Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cyber Security). Showing records 1 – 30 of 388 total matches.

[1] [2] [3] [4] [5] … [13]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Cranfield University

1. Humphrey, Mike. Identifying the critical success factors to improve information security incident reporting.

Degree: PhD, 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627

Chicago Manual of Style (16th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Doctoral Dissertation, Cranfield University. Accessed June 07, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

MLA Handbook (7th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 07 Jun 2020.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2020 Jun 07]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627


Cranfield University

2. Lewis, P S. The global vulnerability discovery and disclosure system: a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system: a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665

Chicago Manual of Style (16th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed June 07, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

MLA Handbook (7th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Web. 07 Jun 2020.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2020 Jun 07]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665


Cranfield University

3. Humphrey, M. Identifying the critical success factors to improve information security incident reporting.

Degree: 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Thesis). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Thesis, Cranfield University. Accessed June 07, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 07 Jun 2020.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Thesis]. Cranfield University; 2017. [cited 2020 Jun 07]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Thesis]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Sacramento

4. Vyas, Mruga. Security issues in distributed energy resources (DER) in smart grid.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 One of the main goals of smart grid is to create a decentralized and consumer controlled power system which can increase efficiency, reliability and reduce… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vyas, M. (2011). Security issues in distributed energy resources (DER) in smart grid. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1229

Chicago Manual of Style (16th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Masters Thesis, California State University – Sacramento. Accessed June 07, 2020. http://hdl.handle.net/10211.9/1229.

MLA Handbook (7th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Web. 07 Jun 2020.

Vancouver:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/10211.9/1229.

Council of Science Editors:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1229


Victoria University of Wellington

5. Gordon, Richard. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.

Degree: 2014, Victoria University of Wellington

Cyber-attacks present significant challenges to a modern, globalised world. Progressively used by criminal and terrorist organisations to attack or victimise non-state actors, governments are increasingly… (more)

Subjects/Keywords: Cyber; Privacy; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gordon, R. (2014). Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/3565

Chicago Manual of Style (16th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Masters Thesis, Victoria University of Wellington. Accessed June 07, 2020. http://hdl.handle.net/10063/3565.

MLA Handbook (7th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Web. 07 Jun 2020.

Vancouver:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Internet] [Masters thesis]. Victoria University of Wellington; 2014. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/10063/3565.

Council of Science Editors:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Masters Thesis]. Victoria University of Wellington; 2014. Available from: http://hdl.handle.net/10063/3565

6. Puttaroo, Mohammad Ally Rehaz. A behavioural study in runtime analysis environments and drive-by download attacks.

Degree: PhD, 2017, University of West London

 In the information age, the growth in availability of both technology and exploit kits have continuously contributed in a large volume of websites being compromised… (more)

Subjects/Keywords: Cyber security; Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puttaroo, M. A. R. (2017). A behavioural study in runtime analysis environments and drive-by download attacks. (Doctoral Dissertation). University of West London. Retrieved from https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802

Chicago Manual of Style (16th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Doctoral Dissertation, University of West London. Accessed June 07, 2020. https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

MLA Handbook (7th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Web. 07 Jun 2020.

Vancouver:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Internet] [Doctoral dissertation]. University of West London; 2017. [cited 2020 Jun 07]. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

Council of Science Editors:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Doctoral Dissertation]. University of West London; 2017. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802


Texas State University – San Marcos

7. Siddique, Khan. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.

Degree: MS, Engineering, 2018, Texas State University – San Marcos

Cyber-Physical Systems (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered systems that integrate embedded computing technologies (cyber part)… (more)

Subjects/Keywords: Game theory; Cyber physical system; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Siddique, K. (2018). A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/9284

Chicago Manual of Style (16th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Masters Thesis, Texas State University – San Marcos. Accessed June 07, 2020. https://digital.library.txstate.edu/handle/10877/9284.

MLA Handbook (7th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Web. 07 Jun 2020.

Vancouver:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Internet] [Masters thesis]. Texas State University – San Marcos; 2018. [cited 2020 Jun 07]. Available from: https://digital.library.txstate.edu/handle/10877/9284.

Council of Science Editors:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Masters Thesis]. Texas State University – San Marcos; 2018. Available from: https://digital.library.txstate.edu/handle/10877/9284


Penn State University

8. McLaughlin, Stephen Elliot. Specification-based Attacks and Defenses in Sequential Control Systems.

Degree: PhD, Computer Science and Engineering, 2014, Penn State University

Cyber physical systems, such as control systems use general purpose computation to govern the behavior of physical systems in the manufacturing, transportation, and energy sectors.… (more)

Subjects/Keywords: Security; Cyber-Physical; Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McLaughlin, S. E. (2014). Specification-based Attacks and Defenses in Sequential Control Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/21556

Chicago Manual of Style (16th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Doctoral Dissertation, Penn State University. Accessed June 07, 2020. https://etda.libraries.psu.edu/catalog/21556.

MLA Handbook (7th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Web. 07 Jun 2020.

Vancouver:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Internet] [Doctoral dissertation]. Penn State University; 2014. [cited 2020 Jun 07]. Available from: https://etda.libraries.psu.edu/catalog/21556.

Council of Science Editors:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Doctoral Dissertation]. Penn State University; 2014. Available from: https://etda.libraries.psu.edu/catalog/21556

9. Mitchell, Scott. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.

Degree: Doctoral Thesis, Cyber Security, 2018, Abertay University

 A steganographic method was developed based on the temporal redundancies present in digital video streams, these redundancies are utilised by the H.264 encoding standard to… (more)

Subjects/Keywords: Cyber Security; Steganography; Digital Video

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mitchell, S. (2018). H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. (Thesis). Abertay University. Retrieved from https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Thesis, Abertay University. Accessed June 07, 2020. https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Web. 07 Jun 2020.

Vancouver:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Internet] [Thesis]. Abertay University; 2018. [cited 2020 Jun 07]. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Thesis]. Abertay University; 2018. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oxford

10. Smith, Matthew. Measuring operational realities of security and privacy for deployed avionics.

Degree: PhD, 2018, University of Oxford

 Despite being renowned as an exceptionally safety-conscious industry, aviation has been slow to address the cyber security threat. A critical point has been reached whereby… (more)

Subjects/Keywords: Cyber security; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, M. (2018). Measuring operational realities of security and privacy for deployed avionics. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629

Chicago Manual of Style (16th Edition):

Smith, Matthew. “Measuring operational realities of security and privacy for deployed avionics.” 2018. Doctoral Dissertation, University of Oxford. Accessed June 07, 2020. http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629.

MLA Handbook (7th Edition):

Smith, Matthew. “Measuring operational realities of security and privacy for deployed avionics.” 2018. Web. 07 Jun 2020.

Vancouver:

Smith M. Measuring operational realities of security and privacy for deployed avionics. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2020 Jun 07]. Available from: http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629.

Council of Science Editors:

Smith M. Measuring operational realities of security and privacy for deployed avionics. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:bda853ac-e168-4021-b622-c9b54bcd5445 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791629

11. Ridderman, Lindsey. The Effects of a Factory Reset on an iPhone 8 Plus.

Degree: 2018, Ferris State University

 With the rapid evolution of the Apple iPhone and the high rate of cybercrime it seems impossible to keep up on the everchanging security features… (more)

Subjects/Keywords: iPhone; Cyber security.; Factory reset.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ridderman, L. (2018). The Effects of a Factory Reset on an iPhone 8 Plus. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ridderman, Lindsey. “The Effects of a Factory Reset on an iPhone 8 Plus.” 2018. Thesis, Ferris State University. Accessed June 07, 2020. http://hdl.handle.net/2323/6377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ridderman, Lindsey. “The Effects of a Factory Reset on an iPhone 8 Plus.” 2018. Web. 07 Jun 2020.

Vancouver:

Ridderman L. The Effects of a Factory Reset on an iPhone 8 Plus. [Internet] [Thesis]. Ferris State University; 2018. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/2323/6377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ridderman L. The Effects of a Factory Reset on an iPhone 8 Plus. [Thesis]. Ferris State University; 2018. Available from: http://hdl.handle.net/2323/6377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Tan, Song. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.

Degree: PhD, Computer Science, 2016, Georgia State University

  A Smart Grid is a digitally enabled electric power grid that integrates the computation and communication technologies from cyber world with the sensors and… (more)

Subjects/Keywords: Cyber Security; Testbed; Smart Grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, S. (2016). On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_diss/103

Chicago Manual of Style (16th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Doctoral Dissertation, Georgia State University. Accessed June 07, 2020. https://scholarworks.gsu.edu/cs_diss/103.

MLA Handbook (7th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Web. 07 Jun 2020.

Vancouver:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Internet] [Doctoral dissertation]. Georgia State University; 2016. [cited 2020 Jun 07]. Available from: https://scholarworks.gsu.edu/cs_diss/103.

Council of Science Editors:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Doctoral Dissertation]. Georgia State University; 2016. Available from: https://scholarworks.gsu.edu/cs_diss/103


Royal Holloway, University of London

13. Haggman, Andreas. Cyber wargaming : finding, designing, and playing wargames for cyber security education.

Degree: PhD, 2019, Royal Holloway, University of London

 This thesis investigates, and contributes to, the use of wargaming in cyber security education. Wargaming has a rich history of pedagogic use, but little work… (more)

Subjects/Keywords: cyber security; wargaming; education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Haggman, A. (2019). Cyber wargaming : finding, designing, and playing wargames for cyber security education. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934

Chicago Manual of Style (16th Edition):

Haggman, Andreas. “Cyber wargaming : finding, designing, and playing wargames for cyber security education.” 2019. Doctoral Dissertation, Royal Holloway, University of London. Accessed June 07, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934.

MLA Handbook (7th Edition):

Haggman, Andreas. “Cyber wargaming : finding, designing, and playing wargames for cyber security education.” 2019. Web. 07 Jun 2020.

Vancouver:

Haggman A. Cyber wargaming : finding, designing, and playing wargames for cyber security education. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2019. [cited 2020 Jun 07]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934.

Council of Science Editors:

Haggman A. Cyber wargaming : finding, designing, and playing wargames for cyber security education. [Doctoral Dissertation]. Royal Holloway, University of London; 2019. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/cyber-wargaming-finding-designing-and-playing-wargames-for-cyber-security-education(5176e1b5-db99-4fe3-8289-a3d1b358fd88).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792934


University of Sydney

14. Andal, Stephenie Lois. Cyber Sovereignty: A New Vision in China .

Degree: 2018, University of Sydney

 Research on China’s strategy of cyber sovereignty to date has been inadequate, conceiving of the blueprint as a domestic Party censorship and surveillance mechanism, effectively… (more)

Subjects/Keywords: China; cyber sovereignty; Internet governance; cyber security; Hong Kong; cyber governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andal, S. L. (2018). Cyber Sovereignty: A New Vision in China . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Thesis, University of Sydney. Accessed June 07, 2020. http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Web. 07 Jun 2020.

Vancouver:

Andal SL. Cyber Sovereignty: A New Vision in China . [Internet] [Thesis]. University of Sydney; 2018. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andal SL. Cyber Sovereignty: A New Vision in China . [Thesis]. University of Sydney; 2018. Available from: http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

15. Verkerke, A.T. Towards a cyber approach for large organisations:.

Degree: 2015, Delft University of Technology

 Participation in cyberspace is of key importance for large organisations (and the functioning of our society), but to participate responsibly a comprehensive cyber approach is… (more)

Subjects/Keywords: cyber security; standards; cyber resilience; cyber governance; risk management; situational awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verkerke, A. T. (2015). Towards a cyber approach for large organisations:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

Chicago Manual of Style (16th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Masters Thesis, Delft University of Technology. Accessed June 07, 2020. http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

MLA Handbook (7th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Web. 07 Jun 2020.

Vancouver:

Verkerke AT. Towards a cyber approach for large organisations:. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2020 Jun 07]. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

Council of Science Editors:

Verkerke AT. Towards a cyber approach for large organisations:. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

16. Van De Sandt, Erik. Deviant security : the technical computer security practices of cyber criminals.

Degree: PhD, 2019, University of Bristol

 The dominant academic and practitioners' perspective on security evolves around law-abiding referent objects of security who are under attack by law-breaking threat agents. This study… (more)

Subjects/Keywords: 004; cyber crime; cyber security; cyber criminals; deviant security; investigations; police; law-enforcement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van De Sandt, E. (2019). Deviant security : the technical computer security practices of cyber criminals. (Doctoral Dissertation). University of Bristol. Retrieved from http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb

Chicago Manual of Style (16th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Doctoral Dissertation, University of Bristol. Accessed June 07, 2020. http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

MLA Handbook (7th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Web. 07 Jun 2020.

Vancouver:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

Council of Science Editors:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Doctoral Dissertation]. University of Bristol; 2019. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb


Luleå University of Technology

17. Fumudoh, Samar. Exploring the Relationship between Online Privacy on Cyber Security.

Degree: 2014, Luleå University of Technology

The aim of this research is to explore the relationship between online privacy and cybersecurity. With the birth of the internet and the recent… (more)

Subjects/Keywords: Technology; Privacy; Security; Cyber; Online privacy and cyber security; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fumudoh, S. (2014). Exploring the Relationship between Online Privacy on Cyber Security. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Thesis, Luleå University of Technology. Accessed June 07, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Web. 07 Jun 2020.

Vancouver:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Internet] [Thesis]. Luleå University of Technology; 2014. [cited 2020 Jun 07]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Thesis]. Luleå University of Technology; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

18. Pakalniškis, S. What factors explain why there is not a common and comprehensive global response to cyber threats?.

Degree: 2012, Leiden University

Analysis of the main causes why there is not a comprehensive global response to cyber threats. Analysis focuses on state interactions in the UN and CoE. Advisors/Committee Members: Chalmers, Dr. A.W (advisor), Hosli, Prof.dr. M.O (advisor).

Subjects/Keywords: cyber security; cyber threats; united nations; council of europe; cybercrime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pakalniškis, S. (2012). What factors explain why there is not a common and comprehensive global response to cyber threats?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/19509

Chicago Manual of Style (16th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Masters Thesis, Leiden University. Accessed June 07, 2020. http://hdl.handle.net/1887/19509.

MLA Handbook (7th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Web. 07 Jun 2020.

Vancouver:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Internet] [Masters thesis]. Leiden University; 2012. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/1887/19509.

Council of Science Editors:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Masters Thesis]. Leiden University; 2012. Available from: http://hdl.handle.net/1887/19509


Rochester Institute of Technology

19. Bean, Jordan. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.

Degree: MS, Computer Engineering, 2009, Rochester Institute of Technology

  On secure networks, even sophisticated cyber hackers must perform multiple steps to implement attacks on sensitive data and critical servers hidden behind layers of… (more)

Subjects/Keywords: Attack track; Cyber alert attribute analysis; Cyber security; Longest common subsequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bean, J. (2009). CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9095

Chicago Manual of Style (16th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed June 07, 2020. https://scholarworks.rit.edu/theses/9095.

MLA Handbook (7th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Web. 07 Jun 2020.

Vancouver:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2020 Jun 07]. Available from: https://scholarworks.rit.edu/theses/9095.

Council of Science Editors:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9095


Delft University of Technology

20. Zhu, Y. Attack pattern ontology: A common language for attack information sharing between organizations :.

Degree: 2015, Delft University of Technology

Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks.… (more)

Subjects/Keywords: cyber security; information sharing; cyber attack; attack pattern; ontology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2015). Attack pattern ontology: A common language for attack information sharing between organizations :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46

Chicago Manual of Style (16th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Masters Thesis, Delft University of Technology. Accessed June 07, 2020. http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

MLA Handbook (7th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Web. 07 Jun 2020.

Vancouver:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2020 Jun 07]. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

Council of Science Editors:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46


University of Wisconsin – Milwaukee

21. Xiang, Yingmeng. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.

Degree: PhD, Engineering, 2017, University of Wisconsin – Milwaukee

  With the smart grid initiatives in recent years, the electric power grid is rapidly evolving into a complicated and interconnected cyber-physical system. Unfortunately, the… (more)

Subjects/Keywords: Cyber-physical System; Smart Grid Cyber Security; Electrical and Electronics; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiang, Y. (2017). Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. (Doctoral Dissertation). University of Wisconsin – Milwaukee. Retrieved from https://dc.uwm.edu/etd/1725

Chicago Manual of Style (16th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Doctoral Dissertation, University of Wisconsin – Milwaukee. Accessed June 07, 2020. https://dc.uwm.edu/etd/1725.

MLA Handbook (7th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Web. 07 Jun 2020.

Vancouver:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Internet] [Doctoral dissertation]. University of Wisconsin – Milwaukee; 2017. [cited 2020 Jun 07]. Available from: https://dc.uwm.edu/etd/1725.

Council of Science Editors:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Doctoral Dissertation]. University of Wisconsin – Milwaukee; 2017. Available from: https://dc.uwm.edu/etd/1725


University of South Florida

22. Johnson, Kim. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.

Degree: 2018, University of South Florida

 Information security is of vital importance to organizations. Breaches in security very often stem from behaviors of the system operator. Cyber misbehaviors on the part… (more)

Subjects/Keywords: cyber risk; cyber safety; cybersecurity; information security; Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johnson, K. (2018). Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/7630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Johnson, Kim. “Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.” 2018. Thesis, University of South Florida. Accessed June 07, 2020. https://scholarcommons.usf.edu/etd/7630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Johnson, Kim. “Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.” 2018. Web. 07 Jun 2020.

Vancouver:

Johnson K. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. [Internet] [Thesis]. University of South Florida; 2018. [cited 2020 Jun 07]. Available from: https://scholarcommons.usf.edu/etd/7630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Johnson K. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. [Thesis]. University of South Florida; 2018. Available from: https://scholarcommons.usf.edu/etd/7630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

23. Davis, Sarah. Cyber-Physical Security Strategies.

Degree: MSEE, Electrical and Computer Engineering, 2014, Louisiana State University

Cyber-physical security describes the protection of systems with close relationships between computational functions and physical ones and addresses the issue of vulnerability to attack through… (more)

Subjects/Keywords: cyber-physical security; control sytem security; sensor network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, S. (2014). Cyber-Physical Security Strategies. (Masters Thesis). Louisiana State University. Retrieved from etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147

Chicago Manual of Style (16th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Masters Thesis, Louisiana State University. Accessed June 07, 2020. etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

MLA Handbook (7th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Web. 07 Jun 2020.

Vancouver:

Davis S. Cyber-Physical Security Strategies. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2020 Jun 07]. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

Council of Science Editors:

Davis S. Cyber-Physical Security Strategies. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147


Royal Holloway, University of London

24. Hersee, Steven. The cyber security dilemma and the securitisation of cyberspace.

Degree: PhD, 2019, Royal Holloway, University of London

 This thesis analyses the different securitisations of cyberspace by the Digital Rights Community (DRC) and the British state. It considers both the internal and external… (more)

Subjects/Keywords: Cyber Security; Encryption; Digital Rights; Security Dilemma; Securitisation; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hersee, S. (2019). The cyber security dilemma and the securitisation of cyberspace. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904

Chicago Manual of Style (16th Edition):

Hersee, Steven. “The cyber security dilemma and the securitisation of cyberspace.” 2019. Doctoral Dissertation, Royal Holloway, University of London. Accessed June 07, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904.

MLA Handbook (7th Edition):

Hersee, Steven. “The cyber security dilemma and the securitisation of cyberspace.” 2019. Web. 07 Jun 2020.

Vancouver:

Hersee S. The cyber security dilemma and the securitisation of cyberspace. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2019. [cited 2020 Jun 07]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904.

Council of Science Editors:

Hersee S. The cyber security dilemma and the securitisation of cyberspace. [Doctoral Dissertation]. Royal Holloway, University of London; 2019. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/the-cyber-security-dilemma-and-the-securitisation-of-cyberspace(dcf65dd5-c75d-40ce-8994-6da979eaa1e7).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792904


Rochester Institute of Technology

25. Imhof, Robert. Cyber crime and telecommunications law.

Degree: 2010, Rochester Institute of Technology

Cyber crime is a new and emerging area of concern for technology professionals, business leaders, and heads of government. This research takes a look at… (more)

Subjects/Keywords: Cyber crime; Hacker; Information; Law; Security; Sociology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Imhof, R. (2010). Cyber crime and telecommunications law. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Thesis, Rochester Institute of Technology. Accessed June 07, 2020. https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Web. 07 Jun 2020.

Vancouver:

Imhof R. Cyber crime and telecommunications law. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2020 Jun 07]. Available from: https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Imhof R. Cyber crime and telecommunications law. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

26. Waithaka, Samuel W. Factors Affecting Cyber Security In National Government Ministries In Kenya .

Degree: 2016, University of Nairobi

 The main justification of e-government systems is to offer public services conveniently and continuously over open and distributed networks. Security reliability of information connected over… (more)

Subjects/Keywords: Cyber Security In National Government Ministries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waithaka, S. W. (2016). Factors Affecting Cyber Security In National Government Ministries In Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Thesis, University of Nairobi. Accessed June 07, 2020. http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Web. 07 Jun 2020.

Vancouver:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Internet] [Thesis]. University of Nairobi; 2016. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Thesis]. University of Nairobi; 2016. Available from: http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

27. Guymon, Daniel Wade. Cyber-physical Algorithms for Enhancing Collaboration.

Degree: MS, Electrical and Computer Engineering, 2012, Virginia Tech

 The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people.… (more)

Subjects/Keywords: cyber-physical systems; mobile computing; smartphones; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guymon, D. W. (2012). Cyber-physical Algorithms for Enhancing Collaboration. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/31919

Chicago Manual of Style (16th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Masters Thesis, Virginia Tech. Accessed June 07, 2020. http://hdl.handle.net/10919/31919.

MLA Handbook (7th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Web. 07 Jun 2020.

Vancouver:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Internet] [Masters thesis]. Virginia Tech; 2012. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/10919/31919.

Council of Science Editors:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Masters Thesis]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/31919


De Montfort University

28. Nicholson, Andrew. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.

Degree: PhD, 2015, De Montfort University

 Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and… (more)

Subjects/Keywords: 600; cyber security; attack atribution; deception; honeynet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nicholson, A. (2015). Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. (Doctoral Dissertation). De Montfort University. Retrieved from http://hdl.handle.net/2086/11418

Chicago Manual of Style (16th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Doctoral Dissertation, De Montfort University. Accessed June 07, 2020. http://hdl.handle.net/2086/11418.

MLA Handbook (7th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Web. 07 Jun 2020.

Vancouver:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Internet] [Doctoral dissertation]. De Montfort University; 2015. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/2086/11418.

Council of Science Editors:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Doctoral Dissertation]. De Montfort University; 2015. Available from: http://hdl.handle.net/2086/11418


University of Illinois – Urbana-Champaign

29. Backes, Matthew R. Cyber security threat modeling and experimental mitigation mechanisms in microgrids.

Degree: MS, Electrical & Computer Engr, 2017, University of Illinois – Urbana-Champaign

 The growing penetration of distributed energy resources (DERs) together with communication and computer processing technologies are drivers in changing the paradigm of power system operation… (more)

Subjects/Keywords: Microgrid; Cyber security; Frequency control; Anomaly detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Backes, M. R. (2017). Cyber security threat modeling and experimental mitigation mechanisms in microgrids. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/99125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Backes, Matthew R. “Cyber security threat modeling and experimental mitigation mechanisms in microgrids.” 2017. Thesis, University of Illinois – Urbana-Champaign. Accessed June 07, 2020. http://hdl.handle.net/2142/99125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Backes, Matthew R. “Cyber security threat modeling and experimental mitigation mechanisms in microgrids.” 2017. Web. 07 Jun 2020.

Vancouver:

Backes MR. Cyber security threat modeling and experimental mitigation mechanisms in microgrids. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2017. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/2142/99125.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Backes MR. Cyber security threat modeling and experimental mitigation mechanisms in microgrids. [Thesis]. University of Illinois – Urbana-Champaign; 2017. Available from: http://hdl.handle.net/2142/99125

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Washington State University

30. [No author]. Quantifying the effects of uncertainty to manage cyber-security risk and enable adaptivity in power grid wide area monitoring and control applications .

Degree: 2016, Washington State University

 The smooth operation of the power grid is based on the effective Wide Area Monitoring and Control systems, which is supposed to provide reliable and… (more)

Subjects/Keywords: Computer science; Cyber-security; Power grid; Uncertainty

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2016). Quantifying the effects of uncertainty to manage cyber-security risk and enable adaptivity in power grid wide area monitoring and control applications . (Thesis). Washington State University. Retrieved from http://hdl.handle.net/2376/12120

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “Quantifying the effects of uncertainty to manage cyber-security risk and enable adaptivity in power grid wide area monitoring and control applications .” 2016. Thesis, Washington State University. Accessed June 07, 2020. http://hdl.handle.net/2376/12120.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “Quantifying the effects of uncertainty to manage cyber-security risk and enable adaptivity in power grid wide area monitoring and control applications .” 2016. Web. 07 Jun 2020.

Vancouver:

author] [. Quantifying the effects of uncertainty to manage cyber-security risk and enable adaptivity in power grid wide area monitoring and control applications . [Internet] [Thesis]. Washington State University; 2016. [cited 2020 Jun 07]. Available from: http://hdl.handle.net/2376/12120.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. Quantifying the effects of uncertainty to manage cyber-security risk and enable adaptivity in power grid wide area monitoring and control applications . [Thesis]. Washington State University; 2016. Available from: http://hdl.handle.net/2376/12120

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [13]

.