Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cyber attack). Showing records 1 – 30 of 58 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Levels

▼ Search Limiters


Rochester Institute of Technology

1. Moskal, Stephen Frank. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.

Degree: MS, Computer Engineering, 2016, Rochester Institute of Technology

  Computer networks are becoming more complex as the reliance on these network increases in this era of exponential technological growth. This makes the potential… (more)

Subjects/Keywords: Cyber attack behavior; Cyber attack modeling; Cyber threat analytics; Simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moskal, S. F. (2016). Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9216

Chicago Manual of Style (16th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed March 25, 2019. https://scholarworks.rit.edu/theses/9216.

MLA Handbook (7th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Web. 25 Mar 2019.

Vancouver:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2019 Mar 25]. Available from: https://scholarworks.rit.edu/theses/9216.

Council of Science Editors:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9216


Delft University of Technology

2. Zhu, Y. Attack pattern ontology: A common language for attack information sharing between organizations :.

Degree: 2015, Delft University of Technology

Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks.… (more)

Subjects/Keywords: cyber security; information sharing; cyber attack; attack pattern; ontology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2015). Attack pattern ontology: A common language for attack information sharing between organizations :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46

Chicago Manual of Style (16th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Masters Thesis, Delft University of Technology. Accessed March 25, 2019. http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

MLA Handbook (7th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Web. 25 Mar 2019.

Vancouver:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Mar 25]. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

Council of Science Editors:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46


Virginia Tech

3. Saglam, Mehmet. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.

Degree: MS, Computer Science, 2014, Virginia Tech

 Power grids are regarded as significant military targets and have been targeted with kinetic attacks in previous military operations. These attacks resulted in significant levels… (more)

Subjects/Keywords: Cyber Warfare; Power Grid; Cyber Attack; Kinetic Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saglam, M. (2014). A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/49435

Chicago Manual of Style (16th Edition):

Saglam, Mehmet. “A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.” 2014. Masters Thesis, Virginia Tech. Accessed March 25, 2019. http://hdl.handle.net/10919/49435.

MLA Handbook (7th Edition):

Saglam, Mehmet. “A Military Planning Methodology for Conducting Cyber Attacks on Power Grid.” 2014. Web. 25 Mar 2019.

Vancouver:

Saglam M. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. [Internet] [Masters thesis]. Virginia Tech; 2014. [cited 2019 Mar 25]. Available from: http://hdl.handle.net/10919/49435.

Council of Science Editors:

Saglam M. A Military Planning Methodology for Conducting Cyber Attacks on Power Grid. [Masters Thesis]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/49435


Boise State University

4. Newell, Barry Edwin. Analysis of Cyber Incidents Between Dyadic Rivals.

Degree: 2016, Boise State University

Cyber conflict between states is a growing trend. There is a large body of research on cyber conflict, but there is very little quantitative analysis… (more)

Subjects/Keywords: cyber incident; cyber dispute; cyber conflict; cyberwarfare; cyber attack; dyadic rivalry; International Relations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Newell, B. E. (2016). Analysis of Cyber Incidents Between Dyadic Rivals. (Thesis). Boise State University. Retrieved from http://scholarworks.boisestate.edu/td/1133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Newell, Barry Edwin. “Analysis of Cyber Incidents Between Dyadic Rivals.” 2016. Thesis, Boise State University. Accessed March 25, 2019. http://scholarworks.boisestate.edu/td/1133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Newell, Barry Edwin. “Analysis of Cyber Incidents Between Dyadic Rivals.” 2016. Web. 25 Mar 2019.

Vancouver:

Newell BE. Analysis of Cyber Incidents Between Dyadic Rivals. [Internet] [Thesis]. Boise State University; 2016. [cited 2019 Mar 25]. Available from: http://scholarworks.boisestate.edu/td/1133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Newell BE. Analysis of Cyber Incidents Between Dyadic Rivals. [Thesis]. Boise State University; 2016. Available from: http://scholarworks.boisestate.edu/td/1133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


De Montfort University

5. Nicholson, Andrew. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.

Degree: PhD, 2015, De Montfort University

 Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and… (more)

Subjects/Keywords: 600; cyber security; attack atribution; deception; honeynet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nicholson, A. (2015). Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. (Doctoral Dissertation). De Montfort University. Retrieved from http://hdl.handle.net/2086/11418

Chicago Manual of Style (16th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Doctoral Dissertation, De Montfort University. Accessed March 25, 2019. http://hdl.handle.net/2086/11418.

MLA Handbook (7th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Web. 25 Mar 2019.

Vancouver:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Internet] [Doctoral dissertation]. De Montfort University; 2015. [cited 2019 Mar 25]. Available from: http://hdl.handle.net/2086/11418.

Council of Science Editors:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Doctoral Dissertation]. De Montfort University; 2015. Available from: http://hdl.handle.net/2086/11418


University of Houston

6. Esmalifalak, Mohammad. Attack and Defend Mechanisms for State Estimation in Smart Grid.

Degree: Electrical and Computer Engineering, Department of, 2018, University of Houston

 Aging power industries together with an increase in the demand from industrial and residential customers are the main incentive for policy makers to define a… (more)

Subjects/Keywords: Smart Grids; State Estimation; Cyber Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Esmalifalak, M. (2018). Attack and Defend Mechanisms for State Estimation in Smart Grid. (Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/3392

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Esmalifalak, Mohammad. “Attack and Defend Mechanisms for State Estimation in Smart Grid.” 2018. Thesis, University of Houston. Accessed March 25, 2019. http://hdl.handle.net/10657/3392.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Esmalifalak, Mohammad. “Attack and Defend Mechanisms for State Estimation in Smart Grid.” 2018. Web. 25 Mar 2019.

Vancouver:

Esmalifalak M. Attack and Defend Mechanisms for State Estimation in Smart Grid. [Internet] [Thesis]. University of Houston; 2018. [cited 2019 Mar 25]. Available from: http://hdl.handle.net/10657/3392.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Esmalifalak M. Attack and Defend Mechanisms for State Estimation in Smart Grid. [Thesis]. University of Houston; 2018. Available from: http://hdl.handle.net/10657/3392

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

7. Bean, Jordan. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.

Degree: MS, Computer Engineering, 2009, Rochester Institute of Technology

  On secure networks, even sophisticated cyber hackers must perform multiple steps to implement attacks on sensitive data and critical servers hidden behind layers of… (more)

Subjects/Keywords: Attack track; Cyber alert attribute analysis; Cyber security; Longest common subsequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bean, J. (2009). CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9095

Chicago Manual of Style (16th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed March 25, 2019. https://scholarworks.rit.edu/theses/9095.

MLA Handbook (7th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Web. 25 Mar 2019.

Vancouver:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2019 Mar 25]. Available from: https://scholarworks.rit.edu/theses/9095.

Council of Science Editors:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9095


Univerzitet u Beogradu

8. Mladenović, Dragan D. 1972-. Multidisciplinarni aspekti sajber ratovanja.

Degree: Fakultet organizacionih nauka, 2016, Univerzitet u Beogradu

Multidisciplinarne studije / pravne i računarske studije

Sajber ratovanje je ratovanje u sajber prostoru, zasnovano na primeni informacionokomunikacionih tehnologija. Ono predstavlja specifičan oblik međunarodnih sukoba,… (more)

Subjects/Keywords: cyberspace; cyber warfare; cyber attack; cyber weapon; cyberspace conflict; LOAC; international law

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mladenović, D. D. 1. (2016). Multidisciplinarni aspekti sajber ratovanja. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mladenović, Dragan D 1972-. “Multidisciplinarni aspekti sajber ratovanja.” 2016. Thesis, Univerzitet u Beogradu. Accessed March 25, 2019. https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mladenović, Dragan D 1972-. “Multidisciplinarni aspekti sajber ratovanja.” 2016. Web. 25 Mar 2019.

Vancouver:

Mladenović DD1. Multidisciplinarni aspekti sajber ratovanja. [Internet] [Thesis]. Univerzitet u Beogradu; 2016. [cited 2019 Mar 25]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mladenović DD1. Multidisciplinarni aspekti sajber ratovanja. [Thesis]. Univerzitet u Beogradu; 2016. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Kolli, Johanna. Cyberkonflikten i Ukraina : Cyberattacker som instrument i tvingande diplomati.

Degree: Political Science, 2018, Umeå University

  This paper aims to describe and explain the Russian use of cyberattacks in the Ukrainian conflict. Two major cyber events, BlackEnergy in 2015 and… (more)

Subjects/Keywords: cyber attack; cyber conflict; cyber coercion; coercive diplomacy; BlackEnergy; NotPetya; Ukraine; Russia; Political Science; Statsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kolli, J. (2018). Cyberkonflikten i Ukraina : Cyberattacker som instrument i tvingande diplomati. (Thesis). Umeå University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-154147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kolli, Johanna. “Cyberkonflikten i Ukraina : Cyberattacker som instrument i tvingande diplomati.” 2018. Thesis, Umeå University. Accessed March 25, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-154147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kolli, Johanna. “Cyberkonflikten i Ukraina : Cyberattacker som instrument i tvingande diplomati.” 2018. Web. 25 Mar 2019.

Vancouver:

Kolli J. Cyberkonflikten i Ukraina : Cyberattacker som instrument i tvingande diplomati. [Internet] [Thesis]. Umeå University; 2018. [cited 2019 Mar 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-154147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kolli J. Cyberkonflikten i Ukraina : Cyberattacker som instrument i tvingande diplomati. [Thesis]. Umeå University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-154147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

10. Gutta, Sandeep. New Distributed Framework for Cyber Attack Detection and Classification.

Degree: School of Electrical & Computer Engineering, 2011, Oklahoma State University

 With the fast growing cyber activity day by day, the threat from cyber attacks has increased enormously. The timely detection of these cyber attacks has… (more)

Subjects/Keywords: cyber attack detection; cyber attacks; data fusion; dempster-shafer theory; distributed detection; support vector machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gutta, S. (2011). New Distributed Framework for Cyber Attack Detection and Classification. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/10209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gutta, Sandeep. “New Distributed Framework for Cyber Attack Detection and Classification.” 2011. Thesis, Oklahoma State University. Accessed March 25, 2019. http://hdl.handle.net/11244/10209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gutta, Sandeep. “New Distributed Framework for Cyber Attack Detection and Classification.” 2011. Web. 25 Mar 2019.

Vancouver:

Gutta S. New Distributed Framework for Cyber Attack Detection and Classification. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Mar 25]. Available from: http://hdl.handle.net/11244/10209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gutta S. New Distributed Framework for Cyber Attack Detection and Classification. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/10209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


The Ohio State University

11. Afful-Dadzi, Anthony. Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management.

Degree: PhD, Industrial and Systems Engineering, 2012, The Ohio State University

Cyber-attacks are considered the greatest domestic security threat in the United States and among the greatest international security threats. Hypothetically, every personal computer connected… (more)

Subjects/Keywords: Industrial Engineering; Cyber Attack; Value function; Markov Decision Processes; Control Charts

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Afful-Dadzi, A. (2012). Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1354126687

Chicago Manual of Style (16th Edition):

Afful-Dadzi, Anthony. “Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management.” 2012. Doctoral Dissertation, The Ohio State University. Accessed March 25, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354126687.

MLA Handbook (7th Edition):

Afful-Dadzi, Anthony. “Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management.” 2012. Web. 25 Mar 2019.

Vancouver:

Afful-Dadzi A. Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management. [Internet] [Doctoral dissertation]. The Ohio State University; 2012. [cited 2019 Mar 25]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1354126687.

Council of Science Editors:

Afful-Dadzi A. Robust Optimal Maintenance Policies and Charts for Cyber Vulnerability Management. [Doctoral Dissertation]. The Ohio State University; 2012. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1354126687


Rochester Institute of Technology

12. Rawlins, Ryan T. Scalable Automation of Online Network Attack Characterization.

Degree: MS, Computer Engineering, 2014, Rochester Institute of Technology

Cyber attacks to enterprise networks and critical infrastructures are becoming more prevalent and diverse. Timely recognition of attack strategies and behaviors will assist analysts… (more)

Subjects/Keywords: Attack social graph; Cyber security; Feature selection; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawlins, R. T. (2014). Scalable Automation of Online Network Attack Characterization. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8369

Chicago Manual of Style (16th Edition):

Rawlins, Ryan T. “Scalable Automation of Online Network Attack Characterization.” 2014. Masters Thesis, Rochester Institute of Technology. Accessed March 25, 2019. https://scholarworks.rit.edu/theses/8369.

MLA Handbook (7th Edition):

Rawlins, Ryan T. “Scalable Automation of Online Network Attack Characterization.” 2014. Web. 25 Mar 2019.

Vancouver:

Rawlins RT. Scalable Automation of Online Network Attack Characterization. [Internet] [Masters thesis]. Rochester Institute of Technology; 2014. [cited 2019 Mar 25]. Available from: https://scholarworks.rit.edu/theses/8369.

Council of Science Editors:

Rawlins RT. Scalable Automation of Online Network Attack Characterization. [Masters Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8369


Iowa State University

13. Ashok, Aditya. Attack-resilient state estimation and testbed-based evaluation of cyber security for wide-area protection and control.

Degree: 2017, Iowa State University

 Critical infrastructures such as the power grid have been increasingly targeted by advanced and persistent cyber threats making cyber security one of the nation's top… (more)

Subjects/Keywords: attack-resilient; cyber-physical security; cyber security; smart grid; wide-area monitoring; protection; and control; Electrical and Electronics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ashok, A. (2017). Attack-resilient state estimation and testbed-based evaluation of cyber security for wide-area protection and control. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/15252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ashok, Aditya. “Attack-resilient state estimation and testbed-based evaluation of cyber security for wide-area protection and control.” 2017. Thesis, Iowa State University. Accessed March 25, 2019. https://lib.dr.iastate.edu/etd/15252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ashok, Aditya. “Attack-resilient state estimation and testbed-based evaluation of cyber security for wide-area protection and control.” 2017. Web. 25 Mar 2019.

Vancouver:

Ashok A. Attack-resilient state estimation and testbed-based evaluation of cyber security for wide-area protection and control. [Internet] [Thesis]. Iowa State University; 2017. [cited 2019 Mar 25]. Available from: https://lib.dr.iastate.edu/etd/15252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ashok A. Attack-resilient state estimation and testbed-based evaluation of cyber security for wide-area protection and control. [Thesis]. Iowa State University; 2017. Available from: https://lib.dr.iastate.edu/etd/15252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Topalovič Čapelnik, Mitja. KIBERNETSKE OPERACIJE IN UPORABA SILE V JUS AD BELLUM - APLIKATIVNOST OBSTOJEČIH MEDNARODNOPRAVNIH AKTOV IN MOŽNE REŠITVE.

Degree: 2016, Univerza v Mariboru

 Transibirski plinovod je leta 1982 doživel eno največjih nejedrskih eksplozij v zgodovini človeštva. Eksplozijo, ki so jo strokovnjaki po učinkih primerjali z odvrženo jedrsko bombo… (more)

Subjects/Keywords: kibernetski napad; mednarodno pravo; uporaba sile; cyber-attack; international law; use of force

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Topalovič Čapelnik, M. (2016). KIBERNETSKE OPERACIJE IN UPORABA SILE V JUS AD BELLUM - APLIKATIVNOST OBSTOJEČIH MEDNARODNOPRAVNIH AKTOV IN MOŽNE REŠITVE. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=61024 ; https://dk.um.si/Dokument.php?id=108568&dn=

Chicago Manual of Style (16th Edition):

Topalovič Čapelnik, Mitja. “KIBERNETSKE OPERACIJE IN UPORABA SILE V JUS AD BELLUM - APLIKATIVNOST OBSTOJEČIH MEDNARODNOPRAVNIH AKTOV IN MOŽNE REŠITVE.” 2016. Masters Thesis, Univerza v Mariboru. Accessed March 25, 2019. https://dk.um.si/IzpisGradiva.php?id=61024 ; https://dk.um.si/Dokument.php?id=108568&dn=.

MLA Handbook (7th Edition):

Topalovič Čapelnik, Mitja. “KIBERNETSKE OPERACIJE IN UPORABA SILE V JUS AD BELLUM - APLIKATIVNOST OBSTOJEČIH MEDNARODNOPRAVNIH AKTOV IN MOŽNE REŠITVE.” 2016. Web. 25 Mar 2019.

Vancouver:

Topalovič Čapelnik M. KIBERNETSKE OPERACIJE IN UPORABA SILE V JUS AD BELLUM - APLIKATIVNOST OBSTOJEČIH MEDNARODNOPRAVNIH AKTOV IN MOŽNE REŠITVE. [Internet] [Masters thesis]. Univerza v Mariboru; 2016. [cited 2019 Mar 25]. Available from: https://dk.um.si/IzpisGradiva.php?id=61024 ; https://dk.um.si/Dokument.php?id=108568&dn=.

Council of Science Editors:

Topalovič Čapelnik M. KIBERNETSKE OPERACIJE IN UPORABA SILE V JUS AD BELLUM - APLIKATIVNOST OBSTOJEČIH MEDNARODNOPRAVNIH AKTOV IN MOŽNE REŠITVE. [Masters Thesis]. Univerza v Mariboru; 2016. Available from: https://dk.um.si/IzpisGradiva.php?id=61024 ; https://dk.um.si/Dokument.php?id=108568&dn=

15. Hurst, William. Behavioural observation for critical infrastructure security support.

Degree: PhD, 2014, Liverpool John Moores University

 Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing and government services. In recent years, critical infrastructures have become… (more)

Subjects/Keywords: 005.8; Critical Infrastructure; Behavioural Observation; Cyber-Attack; Security; Data Analysis; Data Classification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hurst, W. (2014). Behavioural observation for critical infrastructure security support. (Doctoral Dissertation). Liverpool John Moores University. Retrieved from http://researchonline.ljmu.ac.uk/4382/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617387

Chicago Manual of Style (16th Edition):

Hurst, William. “Behavioural observation for critical infrastructure security support.” 2014. Doctoral Dissertation, Liverpool John Moores University. Accessed March 25, 2019. http://researchonline.ljmu.ac.uk/4382/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617387.

MLA Handbook (7th Edition):

Hurst, William. “Behavioural observation for critical infrastructure security support.” 2014. Web. 25 Mar 2019.

Vancouver:

Hurst W. Behavioural observation for critical infrastructure security support. [Internet] [Doctoral dissertation]. Liverpool John Moores University; 2014. [cited 2019 Mar 25]. Available from: http://researchonline.ljmu.ac.uk/4382/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617387.

Council of Science Editors:

Hurst W. Behavioural observation for critical infrastructure security support. [Doctoral Dissertation]. Liverpool John Moores University; 2014. Available from: http://researchonline.ljmu.ac.uk/4382/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617387

16. Rohrbeck, Patricia. Concurrent Biological, Electromagnetic Pulse, And Cyber Attacks - A Challenge To The Interagency Response.

Degree: MSin Defense and Strategic Studies, Defense and Strategic Studies, 2016, Missouri State University

 The U.S. including its military depends on an electrical grid and electricity-based critical infrastructure. An electromagnetic pulse (EMP) and cyber attack can disable not just… (more)

Subjects/Keywords: WMD; biological warfare agent; EMP; cyber attack; emergency response; Defense and Security Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rohrbeck, P. (2016). Concurrent Biological, Electromagnetic Pulse, And Cyber Attacks - A Challenge To The Interagency Response. (Masters Thesis). Missouri State University. Retrieved from https://bearworks.missouristate.edu/theses/3042

Chicago Manual of Style (16th Edition):

Rohrbeck, Patricia. “Concurrent Biological, Electromagnetic Pulse, And Cyber Attacks - A Challenge To The Interagency Response.” 2016. Masters Thesis, Missouri State University. Accessed March 25, 2019. https://bearworks.missouristate.edu/theses/3042.

MLA Handbook (7th Edition):

Rohrbeck, Patricia. “Concurrent Biological, Electromagnetic Pulse, And Cyber Attacks - A Challenge To The Interagency Response.” 2016. Web. 25 Mar 2019.

Vancouver:

Rohrbeck P. Concurrent Biological, Electromagnetic Pulse, And Cyber Attacks - A Challenge To The Interagency Response. [Internet] [Masters thesis]. Missouri State University; 2016. [cited 2019 Mar 25]. Available from: https://bearworks.missouristate.edu/theses/3042.

Council of Science Editors:

Rohrbeck P. Concurrent Biological, Electromagnetic Pulse, And Cyber Attacks - A Challenge To The Interagency Response. [Masters Thesis]. Missouri State University; 2016. Available from: https://bearworks.missouristate.edu/theses/3042


Mid Sweden University

17. Petersen, Rebecca. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks.

Degree: Information and Communication systems, 2015, Mid Sweden University

  Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security… (more)

Subjects/Keywords: Data mining; machine learning; cyber-attack; NSL-KDD; fea-tures; DoS; Probing; R2L; U2R.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Petersen, R. (2015). Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks. (Thesis). Mid Sweden University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Petersen, Rebecca. “Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks.” 2015. Thesis, Mid Sweden University. Accessed March 25, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Petersen, Rebecca. “Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks.” 2015. Web. 25 Mar 2019.

Vancouver:

Petersen R. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks. [Internet] [Thesis]. Mid Sweden University; 2015. [cited 2019 Mar 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Petersen R. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks. [Thesis]. Mid Sweden University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

18. Acquaviva, Jeffrey. Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis.

Degree: 2017, Penn State University

 This thesis introduces a novel model of Advanced Persistent Threats in a network, and uses game theory to compute the optimal defense strategies to counter… (more)

Subjects/Keywords: Network Security; Game Theory; Advanced Persistent Threats; Zero-Sum Games; Cyber attack modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Acquaviva, J. (2017). Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/13873jxa5147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Acquaviva, Jeffrey. “Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis.” 2017. Thesis, Penn State University. Accessed March 25, 2019. https://etda.libraries.psu.edu/catalog/13873jxa5147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Acquaviva, Jeffrey. “Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis.” 2017. Web. 25 Mar 2019.

Vancouver:

Acquaviva J. Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis. [Internet] [Thesis]. Penn State University; 2017. [cited 2019 Mar 25]. Available from: https://etda.libraries.psu.edu/catalog/13873jxa5147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Acquaviva J. Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis. [Thesis]. Penn State University; 2017. Available from: https://etda.libraries.psu.edu/catalog/13873jxa5147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

19. Klimeš, Jan. Kybernetické útoky v programu JMeter .

Degree: 2017, Brno University of Technology

 Bakalářská práce se zabývá bezpečností sítí založených na protokolu TCP/IP. Hlavním cílem práce je vytvoření rozšiřujících modulů pro aplikaci JMeter, které přidávají funkce pro softwarové… (more)

Subjects/Keywords: kybernetický útok; DoS; JMeter; SYN flood; UDP flood; DNS Server attack; DNS Amplification; Trafgen; cyber attack; DoS; JMeter; SYN flood; UDP flood; DNS Server attack; DNS Amplification; Trafgen

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Klimeš, J. (2017). Kybernetické útoky v programu JMeter . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/68169

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Klimeš, Jan. “Kybernetické útoky v programu JMeter .” 2017. Thesis, Brno University of Technology. Accessed March 25, 2019. http://hdl.handle.net/11012/68169.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Klimeš, Jan. “Kybernetické útoky v programu JMeter .” 2017. Web. 25 Mar 2019.

Vancouver:

Klimeš J. Kybernetické útoky v programu JMeter . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 Mar 25]. Available from: http://hdl.handle.net/11012/68169.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Klimeš J. Kybernetické útoky v programu JMeter . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/68169

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Wheeler, Benjamin Fredrick. A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms.

Degree: MS, Computer Engineering, 2014, Rochester Institute of Technology

  In order to combat the increasing complexity of cyber attacks, a new category of cyber defense called dynamic cyber defense has been the focus… (more)

Subjects/Keywords: Cyber attack; Cyber attack simulation; Cyber defense; Cyber defense simulation; Dynamic cyber defense; Moving target network defense

…3.3 Considerations for Cyber Attack Simulation . . . . . . . 3.3.1 Timing in an Event-Based… …30 30 31 32 32 33 33 34 35 39 40 41 42 42 43 43 44 4 Cyber Attack Scenario And Network… …8.2 Cyber Attack Scenario and Network Defense Simulator 8.2.1 Scenario Guidance Template… …Cyber Attack SCenario And network DEfense Simulator (CASCADES) to update the… …to as “a CWE”. Cyber Attack SCenario And network DEfense Simulator (CASCADES)… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wheeler, B. F. (2014). A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/8536

Chicago Manual of Style (16th Edition):

Wheeler, Benjamin Fredrick. “A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms.” 2014. Masters Thesis, Rochester Institute of Technology. Accessed March 25, 2019. https://scholarworks.rit.edu/theses/8536.

MLA Handbook (7th Edition):

Wheeler, Benjamin Fredrick. “A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms.” 2014. Web. 25 Mar 2019.

Vancouver:

Wheeler BF. A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms. [Internet] [Masters thesis]. Rochester Institute of Technology; 2014. [cited 2019 Mar 25]. Available from: https://scholarworks.rit.edu/theses/8536.

Council of Science Editors:

Wheeler BF. A Computer Network Model for the Evaluation of Moving Target Network Defense Mechanisms. [Masters Thesis]. Rochester Institute of Technology; 2014. Available from: https://scholarworks.rit.edu/theses/8536


AUT University

21. Zhu, Yao Chu. Exploring Defense of SQL Injection Attack in Penetration Testing .

Degree: AUT University

 SQLIA is adopted to attack websites with and without confidential information. Hackers utilize the compromised website as intermediate proxy to attack others for avoiding being… (more)

Subjects/Keywords: SQL injection attack; database protection; web application vulnerabilities; hacking; cyber-attack.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. C. (n.d.). Exploring Defense of SQL Injection Attack in Penetration Testing . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/10020

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhu, Yao Chu. “Exploring Defense of SQL Injection Attack in Penetration Testing .” Thesis, AUT University. Accessed March 25, 2019. http://hdl.handle.net/10292/10020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhu, Yao Chu. “Exploring Defense of SQL Injection Attack in Penetration Testing .” Web. 25 Mar 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Zhu YC. Exploring Defense of SQL Injection Attack in Penetration Testing . [Internet] [Thesis]. AUT University; [cited 2019 Mar 25]. Available from: http://hdl.handle.net/10292/10020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Zhu YC. Exploring Defense of SQL Injection Attack in Penetration Testing . [Thesis]. AUT University; Available from: http://hdl.handle.net/10292/10020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of New South Wales

22. Ahmed, Mohiuddin. Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization.

Degree: Engineering & Information Technology, 2016, University of New South Wales

 Network anomaly detection is becoming increasingly challenging due to the amountof global Internet traffic being produced at an unprecedented rate. This thesis identifiessummarization as a… (more)

Subjects/Keywords: Data Summarization; Cyber Attack; Anomoly Detection; Data Sstreams; Reservoir; Clustering; Rare Anomaly; Collective Anomaly; Network Traffic Analysis; Denial of Service; Flooding Attack; Unsupervised Learning; Sampling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmed, M. (2016). Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/56990 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42253/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Ahmed, Mohiuddin. “Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization.” 2016. Doctoral Dissertation, University of New South Wales. Accessed March 25, 2019. http://handle.unsw.edu.au/1959.4/56990 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42253/SOURCE02?view=true.

MLA Handbook (7th Edition):

Ahmed, Mohiuddin. “Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization.” 2016. Web. 25 Mar 2019.

Vancouver:

Ahmed M. Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization. [Internet] [Doctoral dissertation]. University of New South Wales; 2016. [cited 2019 Mar 25]. Available from: http://handle.unsw.edu.au/1959.4/56990 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42253/SOURCE02?view=true.

Council of Science Editors:

Ahmed M. Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization. [Doctoral Dissertation]. University of New South Wales; 2016. Available from: http://handle.unsw.edu.au/1959.4/56990 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:42253/SOURCE02?view=true


Brno University of Technology

23. Gajdušek, Ondřej. Generátor kybernetických útoků .

Degree: 2018, Brno University of Technology

 Cílem této práce je rozšíření softwarového generátoru útoků o nové typy útoků, především o útoky na aplikační vrstvě. Práce obsahuje popis, dělení útoků obecně a… (more)

Subjects/Keywords: NTP; SSDP; SNMP; dosgen; útok; trafgen; netsniff-ng; ICMP; DoS; DDoS; Linux; kybernetický útok; NTP; SSDP; SNMP; dosgen; attack; trafgen; netsniff-ng; ICMP; DoS; DDoS; Linux; cyber attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gajdušek, O. (2018). Generátor kybernetických útoků . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82016

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gajdušek, Ondřej. “Generátor kybernetických útoků .” 2018. Thesis, Brno University of Technology. Accessed March 25, 2019. http://hdl.handle.net/11012/82016.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gajdušek, Ondřej. “Generátor kybernetických útoků .” 2018. Web. 25 Mar 2019.

Vancouver:

Gajdušek O. Generátor kybernetických útoků . [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2019 Mar 25]. Available from: http://hdl.handle.net/11012/82016.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gajdušek O. Generátor kybernetických útoků . [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/82016

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mississippi State University

24. Chen, Qian. Model-based autonomic security management of networked distributed systems.

Degree: PhD, Electrical and Computer Engineering, 2014, Mississippi State University

  This research focuses on the development and validation of an autonomic security management (ASM) framework to proactively protect distributed systems (DSs) from a wide… (more)

Subjects/Keywords: Intrusion Mitigation and Response System; Self-Protection; Autonomic Computing; Intrusion Detection/Protection System; Network Forensics; Cyber Attack Taxonomy; Cyber Security; Intrusion Estimation; Security Model-based Validation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Q. (2014). Model-based autonomic security management of networked distributed systems. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;

Chicago Manual of Style (16th Edition):

Chen, Qian. “Model-based autonomic security management of networked distributed systems.” 2014. Doctoral Dissertation, Mississippi State University. Accessed March 25, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;.

MLA Handbook (7th Edition):

Chen, Qian. “Model-based autonomic security management of networked distributed systems.” 2014. Web. 25 Mar 2019.

Vancouver:

Chen Q. Model-based autonomic security management of networked distributed systems. [Internet] [Doctoral dissertation]. Mississippi State University; 2014. [cited 2019 Mar 25]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;.

Council of Science Editors:

Chen Q. Model-based autonomic security management of networked distributed systems. [Doctoral Dissertation]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;


Mykolas Romeris University

25. Kazinec, Darius. Issues of cyber warfare in international law.

Degree: Master, Law, 2011, Mykolas Romeris University

Cyber has been around for over a decade and yet we are still faces with a situation of a very weak or rather no regulation.… (more)

Subjects/Keywords: Cyber warfare; Computer network attack; Self-defense; International humanitarian law; Kibernetinis karas; Kompiuterių tinklo puolimas; Savigyna; Tarptautine humanitarinė teisė

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kazinec, Darius. (2011). Issues of cyber warfare in international law. (Masters Thesis). Mykolas Romeris University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Kazinec, Darius. “Issues of cyber warfare in international law.” 2011. Masters Thesis, Mykolas Romeris University. Accessed March 25, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Kazinec, Darius. “Issues of cyber warfare in international law.” 2011. Web. 25 Mar 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Kazinec, Darius. Issues of cyber warfare in international law. [Internet] [Masters thesis]. Mykolas Romeris University; 2011. [cited 2019 Mar 25]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Kazinec, Darius. Issues of cyber warfare in international law. [Masters Thesis]. Mykolas Romeris University; 2011. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Virginia

26. DiValentin, Louis. Initial Application of Fault Detection Techniques to Cybersecurity Intrusion Detection.

Degree: MS, Systems Engineering, 2013, University of Virginia

 Industrial control systems recently have become the targets of cyber-attacks that manipulate the parameters of their normal operating procedures to produce unstable behavior. Previous research… (more)

Subjects/Keywords: industrial; control; systems; identification; parameter; estimation; stuxnet; cyber; security; subspace; kalman; filtering; linear; dynamic; detection; attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

DiValentin, L. (2013). Initial Application of Fault Detection Techniques to Cybersecurity Intrusion Detection. (Doctoral Dissertation). University of Virginia. Retrieved from http://libra.virginia.edu/catalog/libra-oa:3628

Chicago Manual of Style (16th Edition):

DiValentin, Louis. “Initial Application of Fault Detection Techniques to Cybersecurity Intrusion Detection.” 2013. Doctoral Dissertation, University of Virginia. Accessed March 25, 2019. http://libra.virginia.edu/catalog/libra-oa:3628.

MLA Handbook (7th Edition):

DiValentin, Louis. “Initial Application of Fault Detection Techniques to Cybersecurity Intrusion Detection.” 2013. Web. 25 Mar 2019.

Vancouver:

DiValentin L. Initial Application of Fault Detection Techniques to Cybersecurity Intrusion Detection. [Internet] [Doctoral dissertation]. University of Virginia; 2013. [cited 2019 Mar 25]. Available from: http://libra.virginia.edu/catalog/libra-oa:3628.

Council of Science Editors:

DiValentin L. Initial Application of Fault Detection Techniques to Cybersecurity Intrusion Detection. [Doctoral Dissertation]. University of Virginia; 2013. Available from: http://libra.virginia.edu/catalog/libra-oa:3628


University of California – Riverside

27. Amini, Sajjad. Smart Grid Cyber and Physical Security.

Degree: Electrical Engineering, 2017, University of California – Riverside

 Anomalies in the form of natural faults or malicious attacks can affect the dynamics of power systems. They can be physical or cyber-physical, and can… (more)

Subjects/Keywords: Electrical engineering; Computer science; Cyber security; Destabilizing fault and attack; Detection; Location identification; Power system dynamics; Smart grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amini, S. (2017). Smart Grid Cyber and Physical Security. (Thesis). University of California – Riverside. Retrieved from http://www.escholarship.org/uc/item/03t3b2m6

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Amini, Sajjad. “Smart Grid Cyber and Physical Security.” 2017. Thesis, University of California – Riverside. Accessed March 25, 2019. http://www.escholarship.org/uc/item/03t3b2m6.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Amini, Sajjad. “Smart Grid Cyber and Physical Security.” 2017. Web. 25 Mar 2019.

Vancouver:

Amini S. Smart Grid Cyber and Physical Security. [Internet] [Thesis]. University of California – Riverside; 2017. [cited 2019 Mar 25]. Available from: http://www.escholarship.org/uc/item/03t3b2m6.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Amini S. Smart Grid Cyber and Physical Security. [Thesis]. University of California – Riverside; 2017. Available from: http://www.escholarship.org/uc/item/03t3b2m6

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mississippi State University

28. Nandi, Apurba Kumer. Network interdiction models and algorithms for information security.

Degree: PhD, Industrial and Systems Engineering, 2016, Mississippi State University

  Major cyber attacks against the cyber networks of organizations has become a common phenomenon nowadays. Cyber attacks are carried out both through the spread… (more)

Subjects/Keywords: constraint and column generation; multi-level programming; bi-level programming; Mixed Integer programming; cyber security; Attack graph; Network; Interdiction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nandi, A. K. (2016). Network interdiction models and algorithms for information security. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;

Chicago Manual of Style (16th Edition):

Nandi, Apurba Kumer. “Network interdiction models and algorithms for information security.” 2016. Doctoral Dissertation, Mississippi State University. Accessed March 25, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;.

MLA Handbook (7th Edition):

Nandi, Apurba Kumer. “Network interdiction models and algorithms for information security.” 2016. Web. 25 Mar 2019.

Vancouver:

Nandi AK. Network interdiction models and algorithms for information security. [Internet] [Doctoral dissertation]. Mississippi State University; 2016. [cited 2019 Mar 25]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;.

Council of Science Editors:

Nandi AK. Network interdiction models and algorithms for information security. [Doctoral Dissertation]. Mississippi State University; 2016. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10072016-023829/ ;


University of South Florida

29. Sinopoli, Anthony F. Cyberwar and International Law: An English School Perspective.

Degree: 2012, University of South Florida

 Cyberwar challenges future endeavors of state security. As technological capability has improved, and access to information has become more widespread the importance of the issue… (more)

Subjects/Keywords: cyber-attack; humanitarian law; informational infrastructure; information operations; international society; International Law; International Relations; Political Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sinopoli, A. F. (2012). Cyberwar and International Law: An English School Perspective. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/4404

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sinopoli, Anthony F. “Cyberwar and International Law: An English School Perspective.” 2012. Thesis, University of South Florida. Accessed March 25, 2019. https://scholarcommons.usf.edu/etd/4404.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sinopoli, Anthony F. “Cyberwar and International Law: An English School Perspective.” 2012. Web. 25 Mar 2019.

Vancouver:

Sinopoli AF. Cyberwar and International Law: An English School Perspective. [Internet] [Thesis]. University of South Florida; 2012. [cited 2019 Mar 25]. Available from: https://scholarcommons.usf.edu/etd/4404.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sinopoli AF. Cyberwar and International Law: An English School Perspective. [Thesis]. University of South Florida; 2012. Available from: https://scholarcommons.usf.edu/etd/4404

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Lehigh University

30. Famili, Alireza. Reliability Test for the Proposed GPS Spoofing Attack Detection Scheme.

Degree: MS, Electrical and Computer Engineering, 2018, Lehigh University

 A modern wide area monitoring system (WAMS) supporting the future grid will include a vastly improved information and communications functionality that allows service providers to… (more)

Subjects/Keywords: Cyber-Security of Smart Grids; GPS Spoofing Attack; Signal Processing and Communication; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Famili, A. (2018). Reliability Test for the Proposed GPS Spoofing Attack Detection Scheme. (Thesis). Lehigh University. Retrieved from https://preserve.lehigh.edu/etd/4279

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Famili, Alireza. “Reliability Test for the Proposed GPS Spoofing Attack Detection Scheme.” 2018. Thesis, Lehigh University. Accessed March 25, 2019. https://preserve.lehigh.edu/etd/4279.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Famili, Alireza. “Reliability Test for the Proposed GPS Spoofing Attack Detection Scheme.” 2018. Web. 25 Mar 2019.

Vancouver:

Famili A. Reliability Test for the Proposed GPS Spoofing Attack Detection Scheme. [Internet] [Thesis]. Lehigh University; 2018. [cited 2019 Mar 25]. Available from: https://preserve.lehigh.edu/etd/4279.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Famili A. Reliability Test for the Proposed GPS Spoofing Attack Detection Scheme. [Thesis]. Lehigh University; 2018. Available from: https://preserve.lehigh.edu/etd/4279

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.