for remote state estimation in the context of cyber-physical systems. Different problems are studied from the perspective of either a… (more)

Subjects/Keywords: Computer networks ; Security measures ; Wireless sensor networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guo, Z. E. (2018). Cyber-physical systems security : a control-theoretic approach. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Guo, Ziyang ECE. “Cyber-physical systems security : a control-theoretic approach.” 2018. Thesis, Hong Kong University of Science and Technology. Accessed March 02, 2021. http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Guo, Ziyang ECE. “Cyber-physical systems security : a control-theoretic approach.” 2018. Web. 02 Mar 2021.

Vancouver:

Guo ZE. Cyber-physical systems security : a control-theoretic approach. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2018. [cited 2021 Mar 02]. Available from: http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Guo ZE. Cyber-physical systems security : a control-theoretic approach. [Thesis]. Hong Kong University of Science and Technology; 2018. Available from: http://repository.ust.hk/ir/Record/1783.1-96011 ; https://doi.org/10.14711/thesis-991012637167503412 ; http://repository.ust.hk/ir/bitstream/1783.1-96011/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

9. Frauenstein, Edwin Donald. A framework to mitigate phishing threats.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld… (more)

Subjects/Keywords: Computer networks  – Security measures; Mobile computing  – Security measures; Online social networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frauenstein, E. D. (2013). A framework to mitigate phishing threats. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Web. 02 Mar 2021.

Vancouver:

Frauenstein ED. A framework to mitigate phishing threats. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frauenstein ED. A framework to mitigate phishing threats. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Joshuva, Justin. Identifying users on social networking using pattern recognition in messages.

Degree: 2017, University of Tennessee – Chattanooga

 Online social networks, such as Facebook and Twitter, have become a huge part of many people's lives, often as their main means of communication with… (more)

Subjects/Keywords: Online social networks  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joshuva, J. (2017). Identifying users on social networking using pattern recognition in messages. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/539

Chicago Manual of Style (16th Edition):

Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Masters Thesis, University of Tennessee – Chattanooga. Accessed March 02, 2021. https://scholar.utc.edu/theses/539.

MLA Handbook (7th Edition):

Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Web. 02 Mar 2021.

Vancouver:

Joshuva J. Identifying users on social networking using pattern recognition in messages. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2017. [cited 2021 Mar 02]. Available from: https://scholar.utc.edu/theses/539.

Council of Science Editors:

Joshuva J. Identifying users on social networking using pattern recognition in messages. [Masters Thesis]. University of Tennessee – Chattanooga; 2017. Available from: https://scholar.utc.edu/theses/539


Nelson Mandela Metropolitan University

11. Webster, Zynn. An information security governance model for industrial control systems.

Degree: 2018, Nelson Mandela Metropolitan University

 Industrial Control Systems (ICS) is a term used to describe several types of control systems, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control… (more)

Subjects/Keywords: Computer networks  – Security measures; Data protection; Computer security; Business enterprises  – Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Webster, Z. (2018). An information security governance model for industrial control systems. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/36383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Webster, Zynn. “An information security governance model for industrial control systems.” 2018. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/36383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Webster, Zynn. “An information security governance model for industrial control systems.” 2018. Web. 02 Mar 2021.

Vancouver:

Webster Z. An information security governance model for industrial control systems. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2018. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/36383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Webster Z. An information security governance model for industrial control systems. [Thesis]. Nelson Mandela Metropolitan University; 2018. Available from: http://hdl.handle.net/10948/36383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

12. Van Buuren, Suzi. Information security in a distributed banking environment, with specific reference to security protocols.

Degree: 2012, University of Johannesburg

M.Comm.

The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment… (more)

Subjects/Keywords: Banks and banking - Security measures; Intranets (Computer networks) - Security measures; Internet - Security measures; Computer networks - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Buuren, S. (2012). Information security in a distributed banking environment, with specific reference to security protocols. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Thesis, University of Johannesburg. Accessed March 02, 2021. http://hdl.handle.net/10210/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Web. 02 Mar 2021.

Vancouver:

Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10210/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

13. Liu, Xiruo, 1983-. Integrating security and privacy protection into a mobility-centric internet architecture.

Degree: PhD, Electrical and Computer Engineering, 2016, Rutgers University

The Internet is a well-noted technological success that has significantly impacted the dissemination of information and brought human society closer together than it ever had… (more)

Subjects/Keywords: Computer networks – Security measures; Computer network architectures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Xiruo, 1. (2016). Integrating security and privacy protection into a mobility-centric internet architecture. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/50038/

Chicago Manual of Style (16th Edition):

Liu, Xiruo, 1983-. “Integrating security and privacy protection into a mobility-centric internet architecture.” 2016. Doctoral Dissertation, Rutgers University. Accessed March 02, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/50038/.

MLA Handbook (7th Edition):

Liu, Xiruo, 1983-. “Integrating security and privacy protection into a mobility-centric internet architecture.” 2016. Web. 02 Mar 2021.

Vancouver:

Liu, Xiruo 1. Integrating security and privacy protection into a mobility-centric internet architecture. [Internet] [Doctoral dissertation]. Rutgers University; 2016. [cited 2021 Mar 02]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/50038/.

Council of Science Editors:

Liu, Xiruo 1. Integrating security and privacy protection into a mobility-centric internet architecture. [Doctoral Dissertation]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/50038/


Nelson Mandela Metropolitan University

14. Coertze, Jacques Jacobus. A framework for information security governance in SMMEs.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved… (more)

Subjects/Keywords: Business  – Data processing  – Security measures; Management information systems  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coertze, J. J. (2012). A framework for information security governance in SMMEs. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Web. 02 Mar 2021.

Vancouver:

Coertze JJ. A framework for information security governance in SMMEs. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coertze JJ. A framework for information security governance in SMMEs. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

15. Diakite, Soumaila Dit Moule. WISP: a wireless information security portal.

Degree: 2010, University of Johannesburg

M.Sc.

Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless… (more)

Subjects/Keywords: Wireless communication systems security measures; Wireless LANs security measures; Computer networks security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diakite, S. D. M. (2010). WISP: a wireless information security portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Thesis, University of Johannesburg. Accessed March 02, 2021. http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Web. 02 Mar 2021.

Vancouver:

Diakite SDM. WISP: a wireless information security portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diakite SDM. WISP: a wireless information security portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

16. Van der Merwe, Jacobus. Information security using intelligent software agents.

Degree: PhD, 2012, University of Johannesburg

 Many organisations are starting to make large parts of their information resources publicly accessible. For example, many organisations publish information using the Internet. Some organisations… (more)

Subjects/Keywords: Computer security; Computer networks - Security measures; Internet - Security measures; Intelligent agents (Computer software)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, J. (2012). Information security using intelligent software agents. (Doctoral Dissertation). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6231

Chicago Manual of Style (16th Edition):

Van der Merwe, Jacobus. “Information security using intelligent software agents.” 2012. Doctoral Dissertation, University of Johannesburg. Accessed March 02, 2021. http://hdl.handle.net/10210/6231.

MLA Handbook (7th Edition):

Van der Merwe, Jacobus. “Information security using intelligent software agents.” 2012. Web. 02 Mar 2021.

Vancouver:

Van der Merwe J. Information security using intelligent software agents. [Internet] [Doctoral dissertation]. University of Johannesburg; 2012. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10210/6231.

Council of Science Editors:

Van der Merwe J. Information security using intelligent software agents. [Doctoral Dissertation]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6231


University of Johannesburg

17. Venter, Hein S. Real-time risk analysis : a modern perspective on network security with a prototype.

Degree: 2012, University of Johannesburg

M.Sc.

The present study was undertaken in a bid within the realm of the existing Internet working environment to meet the need for a more… (more)

Subjects/Keywords: Internet - Security measures.; Computer networks - Security measures.; Risk assessment - Data processing.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venter, H. S. (2012). Real-time risk analysis : a modern perspective on network security with a prototype. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Thesis, University of Johannesburg. Accessed March 02, 2021. http://hdl.handle.net/10210/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Web. 02 Mar 2021.

Vancouver:

Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10210/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Drexel University

18. Huang, Tingshan. Adaptive Sampling and Statistical Inference for Anomaly Detection.

Degree: 2015, Drexel University

 Given the rising threat of malware and the increasing inadequacy of signature-based solutions, online performance monitoring has emerged as a critical component of the security(more)

Subjects/Keywords: Electrical engineering; Cyberinfrastructure – Security measures; Computer networks – Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, T. (2015). Adaptive Sampling and Statistical Inference for Anomaly Detection. (Thesis). Drexel University. Retrieved from http://hdl.handle.net/1860/idea:6647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Thesis, Drexel University. Accessed March 02, 2021. http://hdl.handle.net/1860/idea:6647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Web. 02 Mar 2021.

Vancouver:

Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Internet] [Thesis]. Drexel University; 2015. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/1860/idea:6647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Thesis]. Drexel University; 2015. Available from: http://hdl.handle.net/1860/idea:6647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Macquarie University

19. Sun, Haiyang. Towards a security management system for composite web services.

Degree: 2013, Macquarie University

"August 2012".

Bibliography: pages 201-213.

A web service can be operated in a distributed environment with a large number of resources with evolving contents. These… (more)

Subjects/Keywords: Computer networks  – Security measures; Web services  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, H. (2013). Towards a security management system for composite web services. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1279090

Chicago Manual of Style (16th Edition):

Sun, Haiyang. “Towards a security management system for composite web services.” 2013. Doctoral Dissertation, Macquarie University. Accessed March 02, 2021. http://hdl.handle.net/1959.14/1279090.

MLA Handbook (7th Edition):

Sun, Haiyang. “Towards a security management system for composite web services.” 2013. Web. 02 Mar 2021.

Vancouver:

Sun H. Towards a security management system for composite web services. [Internet] [Doctoral dissertation]. Macquarie University; 2013. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/1959.14/1279090.

Council of Science Editors:

Sun H. Towards a security management system for composite web services. [Doctoral Dissertation]. Macquarie University; 2013. Available from: http://hdl.handle.net/1959.14/1279090


Ryerson University

20. Peddi, Rajender D. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.

Degree: 2012, Ryerson University

  This thesis proposes two protocols for addressing collaborative blackhole attacks in MANETs, referred to as the Detecting Blackhole Attack-Dynamic Source Routing (DBA- DSR) and… (more)

Subjects/Keywords: Mobile communication systems; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peddi, R. D. (2012). Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Thesis, Ryerson University. Accessed March 02, 2021. https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Web. 02 Mar 2021.

Vancouver:

Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Internet] [Thesis]. Ryerson University; 2012. [cited 2021 Mar 02]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Thesis]. Ryerson University; 2012. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

21. Deas, Matthew Burns. Towards a user centric model for identity and access management within the online environment.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks… (more)

Subjects/Keywords: Computers  – Access control; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deas, M. B. (2008). Towards a user centric model for identity and access management within the online environment. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Web. 02 Mar 2021.

Vancouver:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

22. Nel, Yvette. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The-utilization of information technology is essential for an organization, not only to handle daily business activities but also to facilitate management decisions. The… (more)

Subjects/Keywords: Computer networks - Security measures; Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nel, Y. (2014). 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/11576

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nel, Yvette. “'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.” 2014. Thesis, University of Johannesburg. Accessed March 02, 2021. http://hdl.handle.net/10210/11576.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nel, Yvette. “'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie.” 2014. Web. 02 Mar 2021.

Vancouver:

Nel Y. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10210/11576.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nel Y. 'n Bestuurs- en metodologiese benadering tot gebeurlikheidsbeplanning vir die gerekenariseerde stelsels van 'n organisasie. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/11576

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

23. Westraadt, Lindsay. A Model for Crime Management in Smart Cities.

Degree: 2019, Nelson Mandela Metropolitan University

 The main research problem addressed in this study is that South African cities are not effectively integrating and utilising available, and rapidly emerging smart city… (more)

Subjects/Keywords: Smart cities; Computer networks  – security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Westraadt, L. (2019). A Model for Crime Management in Smart Cities. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/45635

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Westraadt, Lindsay. “A Model for Crime Management in Smart Cities.” 2019. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/45635.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Westraadt, Lindsay. “A Model for Crime Management in Smart Cities.” 2019. Web. 02 Mar 2021.

Vancouver:

Westraadt L. A Model for Crime Management in Smart Cities. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2019. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/45635.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Westraadt L. A Model for Crime Management in Smart Cities. [Thesis]. Nelson Mandela Metropolitan University; 2019. Available from: http://hdl.handle.net/10948/45635

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Michigan State University

24. Pongaliur, Kanthakumar Mylsamy. Security and privacy in resource constrained wireless networks.

Degree: 2012, Michigan State University

Thesis Ph. D. Michigan State University. Computer Science 2012.

Wireless networks use radio waves as a communication medium which allows for faster and cheaper deployment.… (more)

Subjects/Keywords: Wireless sensor networks; Computer networks – Security measures; Mobile computing – Security measures; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pongaliur, K. M. (2012). Security and privacy in resource constrained wireless networks. (Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:1489

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pongaliur, Kanthakumar Mylsamy. “Security and privacy in resource constrained wireless networks.” 2012. Thesis, Michigan State University. Accessed March 02, 2021. http://etd.lib.msu.edu/islandora/object/etd:1489.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pongaliur, Kanthakumar Mylsamy. “Security and privacy in resource constrained wireless networks.” 2012. Web. 02 Mar 2021.

Vancouver:

Pongaliur KM. Security and privacy in resource constrained wireless networks. [Internet] [Thesis]. Michigan State University; 2012. [cited 2021 Mar 02]. Available from: http://etd.lib.msu.edu/islandora/object/etd:1489.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pongaliur KM. Security and privacy in resource constrained wireless networks. [Thesis]. Michigan State University; 2012. Available from: http://etd.lib.msu.edu/islandora/object/etd:1489

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

25. Gcaza, Noluxolo. A national strategy towards cultivating a cybersecurity culture in South Africa.

Degree: 2017, Nelson Mandela Metropolitan University

 In modern society, cyberspace is interwoven into the daily lives of many. Cyberspace is increasingly redefining how people communicate as well as gain access to… (more)

Subjects/Keywords: Computer networks  – Security measures; Cyberspace  – Security measures; Computer security  – South Africa; Subculture  – South Africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gcaza, N. (2017). A national strategy towards cultivating a cybersecurity culture in South Africa. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/13735

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gcaza, Noluxolo. “A national strategy towards cultivating a cybersecurity culture in South Africa.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/13735.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gcaza, Noluxolo. “A national strategy towards cultivating a cybersecurity culture in South Africa.” 2017. Web. 02 Mar 2021.

Vancouver:

Gcaza N. A national strategy towards cultivating a cybersecurity culture in South Africa. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/13735.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gcaza N. A national strategy towards cultivating a cybersecurity culture in South Africa. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/13735

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

26. Pieterse, Theron Anton. The computer incident response framework (CIRF).

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

A company’s valuable information assets face many risks from internal and external sources. When these risks are exploited and reports on information assets… (more)

Subjects/Keywords: Information technology - Security measures; Computer networks - Security measures; Risk management; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pieterse, T. A. (2014). The computer incident response framework (CIRF). (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12368

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pieterse, Theron Anton. “The computer incident response framework (CIRF).” 2014. Thesis, University of Johannesburg. Accessed March 02, 2021. http://hdl.handle.net/10210/12368.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pieterse, Theron Anton. “The computer incident response framework (CIRF).” 2014. Web. 02 Mar 2021.

Vancouver:

Pieterse TA. The computer incident response framework (CIRF). [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10210/12368.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pieterse TA. The computer incident response framework (CIRF). [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12368

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

27. Bernardo, Louis F. Targeted attack detection by means of free and open source solutions.

Degree: Faculty of Science, Computer Science, 2019, Rhodes University

 Compliance requirements are part of everyday business requirements for various areas, such as retail and medical services. As part of compliance it may be required… (more)

Subjects/Keywords: Computer networks  – Security measures; Information technology  – Security measures; Computer security  – Management; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bernardo, L. F. (2019). Targeted attack detection by means of free and open source solutions. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/92269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bernardo, Louis F. “Targeted attack detection by means of free and open source solutions.” 2019. Thesis, Rhodes University. Accessed March 02, 2021. http://hdl.handle.net/10962/92269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bernardo, Louis F. “Targeted attack detection by means of free and open source solutions.” 2019. Web. 02 Mar 2021.

Vancouver:

Bernardo LF. Targeted attack detection by means of free and open source solutions. [Internet] [Thesis]. Rhodes University; 2019. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10962/92269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bernardo LF. Targeted attack detection by means of free and open source solutions. [Thesis]. Rhodes University; 2019. Available from: http://hdl.handle.net/10962/92269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

28. Sandi, Siyabulela. Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa.

Degree: 2020, Nelson Mandela Metropolitan University

 Enterprises of all kinds, regardless of the sector, are directly or indirectly dependent on Information Technology (IT) to carry out their daily activities. With this… (more)

Subjects/Keywords: Business enterprises  – Computer networks  – Security measures; Information technology  – Security measures; Computer security; Risk management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sandi, S. (2020). Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/47128

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sandi, Siyabulela. “Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa.” 2020. Thesis, Nelson Mandela Metropolitan University. Accessed March 02, 2021. http://hdl.handle.net/10948/47128.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sandi, Siyabulela. “Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa.” 2020. Web. 02 Mar 2021.

Vancouver:

Sandi S. Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2020. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/10948/47128.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sandi S. Establishment of an information technology risk management framework within food manufacturing enterprises in South Africa. [Thesis]. Nelson Mandela Metropolitan University; 2020. Available from: http://hdl.handle.net/10948/47128

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Michigan State University

29. Khakpour, Amir Reza. Network reachability : quantification, verification, troubleshooting, and optimization.

Degree: 2012, Michigan State University

Thesis Ph. D. Michigan State University, Computer Science and Engineering 2012.

Quantifying, verifying, troubleshooting, and optimizing the network reachability is essential for network management and… (more)

Subjects/Keywords: Computer networks; Computer networks – Access control; Computer networks – Management; Computer networks – Security measures; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khakpour, A. R. (2012). Network reachability : quantification, verification, troubleshooting, and optimization. (Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:88

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khakpour, Amir Reza. “Network reachability : quantification, verification, troubleshooting, and optimization.” 2012. Thesis, Michigan State University. Accessed March 02, 2021. http://etd.lib.msu.edu/islandora/object/etd:88.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khakpour, Amir Reza. “Network reachability : quantification, verification, troubleshooting, and optimization.” 2012. Web. 02 Mar 2021.

Vancouver:

Khakpour AR. Network reachability : quantification, verification, troubleshooting, and optimization. [Internet] [Thesis]. Michigan State University; 2012. [cited 2021 Mar 02]. Available from: http://etd.lib.msu.edu/islandora/object/etd:88.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khakpour AR. Network reachability : quantification, verification, troubleshooting, and optimization. [Thesis]. Michigan State University; 2012. Available from: http://etd.lib.msu.edu/islandora/object/etd:88

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

30. Razavi, Sanaz Hafezian. Evaluating security measures of a layered system.

Degree: 2009, Ryerson University

 Most distributed systems that we use in our daily lives have layered architecture since such architectures allow separation of processing between multiple processes in different… (more)

Subjects/Keywords: Computer networks  – Security measures; Computer architecture; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Razavi, S. H. (2009). Evaluating security measures of a layered system. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Razavi, Sanaz Hafezian. “Evaluating security measures of a layered system.” 2009. Thesis, Ryerson University. Accessed March 02, 2021. https://digital.library.ryerson.ca/islandora/object/RULA%3A1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Razavi, Sanaz Hafezian. “Evaluating security measures of a layered system.” 2009. Web. 02 Mar 2021.

Vancouver:

Razavi SH. Evaluating security measures of a layered system. [Internet] [Thesis]. Ryerson University; 2009. [cited 2021 Mar 02]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Razavi SH. Evaluating security measures of a layered system. [Thesis]. Ryerson University; 2009. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [4411]

.