Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cyber security). Showing records 1 – 30 of 300 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Country

▼ Search Limiters


Cranfield University

1. Lewis, P S. The global vulnerability discovery and disclosure system: a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system: a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665

Chicago Manual of Style (16th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed March 21, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

MLA Handbook (7th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Web. 21 Mar 2019.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Mar 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665


California State University – Sacramento

2. Vyas, Mruga. Security issues in distributed energy resources (DER) in smart grid.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 One of the main goals of smart grid is to create a decentralized and consumer controlled power system which can increase efficiency, reliability and reduce… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vyas, M. (2011). Security issues in distributed energy resources (DER) in smart grid. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1229

Chicago Manual of Style (16th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Masters Thesis, California State University – Sacramento. Accessed March 21, 2019. http://hdl.handle.net/10211.9/1229.

MLA Handbook (7th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Web. 21 Mar 2019.

Vancouver:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/10211.9/1229.

Council of Science Editors:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1229


Cranfield University

3. Humphrey, M. Identifying the critical success factors to improve information security incident reporting.

Degree: 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Thesis). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Thesis, Cranfield University. Accessed March 21, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 21 Mar 2019.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Thesis]. Cranfield University; 2017. [cited 2019 Mar 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Thesis]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cranfield University

4. Humphrey, Mike. Identifying the critical success factors to improve information security incident reporting.

Degree: PhD, 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627

Chicago Manual of Style (16th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Doctoral Dissertation, Cranfield University. Accessed March 21, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

MLA Handbook (7th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 21 Mar 2019.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Mar 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627


Cranfield University

5. Lewis, Paul Simon. The global vulnerability discovery and disclosure system : a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system : a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729

Chicago Manual of Style (16th Edition):

Lewis, Paul Simon. “The global vulnerability discovery and disclosure system : a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed March 21, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729.

MLA Handbook (7th Edition):

Lewis, Paul Simon. “The global vulnerability discovery and disclosure system : a thematic system dynamics approach.” 2017. Web. 21 Mar 2019.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system : a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Mar 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system : a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729


Northeastern University

6. Cohen, Matthew S. Beyond theory: applying empirical evidence to cyberspace theories.

Degree: PhD, Department of Political Science, 2018, Northeastern University

 Political science has made progress in the study of how actors behave in cyber-space, but it is still an emerging field. Much of the academic… (more)

Subjects/Keywords: cyber-defense; cyber-offense; cyber-security; cyber-space; cyber-weapons

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cohen, M. S. (2018). Beyond theory: applying empirical evidence to cyberspace theories. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20272930

Chicago Manual of Style (16th Edition):

Cohen, Matthew S. “Beyond theory: applying empirical evidence to cyberspace theories.” 2018. Doctoral Dissertation, Northeastern University. Accessed March 21, 2019. http://hdl.handle.net/2047/D20272930.

MLA Handbook (7th Edition):

Cohen, Matthew S. “Beyond theory: applying empirical evidence to cyberspace theories.” 2018. Web. 21 Mar 2019.

Vancouver:

Cohen MS. Beyond theory: applying empirical evidence to cyberspace theories. [Internet] [Doctoral dissertation]. Northeastern University; 2018. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/2047/D20272930.

Council of Science Editors:

Cohen MS. Beyond theory: applying empirical evidence to cyberspace theories. [Doctoral Dissertation]. Northeastern University; 2018. Available from: http://hdl.handle.net/2047/D20272930


Victoria University of Wellington

7. Gordon, Richard. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.

Degree: 2014, Victoria University of Wellington

Cyber-attacks present significant challenges to a modern, globalised world. Progressively used by criminal and terrorist organisations to attack or victimise non-state actors, governments are increasingly… (more)

Subjects/Keywords: Cyber; Privacy; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gordon, R. (2014). Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/3565

Chicago Manual of Style (16th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Masters Thesis, Victoria University of Wellington. Accessed March 21, 2019. http://hdl.handle.net/10063/3565.

MLA Handbook (7th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Web. 21 Mar 2019.

Vancouver:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Internet] [Masters thesis]. Victoria University of Wellington; 2014. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/10063/3565.

Council of Science Editors:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Masters Thesis]. Victoria University of Wellington; 2014. Available from: http://hdl.handle.net/10063/3565

8. Puttaroo, Mohammad Ally Rehaz. A behavioural study in runtime analysis environments and drive-by download attacks.

Degree: PhD, 2017, University of West London

 In the information age, the growth in availability of both technology and exploit kits have continuously contributed in a large volume of websites being compromised… (more)

Subjects/Keywords: Cyber security; Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puttaroo, M. A. R. (2017). A behavioural study in runtime analysis environments and drive-by download attacks. (Doctoral Dissertation). University of West London. Retrieved from https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802

Chicago Manual of Style (16th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Doctoral Dissertation, University of West London. Accessed March 21, 2019. https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

MLA Handbook (7th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Web. 21 Mar 2019.

Vancouver:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Internet] [Doctoral dissertation]. University of West London; 2017. [cited 2019 Mar 21]. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

Council of Science Editors:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Doctoral Dissertation]. University of West London; 2017. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802


Leiden University

9. Ossip, Silja-Madli. Cyber threats and cybercrime – a disruption of human security?.

Degree: 2017, Leiden University

 Cyberspace is everywhere in the world nowadays – all our activities are connected to the internet, devices are connected to each other and at least… (more)

Subjects/Keywords: cybercrime; cyber threats; cyber hygiene; human security; cyber education; cyber crime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ossip, S. (2017). Cyber threats and cybercrime – a disruption of human security?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/52314

Chicago Manual of Style (16th Edition):

Ossip, Silja-Madli. “Cyber threats and cybercrime – a disruption of human security?.” 2017. Masters Thesis, Leiden University. Accessed March 21, 2019. http://hdl.handle.net/1887/52314.

MLA Handbook (7th Edition):

Ossip, Silja-Madli. “Cyber threats and cybercrime – a disruption of human security?.” 2017. Web. 21 Mar 2019.

Vancouver:

Ossip S. Cyber threats and cybercrime – a disruption of human security?. [Internet] [Masters thesis]. Leiden University; 2017. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/1887/52314.

Council of Science Editors:

Ossip S. Cyber threats and cybercrime – a disruption of human security?. [Masters Thesis]. Leiden University; 2017. Available from: http://hdl.handle.net/1887/52314

10. Tan, Song. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.

Degree: PhD, Computer Science, 2016, Georgia State University

  A Smart Grid is a digitally enabled electric power grid that integrates the computation and communication technologies from cyber world with the sensors and… (more)

Subjects/Keywords: Cyber Security; Testbed; Smart Grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, S. (2016). On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_diss/103

Chicago Manual of Style (16th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Doctoral Dissertation, Georgia State University. Accessed March 21, 2019. https://scholarworks.gsu.edu/cs_diss/103.

MLA Handbook (7th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Web. 21 Mar 2019.

Vancouver:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Internet] [Doctoral dissertation]. Georgia State University; 2016. [cited 2019 Mar 21]. Available from: https://scholarworks.gsu.edu/cs_diss/103.

Council of Science Editors:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Doctoral Dissertation]. Georgia State University; 2016. Available from: https://scholarworks.gsu.edu/cs_diss/103


Penn State University

11. McLaughlin, Stephen Elliot. Specification-based Attacks and Defenses in Sequential Control Systems.

Degree: PhD, Computer Science and Engineering, 2014, Penn State University

Cyber physical systems, such as control systems use general purpose computation to govern the behavior of physical systems in the manufacturing, transportation, and energy sectors.… (more)

Subjects/Keywords: Security; Cyber-Physical; Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McLaughlin, S. E. (2014). Specification-based Attacks and Defenses in Sequential Control Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/21556

Chicago Manual of Style (16th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Doctoral Dissertation, Penn State University. Accessed March 21, 2019. https://etda.libraries.psu.edu/catalog/21556.

MLA Handbook (7th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Web. 21 Mar 2019.

Vancouver:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Internet] [Doctoral dissertation]. Penn State University; 2014. [cited 2019 Mar 21]. Available from: https://etda.libraries.psu.edu/catalog/21556.

Council of Science Editors:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Doctoral Dissertation]. Penn State University; 2014. Available from: https://etda.libraries.psu.edu/catalog/21556

12. Mitchell, Scott. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.

Degree: Doctoral Thesis, Cyber Security, 2018, Abertay University

 A steganographic method was developed based on the temporal redundancies present in digital video streams, these redundancies are utilised by the H.264 encoding standard to… (more)

Subjects/Keywords: Cyber Security; Steganography; Digital Video

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mitchell, S. (2018). H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. (Thesis). Abertay University. Retrieved from https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Thesis, Abertay University. Accessed March 21, 2019. https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Web. 21 Mar 2019.

Vancouver:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Internet] [Thesis]. Abertay University; 2018. [cited 2019 Mar 21]. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Thesis]. Abertay University; 2018. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

13. Krall, Alexander Leon. Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk.

Degree: MS, Industrial and Systems Engineering, 2018, Rochester Institute of Technology

  Vulnerabilities inherent in a cyber network can be exploited by individuals with malicious intent. Thus, machines on the network are at risk. Formally, security(more)

Subjects/Keywords: Cyber security; Importance sampling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krall, A. L. (2018). Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9778

Chicago Manual of Style (16th Edition):

Krall, Alexander Leon. “Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk.” 2018. Masters Thesis, Rochester Institute of Technology. Accessed March 21, 2019. https://scholarworks.rit.edu/theses/9778.

MLA Handbook (7th Edition):

Krall, Alexander Leon. “Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk.” 2018. Web. 21 Mar 2019.

Vancouver:

Krall AL. Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk. [Internet] [Masters thesis]. Rochester Institute of Technology; 2018. [cited 2019 Mar 21]. Available from: https://scholarworks.rit.edu/theses/9778.

Council of Science Editors:

Krall AL. Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk. [Masters Thesis]. Rochester Institute of Technology; 2018. Available from: https://scholarworks.rit.edu/theses/9778


University of Sydney

14. Andal, Stephenie Lois. Cyber Sovereignty: A New Vision in China .

Degree: 2018, University of Sydney

 Research on China’s strategy of cyber sovereignty to date has been inadequate, conceiving of the blueprint as a domestic Party censorship and surveillance mechanism, effectively… (more)

Subjects/Keywords: China; cyber sovereignty; Internet governance; cyber security; Hong Kong; cyber governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andal, S. L. (2018). Cyber Sovereignty: A New Vision in China . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Thesis, University of Sydney. Accessed March 21, 2019. http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Web. 21 Mar 2019.

Vancouver:

Andal SL. Cyber Sovereignty: A New Vision in China . [Internet] [Thesis]. University of Sydney; 2018. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andal SL. Cyber Sovereignty: A New Vision in China . [Thesis]. University of Sydney; 2018. Available from: http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

15. Verkerke, A.T. Towards a cyber approach for large organisations:.

Degree: 2015, Delft University of Technology

 Participation in cyberspace is of key importance for large organisations (and the functioning of our society), but to participate responsibly a comprehensive cyber approach is… (more)

Subjects/Keywords: cyber security; standards; cyber resilience; cyber governance; risk management; situational awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verkerke, A. T. (2015). Towards a cyber approach for large organisations:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

Chicago Manual of Style (16th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Masters Thesis, Delft University of Technology. Accessed March 21, 2019. http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

MLA Handbook (7th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Web. 21 Mar 2019.

Vancouver:

Verkerke AT. Towards a cyber approach for large organisations:. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Mar 21]. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

Council of Science Editors:

Verkerke AT. Towards a cyber approach for large organisations:. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e


Luleå University of Technology

16. Fumudoh, Samar. Exploring the Relationship between Online Privacy on Cyber Security.

Degree: 2014, Luleå University of Technology

The aim of this research is to explore the relationship between online privacy and cybersecurity. With the birth of the internet and the recent… (more)

Subjects/Keywords: Technology; Privacy; Security; Cyber; Online privacy and cyber security; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fumudoh, S. (2014). Exploring the Relationship between Online Privacy on Cyber Security. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Thesis, Luleå University of Technology. Accessed March 21, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Web. 21 Mar 2019.

Vancouver:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Internet] [Thesis]. Luleå University of Technology; 2014. [cited 2019 Mar 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Thesis]. Luleå University of Technology; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

17. Pakalniškis, S. What factors explain why there is not a common and comprehensive global response to cyber threats?.

Degree: 2012, Leiden University

Analysis of the main causes why there is not a comprehensive global response to cyber threats. Analysis focuses on state interactions in the UN and CoE. Advisors/Committee Members: Chalmers, Dr. A.W (advisor), Hosli, Prof.dr. M.O (advisor).

Subjects/Keywords: cyber security; cyber threats; united nations; council of europe; cybercrime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pakalniškis, S. (2012). What factors explain why there is not a common and comprehensive global response to cyber threats?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/19509

Chicago Manual of Style (16th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Masters Thesis, Leiden University. Accessed March 21, 2019. http://hdl.handle.net/1887/19509.

MLA Handbook (7th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Web. 21 Mar 2019.

Vancouver:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Internet] [Masters thesis]. Leiden University; 2012. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/1887/19509.

Council of Science Editors:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Masters Thesis]. Leiden University; 2012. Available from: http://hdl.handle.net/1887/19509


Delft University of Technology

18. Zhu, Y. Attack pattern ontology: A common language for attack information sharing between organizations :.

Degree: 2015, Delft University of Technology

Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks.… (more)

Subjects/Keywords: cyber security; information sharing; cyber attack; attack pattern; ontology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2015). Attack pattern ontology: A common language for attack information sharing between organizations :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46

Chicago Manual of Style (16th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Masters Thesis, Delft University of Technology. Accessed March 21, 2019. http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

MLA Handbook (7th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Web. 21 Mar 2019.

Vancouver:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Mar 21]. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

Council of Science Editors:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46


Rochester Institute of Technology

19. Bean, Jordan. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.

Degree: MS, Computer Engineering, 2009, Rochester Institute of Technology

  On secure networks, even sophisticated cyber hackers must perform multiple steps to implement attacks on sensitive data and critical servers hidden behind layers of… (more)

Subjects/Keywords: Attack track; Cyber alert attribute analysis; Cyber security; Longest common subsequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bean, J. (2009). CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9095

Chicago Manual of Style (16th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed March 21, 2019. https://scholarworks.rit.edu/theses/9095.

MLA Handbook (7th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Web. 21 Mar 2019.

Vancouver:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2019 Mar 21]. Available from: https://scholarworks.rit.edu/theses/9095.

Council of Science Editors:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9095


Louisiana State University

20. Davis, Sarah. Cyber-Physical Security Strategies.

Degree: MSEE, Electrical and Computer Engineering, 2014, Louisiana State University

Cyber-physical security describes the protection of systems with close relationships between computational functions and physical ones and addresses the issue of vulnerability to attack through… (more)

Subjects/Keywords: cyber-physical security; control sytem security; sensor network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, S. (2014). Cyber-Physical Security Strategies. (Masters Thesis). Louisiana State University. Retrieved from etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147

Chicago Manual of Style (16th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Masters Thesis, Louisiana State University. Accessed March 21, 2019. etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

MLA Handbook (7th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Web. 21 Mar 2019.

Vancouver:

Davis S. Cyber-Physical Security Strategies. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2019 Mar 21]. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

Council of Science Editors:

Davis S. Cyber-Physical Security Strategies. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147


De Montfort University

21. Nicholson, Andrew. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.

Degree: PhD, 2015, De Montfort University

 Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and… (more)

Subjects/Keywords: 600; cyber security; attack atribution; deception; honeynet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nicholson, A. (2015). Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. (Doctoral Dissertation). De Montfort University. Retrieved from http://hdl.handle.net/2086/11418

Chicago Manual of Style (16th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Doctoral Dissertation, De Montfort University. Accessed March 21, 2019. http://hdl.handle.net/2086/11418.

MLA Handbook (7th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Web. 21 Mar 2019.

Vancouver:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Internet] [Doctoral dissertation]. De Montfort University; 2015. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/2086/11418.

Council of Science Editors:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Doctoral Dissertation]. De Montfort University; 2015. Available from: http://hdl.handle.net/2086/11418


University of Nairobi

22. Waithaka, Samuel W. Factors Affecting Cyber Security In National Government Ministries In Kenya .

Degree: 2016, University of Nairobi

 The main justification of e-government systems is to offer public services conveniently and continuously over open and distributed networks. Security reliability of information connected over… (more)

Subjects/Keywords: Cyber Security In National Government Ministries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waithaka, S. W. (2016). Factors Affecting Cyber Security In National Government Ministries In Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Thesis, University of Nairobi. Accessed March 21, 2019. http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Web. 21 Mar 2019.

Vancouver:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Internet] [Thesis]. University of Nairobi; 2016. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Thesis]. University of Nairobi; 2016. Available from: http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Virginia

23. Trantham, Nathan. A Distributed, Model-Based Approach to Cyber-Security: Application to Wind Farms.

Degree: MS, distributed, control, reputation, 2013, University of Virginia

 In the U.S. Department of Energy’s report, ‘20% Wind Energy by 2030’, mitigating the risk associated with owning and operating wind turbines was identified as… (more)

Subjects/Keywords: distributed; control; cyber-security; reputation; wind farm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trantham, N. (2013). A Distributed, Model-Based Approach to Cyber-Security: Application to Wind Farms. (Doctoral Dissertation). University of Virginia. Retrieved from http://libra.virginia.edu/catalog/libra-oa:2872

Chicago Manual of Style (16th Edition):

Trantham, Nathan. “A Distributed, Model-Based Approach to Cyber-Security: Application to Wind Farms.” 2013. Doctoral Dissertation, University of Virginia. Accessed March 21, 2019. http://libra.virginia.edu/catalog/libra-oa:2872.

MLA Handbook (7th Edition):

Trantham, Nathan. “A Distributed, Model-Based Approach to Cyber-Security: Application to Wind Farms.” 2013. Web. 21 Mar 2019.

Vancouver:

Trantham N. A Distributed, Model-Based Approach to Cyber-Security: Application to Wind Farms. [Internet] [Doctoral dissertation]. University of Virginia; 2013. [cited 2019 Mar 21]. Available from: http://libra.virginia.edu/catalog/libra-oa:2872.

Council of Science Editors:

Trantham N. A Distributed, Model-Based Approach to Cyber-Security: Application to Wind Farms. [Doctoral Dissertation]. University of Virginia; 2013. Available from: http://libra.virginia.edu/catalog/libra-oa:2872


University of Southern California

24. Al Majali, Anas. A function-based methodology for evaluating resilience in smart grids.

Degree: PhD, Computer Engineering, 2014, University of Southern California

 Utilizing communication, control and computation technologies in the modern smart grid can enhance the reliability of the smart grid, reduce electricity costs and provide new… (more)

Subjects/Keywords: resilience; smart grids; cyber-physical security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Majali, A. (2014). A function-based methodology for evaluating resilience in smart grids. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197

Chicago Manual of Style (16th Edition):

Al Majali, Anas. “A function-based methodology for evaluating resilience in smart grids.” 2014. Doctoral Dissertation, University of Southern California. Accessed March 21, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197.

MLA Handbook (7th Edition):

Al Majali, Anas. “A function-based methodology for evaluating resilience in smart grids.” 2014. Web. 21 Mar 2019.

Vancouver:

Al Majali A. A function-based methodology for evaluating resilience in smart grids. [Internet] [Doctoral dissertation]. University of Southern California; 2014. [cited 2019 Mar 21]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197.

Council of Science Editors:

Al Majali A. A function-based methodology for evaluating resilience in smart grids. [Doctoral Dissertation]. University of Southern California; 2014. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197

25. Barnes, John. Capstone Project: Cyber Security Analysis for IKANOW .

Degree: 2017, California State University – San Marcos

This paper utilizes a plethora of resources to evaluate the cyber security firm IKANOW???s position in the market. Advisors/Committee Members: Grooms, David (advisor), Oskoorouchi, Mohammad (committeemember).

Subjects/Keywords: Cyber security Market research; IKANOW; Evaluation Resources

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barnes, J. (2017). Capstone Project: Cyber Security Analysis for IKANOW . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.3/194703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barnes, John. “Capstone Project: Cyber Security Analysis for IKANOW .” 2017. Thesis, California State University – San Marcos. Accessed March 21, 2019. http://hdl.handle.net/10211.3/194703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barnes, John. “Capstone Project: Cyber Security Analysis for IKANOW .” 2017. Web. 21 Mar 2019.

Vancouver:

Barnes J. Capstone Project: Cyber Security Analysis for IKANOW . [Internet] [Thesis]. California State University – San Marcos; 2017. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/10211.3/194703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barnes J. Capstone Project: Cyber Security Analysis for IKANOW . [Thesis]. California State University – San Marcos; 2017. Available from: http://hdl.handle.net/10211.3/194703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Channel Islands

26. Agarwal, Geetanjali. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .

Degree: 2018, California State University – Channel Islands

 Digital imaging has experienced tremendous growth in recent decades, and have been used in a growing number of applications. With such increasing popularity and the… (more)

Subjects/Keywords: Image recognition; Cyber security; Computer Science thesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Agarwal, G. (2018). Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . (Thesis). California State University – Channel Islands. Retrieved from http://hdl.handle.net/10211.3/207494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Agarwal, Geetanjali. “Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .” 2018. Thesis, California State University – Channel Islands. Accessed March 21, 2019. http://hdl.handle.net/10211.3/207494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Agarwal, Geetanjali. “Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .” 2018. Web. 21 Mar 2019.

Vancouver:

Agarwal G. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . [Internet] [Thesis]. California State University – Channel Islands; 2018. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/10211.3/207494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Agarwal G. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . [Thesis]. California State University – Channel Islands; 2018. Available from: http://hdl.handle.net/10211.3/207494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

27. Alhalali, Safoan. Real Time Dynamic State Estimation: Development and Application to Power System.

Degree: 2018, University of Waterloo

 Since the state estimation algorithm has been firstly proposed, considerable research interest has been shown in adapting and applying the different versions of this algorithm… (more)

Subjects/Keywords: State Estimation; Electrical distribution system; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alhalali, S. (2018). Real Time Dynamic State Estimation: Development and Application to Power System. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alhalali, Safoan. “Real Time Dynamic State Estimation: Development and Application to Power System.” 2018. Thesis, University of Waterloo. Accessed March 21, 2019. http://hdl.handle.net/10012/14057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alhalali, Safoan. “Real Time Dynamic State Estimation: Development and Application to Power System.” 2018. Web. 21 Mar 2019.

Vancouver:

Alhalali S. Real Time Dynamic State Estimation: Development and Application to Power System. [Internet] [Thesis]. University of Waterloo; 2018. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/10012/14057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alhalali S. Real Time Dynamic State Estimation: Development and Application to Power System. [Thesis]. University of Waterloo; 2018. Available from: http://hdl.handle.net/10012/14057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

28. Mukherjee, Subhojeet. Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Computer users are not safe, be it at home or in public places. Public networks are more often administered by trained individuals who attempt to… (more)

Subjects/Keywords: Cyber-security; Graph; Semantic; Grammar; Concept; NLP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mukherjee, S. (2018). Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/185622

Chicago Manual of Style (16th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A.” 2018. Masters Thesis, Colorado State University. Accessed March 21, 2019. http://hdl.handle.net/10217/185622.

MLA Handbook (7th Edition):

Mukherjee, Subhojeet. “Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A.” 2018. Web. 21 Mar 2019.

Vancouver:

Mukherjee S. Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/10217/185622.

Council of Science Editors:

Mukherjee S. Heuristic-based approach to automatically extract Personalized Attack Graph related concepts from vulnerability descriptions, A. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/185622


Rochester Institute of Technology

29. Imhof, Robert. Cyber crime and telecommunications law.

Degree: 2010, Rochester Institute of Technology

Cyber crime is a new and emerging area of concern for technology professionals, business leaders, and heads of government. This research takes a look at… (more)

Subjects/Keywords: Cyber crime; Hacker; Information; Law; Security; Sociology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Imhof, R. (2010). Cyber crime and telecommunications law. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Thesis, Rochester Institute of Technology. Accessed March 21, 2019. https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Imhof, Robert. “Cyber crime and telecommunications law.” 2010. Web. 21 Mar 2019.

Vancouver:

Imhof R. Cyber crime and telecommunications law. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 Mar 21]. Available from: https://scholarworks.rit.edu/theses/821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Imhof R. Cyber crime and telecommunications law. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

30. Guymon, Daniel Wade. Cyber-physical Algorithms for Enhancing Collaboration.

Degree: MS, Electrical and Computer Engineering, 2012, Virginia Tech

 The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people.… (more)

Subjects/Keywords: cyber-physical systems; mobile computing; smartphones; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guymon, D. W. (2012). Cyber-physical Algorithms for Enhancing Collaboration. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/31919

Chicago Manual of Style (16th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Masters Thesis, Virginia Tech. Accessed March 21, 2019. http://hdl.handle.net/10919/31919.

MLA Handbook (7th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Web. 21 Mar 2019.

Vancouver:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Internet] [Masters thesis]. Virginia Tech; 2012. [cited 2019 Mar 21]. Available from: http://hdl.handle.net/10919/31919.

Council of Science Editors:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Masters Thesis]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/31919

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

.