Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Computer security). Showing records 1 – 30 of 2714 total matches.

[1] [2] [3] [4] [5] … [91]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Rochester Institute of Technology

1. Hirwani, Manish. Forensic analysis of VMware hard disks.

Degree: 2011, Rochester Institute of Technology

 With the advancement in virtualization technology, virtual machines (VMs) are becoming a common and an integral part of datacenters. As the popularity and use of… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirwani, M. (2011). Forensic analysis of VMware hard disks. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Thesis, Rochester Institute of Technology. Accessed October 21, 2020. https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Web. 21 Oct 2020.

Vancouver:

Hirwani M. Forensic analysis of VMware hard disks. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2020 Oct 21]. Available from: https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hirwani M. Forensic analysis of VMware hard disks. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oxford

2. Sluganovic, Ivo. Security of mixed reality systems : authenticating users, devices, and data.

Degree: PhD, 2018, University of Oxford

 Mixed reality devices continuously scan their environment in order to naturally blend the virtual objects with the user's real-time view of their physical environment. Given… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sluganovic, I. (2018). Security of mixed reality systems : authenticating users, devices, and data. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630

Chicago Manual of Style (16th Edition):

Sluganovic, Ivo. “Security of mixed reality systems : authenticating users, devices, and data.” 2018. Doctoral Dissertation, University of Oxford. Accessed October 21, 2020. http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630.

MLA Handbook (7th Edition):

Sluganovic, Ivo. “Security of mixed reality systems : authenticating users, devices, and data.” 2018. Web. 21 Oct 2020.

Vancouver:

Sluganovic I. Security of mixed reality systems : authenticating users, devices, and data. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2020 Oct 21]. Available from: http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630.

Council of Science Editors:

Sluganovic I. Security of mixed reality systems : authenticating users, devices, and data. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630

3. Ghosh, Esha. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.

Degree: Department of Computer Science, 2018, Brown University

 An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghosh, E. (2018). Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. (Thesis). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Thesis, Brown University. Accessed October 21, 2020. https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Web. 21 Oct 2020.

Vancouver:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Internet] [Thesis]. Brown University; 2018. [cited 2020 Oct 21]. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Thesis]. Brown University; 2018. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Smith, Robert Walter. Evolutionary Strategies for Secure Moving Target Configuration Discovery.

Degree: 2014, Wake Forest University

 Defense against many cyber security threats can be implemented with existing software on the machine, without requiring patches for current programs or the installation of… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, R. W. (2014). Evolutionary Strategies for Secure Moving Target Configuration Discovery. (Thesis). Wake Forest University. Retrieved from http://hdl.handle.net/10339/39267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Robert Walter. “Evolutionary Strategies for Secure Moving Target Configuration Discovery.” 2014. Thesis, Wake Forest University. Accessed October 21, 2020. http://hdl.handle.net/10339/39267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Robert Walter. “Evolutionary Strategies for Secure Moving Target Configuration Discovery.” 2014. Web. 21 Oct 2020.

Vancouver:

Smith RW. Evolutionary Strategies for Secure Moving Target Configuration Discovery. [Internet] [Thesis]. Wake Forest University; 2014. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10339/39267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith RW. Evolutionary Strategies for Secure Moving Target Configuration Discovery. [Thesis]. Wake Forest University; 2014. Available from: http://hdl.handle.net/10339/39267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

5. Nandakumar Thampi, Archana. Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system.

Degree: MS, Computer Science, 2014, Oregon State University

 The communication in MLS cross-domain environments faces many challenges. The three most important challenges are efficient key management, privacy preserving and covert channel. We propose… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nandakumar Thampi, A. (2014). Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/51895

Chicago Manual of Style (16th Edition):

Nandakumar Thampi, Archana. “Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system.” 2014. Masters Thesis, Oregon State University. Accessed October 21, 2020. http://hdl.handle.net/1957/51895.

MLA Handbook (7th Edition):

Nandakumar Thampi, Archana. “Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system.” 2014. Web. 21 Oct 2020.

Vancouver:

Nandakumar Thampi A. Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system. [Internet] [Masters thesis]. Oregon State University; 2014. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/1957/51895.

Council of Science Editors:

Nandakumar Thampi A. Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system. [Masters Thesis]. Oregon State University; 2014. Available from: http://hdl.handle.net/1957/51895

6. Gasior, Wade Chester. Network covert channels on the Android platform.

Degree: 2011, University of Tennessee – Chattanooga

 Network covert channels are used to exfiltrate information from a secured environment in a way that is extremely difficult to detect or prevent. These secret… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gasior, W. C. (2011). Network covert channels on the Android platform. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/270

Chicago Manual of Style (16th Edition):

Gasior, Wade Chester. “Network covert channels on the Android platform.” 2011. Masters Thesis, University of Tennessee – Chattanooga. Accessed October 21, 2020. https://scholar.utc.edu/theses/270.

MLA Handbook (7th Edition):

Gasior, Wade Chester. “Network covert channels on the Android platform.” 2011. Web. 21 Oct 2020.

Vancouver:

Gasior WC. Network covert channels on the Android platform. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2011. [cited 2020 Oct 21]. Available from: https://scholar.utc.edu/theses/270.

Council of Science Editors:

Gasior WC. Network covert channels on the Android platform. [Masters Thesis]. University of Tennessee – Chattanooga; 2011. Available from: https://scholar.utc.edu/theses/270


Rutgers University

7. Alapati, Kalyan Koushik, 1993-. Group-oriented secret sharing using Shamir's algorithm.

Degree: MS, Computer Science, 2018, Rutgers University

 In the current state of highly distributed and hybrid-cloud systems environment, managing and securing enterprise or government systems/data requires effective access control techniques and protocols.… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alapati, Kalyan Koushik, 1. (2018). Group-oriented secret sharing using Shamir's algorithm. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/55941/

Chicago Manual of Style (16th Edition):

Alapati, Kalyan Koushik, 1993-. “Group-oriented secret sharing using Shamir's algorithm.” 2018. Masters Thesis, Rutgers University. Accessed October 21, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/55941/.

MLA Handbook (7th Edition):

Alapati, Kalyan Koushik, 1993-. “Group-oriented secret sharing using Shamir's algorithm.” 2018. Web. 21 Oct 2020.

Vancouver:

Alapati, Kalyan Koushik 1. Group-oriented secret sharing using Shamir's algorithm. [Internet] [Masters thesis]. Rutgers University; 2018. [cited 2020 Oct 21]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55941/.

Council of Science Editors:

Alapati, Kalyan Koushik 1. Group-oriented secret sharing using Shamir's algorithm. [Masters Thesis]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55941/


Penn State University

8. Ren, Chuangang. A Study of Selected Issues in Android Security.

Degree: 2016, Penn State University

 Mobile devices such as smartphones have become an integral part of society today, shaping people’s daily life, changing the landscape of how business operate and… (more)

Subjects/Keywords: Android; Computer Security; Android Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ren, C. (2016). A Study of Selected Issues in Android Security. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/b5644r534

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Thesis, Penn State University. Accessed October 21, 2020. https://submit-etda.libraries.psu.edu/catalog/b5644r534.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Web. 21 Oct 2020.

Vancouver:

Ren C. A Study of Selected Issues in Android Security. [Internet] [Thesis]. Penn State University; 2016. [cited 2020 Oct 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/b5644r534.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ren C. A Study of Selected Issues in Android Security. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/b5644r534

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

9. Van der Merwe, Isak Pieter. Rolprofiele vir die bestuur van inligtingsekerheid.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The aim of this study is to introduce a model that can be used to manage the security profiles by using a role… (more)

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, I. P. (2014). Rolprofiele vir die bestuur van inligtingsekerheid. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Thesis, University of Johannesburg. Accessed October 21, 2020. http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Web. 21 Oct 2020.

Vancouver:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

10. Tolnai, Annette. ISAP - an information security awareness portal.

Degree: 2010, University of Johannesburg

M.Sc.

The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a… (more)

Subjects/Keywords: Computer security; Internet security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2010). ISAP - an information security awareness portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Thesis, University of Johannesburg. Accessed October 21, 2020. http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Web. 21 Oct 2020.

Vancouver:

Tolnai A. ISAP - an information security awareness portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. ISAP - an information security awareness portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Colorado

11. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed October 21, 2020. https://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 21 Oct 2020.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2020 Oct 21]. Available from: https://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: https://scholar.colorado.edu/csci_gradetds/69


Drexel University

12. Heverin, Thomas. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.

Degree: 2014, Drexel University

The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment… (more)

Subjects/Keywords: Computer science; Internet – Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Heverin, T. (2014). Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. (Thesis). Drexel University. Retrieved from http://hdl.handle.net/1860/idea:7034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Heverin, Thomas. “Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.” 2014. Thesis, Drexel University. Accessed October 21, 2020. http://hdl.handle.net/1860/idea:7034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Heverin, Thomas. “Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.” 2014. Web. 21 Oct 2020.

Vancouver:

Heverin T. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. [Internet] [Thesis]. Drexel University; 2014. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/1860/idea:7034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Heverin T. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. [Thesis]. Drexel University; 2014. Available from: http://hdl.handle.net/1860/idea:7034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

13. Tolnai, Annette. A security model for a virtualized information environment.

Degree: 2012, University of Johannesburg

D.Phil.

Virtualization is a new infrastructure platform whose trend is sweeping through IT like a blaze. Improving the IT industry by higher utilization from hardware,… (more)

Subjects/Keywords: Virtual computer systems - Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2012). A security model for a virtualized information environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Thesis, University of Johannesburg. Accessed October 21, 2020. http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Web. 21 Oct 2020.

Vancouver:

Tolnai A. A security model for a virtualized information environment. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. A security model for a virtualized information environment. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

14. Muchenje, Tonderai. An analysis of the impact of emerging technology on organisations’ internal controls.

Degree: 2013, University of Johannesburg

M.Comm. (Computer Auditing)

This study presents an evaluation of emerging information communication technology (ICT) solutions to the security internal control systems in South African organisations.… (more)

Subjects/Keywords: Computer auditing; Information security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muchenje, T. (2013). An analysis of the impact of emerging technology on organisations’ internal controls. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Thesis, University of Johannesburg. Accessed October 21, 2020. http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Web. 21 Oct 2020.

Vancouver:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Internet] [Thesis]. University of Johannesburg; 2013. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Thesis]. University of Johannesburg; 2013. Available from: http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

15. Reid, Rayne. Guidelines for cybersecurity education campaigns.

Degree: 2017, Nelson Mandela Metropolitan University

 In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2017). Guidelines for cybersecurity education campaigns. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed October 21, 2020. http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Web. 21 Oct 2020.

Vancouver:

Reid R. Guidelines for cybersecurity education campaigns. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Reid R. Guidelines for cybersecurity education campaigns. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

16. Hellström, Jesper. A Lightweight Secure Development Process for Developers.

Degree: Software and Systems, 2019, Linköping University

  Following a secure development process when developing software can greatly increase the security of the software. Several secure development processes have been developed and… (more)

Subjects/Keywords: computer security; security; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hellström, J. (2019). A Lightweight Secure Development Process for Developers. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hellström, Jesper. “A Lightweight Secure Development Process for Developers.” 2019. Thesis, Linköping University. Accessed October 21, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hellström, Jesper. “A Lightweight Secure Development Process for Developers.” 2019. Web. 21 Oct 2020.

Vancouver:

Hellström J. A Lightweight Secure Development Process for Developers. [Internet] [Thesis]. Linköping University; 2019. [cited 2020 Oct 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hellström J. A Lightweight Secure Development Process for Developers. [Thesis]. Linköping University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

17. Bismut, Raphael Samuel Victor ISD. User-centred cybersecurity training exercise on a specialised gamified simulation platform.

Degree: 2019, Hong Kong University of Science and Technology

 The South Rajuan scenario is an educative cybersecurity simulation scenario aimed at people with technological background, such as IT or software development. Its goal is… (more)

Subjects/Keywords: Computer security ; Gamification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bismut, R. S. V. I. (2019). User-centred cybersecurity training exercise on a specialised gamified simulation platform. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-102266 ; https://doi.org/10.14711/thesis-991012765869803412 ; http://repository.ust.hk/ir/bitstream/1783.1-102266/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bismut, Raphael Samuel Victor ISD. “User-centred cybersecurity training exercise on a specialised gamified simulation platform.” 2019. Thesis, Hong Kong University of Science and Technology. Accessed October 21, 2020. http://repository.ust.hk/ir/Record/1783.1-102266 ; https://doi.org/10.14711/thesis-991012765869803412 ; http://repository.ust.hk/ir/bitstream/1783.1-102266/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bismut, Raphael Samuel Victor ISD. “User-centred cybersecurity training exercise on a specialised gamified simulation platform.” 2019. Web. 21 Oct 2020.

Vancouver:

Bismut RSVI. User-centred cybersecurity training exercise on a specialised gamified simulation platform. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2019. [cited 2020 Oct 21]. Available from: http://repository.ust.hk/ir/Record/1783.1-102266 ; https://doi.org/10.14711/thesis-991012765869803412 ; http://repository.ust.hk/ir/bitstream/1783.1-102266/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bismut RSVI. User-centred cybersecurity training exercise on a specialised gamified simulation platform. [Thesis]. Hong Kong University of Science and Technology; 2019. Available from: http://repository.ust.hk/ir/Record/1783.1-102266 ; https://doi.org/10.14711/thesis-991012765869803412 ; http://repository.ust.hk/ir/bitstream/1783.1-102266/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Aberdeen

18. Taylor, Barry. Identitying vulnerabilities and controls in complex composite security architectures.

Degree: PhD, 2014, University of Aberdeen

 The ability to design and reason about architectures (here understood as organisations which are designed according to hierarchies of roles and those processes that link… (more)

Subjects/Keywords: 004; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taylor, B. (2014). Identitying vulnerabilities and controls in complex composite security architectures. (Doctoral Dissertation). University of Aberdeen. Retrieved from http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105

Chicago Manual of Style (16th Edition):

Taylor, Barry. “Identitying vulnerabilities and controls in complex composite security architectures.” 2014. Doctoral Dissertation, University of Aberdeen. Accessed October 21, 2020. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105.

MLA Handbook (7th Edition):

Taylor, Barry. “Identitying vulnerabilities and controls in complex composite security architectures.” 2014. Web. 21 Oct 2020.

Vancouver:

Taylor B. Identitying vulnerabilities and controls in complex composite security architectures. [Internet] [Doctoral dissertation]. University of Aberdeen; 2014. [cited 2020 Oct 21]. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105.

Council of Science Editors:

Taylor B. Identitying vulnerabilities and controls in complex composite security architectures. [Doctoral Dissertation]. University of Aberdeen; 2014. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105


University of Oxford

19. Osborn, Emma. Small-scale cyber security : mapping security requirements for IT users at home and in small organisations.

Degree: PhD, 2018, University of Oxford

 Despite a long-standing assumption that developments in personal and cloud computing models would change the way we approach security, small-scale IT users (SSITUs) remain underserviced… (more)

Subjects/Keywords: 004; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Osborn, E. (2018). Small-scale cyber security : mapping security requirements for IT users at home and in small organisations. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:8fb77495-db75-4cfe-baec-1eb85b6a7b24 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770446

Chicago Manual of Style (16th Edition):

Osborn, Emma. “Small-scale cyber security : mapping security requirements for IT users at home and in small organisations.” 2018. Doctoral Dissertation, University of Oxford. Accessed October 21, 2020. http://ora.ox.ac.uk/objects/uuid:8fb77495-db75-4cfe-baec-1eb85b6a7b24 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770446.

MLA Handbook (7th Edition):

Osborn, Emma. “Small-scale cyber security : mapping security requirements for IT users at home and in small organisations.” 2018. Web. 21 Oct 2020.

Vancouver:

Osborn E. Small-scale cyber security : mapping security requirements for IT users at home and in small organisations. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2020 Oct 21]. Available from: http://ora.ox.ac.uk/objects/uuid:8fb77495-db75-4cfe-baec-1eb85b6a7b24 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770446.

Council of Science Editors:

Osborn E. Small-scale cyber security : mapping security requirements for IT users at home and in small organisations. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:8fb77495-db75-4cfe-baec-1eb85b6a7b24 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770446

20. Freed, Sarah E. Examination of personality characteristics among cybersecurity and information technology professionals.

Degree: 2014, University of Tennessee – Chattanooga

 An influx of cyber-attacks throughout the past decade has resulted in an increase in demand for cybersecurity professionals. However, the rapid growth of this field… (more)

Subjects/Keywords: Computer security  – Training.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Freed, S. E. (2014). Examination of personality characteristics among cybersecurity and information technology professionals. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/127

Chicago Manual of Style (16th Edition):

Freed, Sarah E. “Examination of personality characteristics among cybersecurity and information technology professionals.” 2014. Masters Thesis, University of Tennessee – Chattanooga. Accessed October 21, 2020. https://scholar.utc.edu/theses/127.

MLA Handbook (7th Edition):

Freed, Sarah E. “Examination of personality characteristics among cybersecurity and information technology professionals.” 2014. Web. 21 Oct 2020.

Vancouver:

Freed SE. Examination of personality characteristics among cybersecurity and information technology professionals. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2014. [cited 2020 Oct 21]. Available from: https://scholar.utc.edu/theses/127.

Council of Science Editors:

Freed SE. Examination of personality characteristics among cybersecurity and information technology professionals. [Masters Thesis]. University of Tennessee – Chattanooga; 2014. Available from: https://scholar.utc.edu/theses/127


University of Limerick

21. Schramm, Martin. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.

Degree: 2011, University of Limerick

peer-reviewed

Trusted Computing is a relatively new approach to computer security in which a system should be permanently maintained in a well-defined state - and… (more)

Subjects/Keywords: computer security; virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schramm, M. (2011). Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/1688

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Schramm, Martin. “Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.” 2011. Thesis, University of Limerick. Accessed October 21, 2020. http://hdl.handle.net/10344/1688.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Schramm, Martin. “Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.” 2011. Web. 21 Oct 2020.

Vancouver:

Schramm M. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. [Internet] [Thesis]. University of Limerick; 2011. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10344/1688.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Schramm M. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. [Thesis]. University of Limerick; 2011. Available from: http://hdl.handle.net/10344/1688

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

22. Naidoo, Chintal Krishna. Fitting an information security architecture to an enterprise architecture.

Degree: 2009, University of Johannesburg

M.Phil. (Computer Science)

Despite the efforts at international and national level, security continues to pose challenging problems. Firstly, attacks on information systems are increasingly motivated… (more)

Subjects/Keywords: Computer security; Computer architecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naidoo, C. K. (2009). Fitting an information security architecture to an enterprise architecture. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/2539

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Naidoo, Chintal Krishna. “Fitting an information security architecture to an enterprise architecture.” 2009. Thesis, University of Johannesburg. Accessed October 21, 2020. http://hdl.handle.net/10210/2539.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Naidoo, Chintal Krishna. “Fitting an information security architecture to an enterprise architecture.” 2009. Web. 21 Oct 2020.

Vancouver:

Naidoo CK. Fitting an information security architecture to an enterprise architecture. [Internet] [Thesis]. University of Johannesburg; 2009. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10210/2539.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Naidoo CK. Fitting an information security architecture to an enterprise architecture. [Thesis]. University of Johannesburg; 2009. Available from: http://hdl.handle.net/10210/2539

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

23. Karim, Rezwana, 1984-. Techniques and tools for secure web browser extension development.

Degree: PhD, Computer Science, 2015, Rutgers University

Many modern application platforms support an extensible architecture that allows the application core to be extended with functionality developed by third-parties. This bootstraps a developer… (more)

Subjects/Keywords: Computer security; Browsers (Computer programs)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karim, Rezwana, 1. (2015). Techniques and tools for secure web browser extension development. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/48537/

Chicago Manual of Style (16th Edition):

Karim, Rezwana, 1984-. “Techniques and tools for secure web browser extension development.” 2015. Doctoral Dissertation, Rutgers University. Accessed October 21, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/48537/.

MLA Handbook (7th Edition):

Karim, Rezwana, 1984-. “Techniques and tools for secure web browser extension development.” 2015. Web. 21 Oct 2020.

Vancouver:

Karim, Rezwana 1. Techniques and tools for secure web browser extension development. [Internet] [Doctoral dissertation]. Rutgers University; 2015. [cited 2020 Oct 21]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48537/.

Council of Science Editors:

Karim, Rezwana 1. Techniques and tools for secure web browser extension development. [Doctoral Dissertation]. Rutgers University; 2015. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48537/


University of Cincinnati

24. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed October 21, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 21 Oct 2020.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2020 Oct 21]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234


Rhodes University

25. Schoeman, Adam. Amber : A aero-interaction honeypot with distributed intelligence.

Degree: MS, Faculty of Science, Computer Science, 2015, Rhodes University

 For the greater part, security controls are based on the principle of Decision through Detection (DtD). The exception to this is a honeypot, which analyses… (more)

Subjects/Keywords: Security systems  – Security measures; Computer viruses; Intrusion detection systems (Computer security); Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schoeman, A. (2015). Amber : A aero-interaction honeypot with distributed intelligence. (Masters Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1017938

Chicago Manual of Style (16th Edition):

Schoeman, Adam. “Amber : A aero-interaction honeypot with distributed intelligence.” 2015. Masters Thesis, Rhodes University. Accessed October 21, 2020. http://hdl.handle.net/10962/d1017938.

MLA Handbook (7th Edition):

Schoeman, Adam. “Amber : A aero-interaction honeypot with distributed intelligence.” 2015. Web. 21 Oct 2020.

Vancouver:

Schoeman A. Amber : A aero-interaction honeypot with distributed intelligence. [Internet] [Masters thesis]. Rhodes University; 2015. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10962/d1017938.

Council of Science Editors:

Schoeman A. Amber : A aero-interaction honeypot with distributed intelligence. [Masters Thesis]. Rhodes University; 2015. Available from: http://hdl.handle.net/10962/d1017938


University of Illinois – Chicago

26. Costa, Francesco. A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS.

Degree: 2012, University of Illinois – Chicago

Security breaches and vulnerability in software are topics that are rapidly gaining importance and fame. Every year about 6000 vulnerabilities are officially classified in the… (more)

Subjects/Keywords: taxonomy; computer security; security evaluation; taxonomization; security flaw; software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Costa, F. (2012). A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/9313

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Costa, Francesco. “A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS.” 2012. Thesis, University of Illinois – Chicago. Accessed October 21, 2020. http://hdl.handle.net/10027/9313.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Costa, Francesco. “A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS.” 2012. Web. 21 Oct 2020.

Vancouver:

Costa F. A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS. [Internet] [Thesis]. University of Illinois – Chicago; 2012. [cited 2020 Oct 21]. Available from: http://hdl.handle.net/10027/9313.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Costa F. A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS. [Thesis]. University of Illinois – Chicago; 2012. Available from: http://hdl.handle.net/10027/9313

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Coventry University

27. Kalutarage, H. K. Effective monitoring of slow suspicious activites on computer networks.

Degree: PhD, 2013, Coventry University

 Slow and suspicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack… (more)

Subjects/Keywords: 005.8; computer security, detection; Computer security; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kalutarage, H. K. (2013). Effective monitoring of slow suspicious activites on computer networks. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964

Chicago Manual of Style (16th Edition):

Kalutarage, H K. “Effective monitoring of slow suspicious activites on computer networks.” 2013. Doctoral Dissertation, Coventry University. Accessed October 21, 2020. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964.

MLA Handbook (7th Edition):

Kalutarage, H K. “Effective monitoring of slow suspicious activites on computer networks.” 2013. Web. 21 Oct 2020.

Vancouver:

Kalutarage HK. Effective monitoring of slow suspicious activites on computer networks. [Internet] [Doctoral dissertation]. Coventry University; 2013. [cited 2020 Oct 21]. Available from: http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964.

Council of Science Editors:

Kalutarage HK. Effective monitoring of slow suspicious activites on computer networks. [Doctoral Dissertation]. Coventry University; 2013. Available from: http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.628964


Columbia University

28. Kang, Yuan Jochen. Combining Programs to Enhance Security Software.

Degree: 2018, Columbia University

 Automatic threats require automatic solutions, which become automatic threats themselves. When software grows in functionality, it grows in complexity, and in the number of bugs.… (more)

Subjects/Keywords: Computer science; Computer security; Computer security – Computer programs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kang, Y. J. (2018). Combining Programs to Enhance Security Software. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/D8ZK6ZK2

Chicago Manual of Style (16th Edition):

Kang, Yuan Jochen. “Combining Programs to Enhance Security Software.” 2018. Doctoral Dissertation, Columbia University. Accessed October 21, 2020. https://doi.org/10.7916/D8ZK6ZK2.

MLA Handbook (7th Edition):

Kang, Yuan Jochen. “Combining Programs to Enhance Security Software.” 2018. Web. 21 Oct 2020.

Vancouver:

Kang YJ. Combining Programs to Enhance Security Software. [Internet] [Doctoral dissertation]. Columbia University; 2018. [cited 2020 Oct 21]. Available from: https://doi.org/10.7916/D8ZK6ZK2.

Council of Science Editors:

Kang YJ. Combining Programs to Enhance Security Software. [Doctoral Dissertation]. Columbia University; 2018. Available from: https://doi.org/10.7916/D8ZK6ZK2


Columbia University

29. Boggs, Nathaniel. Empirical Measurement of Defense in Depth.

Degree: 2015, Columbia University

 Measurement is a vital tool for organizations attempting to increase, evaluate, or simply maintain their overall security posture over time. Organizations rely on defense in… (more)

Subjects/Keywords: Firewalls (Computer security); Virus inhibitors; Intrusion detection systems (Computer security); Computer security; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boggs, N. (2015). Empirical Measurement of Defense in Depth. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/D8BK1B83

Chicago Manual of Style (16th Edition):

Boggs, Nathaniel. “Empirical Measurement of Defense in Depth.” 2015. Doctoral Dissertation, Columbia University. Accessed October 21, 2020. https://doi.org/10.7916/D8BK1B83.

MLA Handbook (7th Edition):

Boggs, Nathaniel. “Empirical Measurement of Defense in Depth.” 2015. Web. 21 Oct 2020.

Vancouver:

Boggs N. Empirical Measurement of Defense in Depth. [Internet] [Doctoral dissertation]. Columbia University; 2015. [cited 2020 Oct 21]. Available from: https://doi.org/10.7916/D8BK1B83.

Council of Science Editors:

Boggs N. Empirical Measurement of Defense in Depth. [Doctoral Dissertation]. Columbia University; 2015. Available from: https://doi.org/10.7916/D8BK1B83

30. Ur, Blase Eric. Supporting Password-Security Decisions with Data.

Degree: 2016, Carnegie Mellon University

 Despite decades of research into developing abstract security advice and improving interfaces, users still struggle to make passwords. Users frequently create passwords that are predictable… (more)

Subjects/Keywords: Usable security; computer security; passwords; authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ur, B. E. (2016). Supporting Password-Security Decisions with Data. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/845

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ur, Blase Eric. “Supporting Password-Security Decisions with Data.” 2016. Thesis, Carnegie Mellon University. Accessed October 21, 2020. http://repository.cmu.edu/dissertations/845.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ur, Blase Eric. “Supporting Password-Security Decisions with Data.” 2016. Web. 21 Oct 2020.

Vancouver:

Ur BE. Supporting Password-Security Decisions with Data. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2020 Oct 21]. Available from: http://repository.cmu.edu/dissertations/845.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ur BE. Supporting Password-Security Decisions with Data. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/845

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [91]

.