Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cyber). Showing records 1 – 30 of 1435 total matches.

[1] [2] [3] [4] [5] … [48]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Cranfield University

1. Lewis, P S. The global vulnerability discovery and disclosure system: a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system: a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665

Chicago Manual of Style (16th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed April 13, 2021. http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

MLA Handbook (7th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Web. 13 Apr 2021.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2021 Apr 13]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665


Cranfield University

2. Humphrey, M. Identifying the critical success factors to improve information security incident reporting.

Degree: 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Thesis). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Thesis, Cranfield University. Accessed April 13, 2021. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 13 Apr 2021.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Thesis]. Cranfield University; 2017. [cited 2021 Apr 13]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Thesis]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cranfield University

3. Humphrey, Mike. Identifying the critical success factors to improve information security incident reporting.

Degree: PhD, 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627

Chicago Manual of Style (16th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Doctoral Dissertation, Cranfield University. Accessed April 13, 2021. http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

MLA Handbook (7th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 13 Apr 2021.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2021 Apr 13]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627

4. Mazanec, Brian M. Norm Wars: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare .

Degree: 2014, George Mason University

 This study seeks to explain how constraining norms for cyber warfare—along with other emerging-technology weapons—are developing and will develop in the future. To do so,… (more)

Subjects/Keywords: cyber warfare

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mazanec, B. M. (2014). Norm Wars: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8938

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mazanec, Brian M. “Norm Wars: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare .” 2014. Thesis, George Mason University. Accessed April 13, 2021. http://hdl.handle.net/1920/8938.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mazanec, Brian M. “Norm Wars: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare .” 2014. Web. 13 Apr 2021.

Vancouver:

Mazanec BM. Norm Wars: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare . [Internet] [Thesis]. George Mason University; 2014. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/1920/8938.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mazanec BM. Norm Wars: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare . [Thesis]. George Mason University; 2014. Available from: http://hdl.handle.net/1920/8938

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. El Ouazzani, Saïd. Analyse des politiques publiques en matière d’adoption du cloud computing et du big data : une approche comparative des modèles français et marocain : Public policies analysis for cloud computing and big data adoption : comparative approach between French and Morrocan models.

Degree: Docteur es, Sciences politiques, 2016, Université Paris-Saclay (ComUE)

 Notre recherche repose sur l’analyse des politiques publiques françaises et marocaines en matière d’adoption des technologies du Cloud Computing et du Big Data. Nous avons… (more)

Subjects/Keywords: Cyber-État

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

El Ouazzani, S. (2016). Analyse des politiques publiques en matière d’adoption du cloud computing et du big data : une approche comparative des modèles français et marocain : Public policies analysis for cloud computing and big data adoption : comparative approach between French and Morrocan models. (Doctoral Dissertation). Université Paris-Saclay (ComUE). Retrieved from http://www.theses.fr/2016SACLE009

Chicago Manual of Style (16th Edition):

El Ouazzani, Saïd. “Analyse des politiques publiques en matière d’adoption du cloud computing et du big data : une approche comparative des modèles français et marocain : Public policies analysis for cloud computing and big data adoption : comparative approach between French and Morrocan models.” 2016. Doctoral Dissertation, Université Paris-Saclay (ComUE). Accessed April 13, 2021. http://www.theses.fr/2016SACLE009.

MLA Handbook (7th Edition):

El Ouazzani, Saïd. “Analyse des politiques publiques en matière d’adoption du cloud computing et du big data : une approche comparative des modèles français et marocain : Public policies analysis for cloud computing and big data adoption : comparative approach between French and Morrocan models.” 2016. Web. 13 Apr 2021.

Vancouver:

El Ouazzani S. Analyse des politiques publiques en matière d’adoption du cloud computing et du big data : une approche comparative des modèles français et marocain : Public policies analysis for cloud computing and big data adoption : comparative approach between French and Morrocan models. [Internet] [Doctoral dissertation]. Université Paris-Saclay (ComUE); 2016. [cited 2021 Apr 13]. Available from: http://www.theses.fr/2016SACLE009.

Council of Science Editors:

El Ouazzani S. Analyse des politiques publiques en matière d’adoption du cloud computing et du big data : une approche comparative des modèles français et marocain : Public policies analysis for cloud computing and big data adoption : comparative approach between French and Morrocan models. [Doctoral Dissertation]. Université Paris-Saclay (ComUE); 2016. Available from: http://www.theses.fr/2016SACLE009


California State University – Sacramento

6. Vyas, Mruga. Security issues in distributed energy resources (DER) in smart grid.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 One of the main goals of smart grid is to create a decentralized and consumer controlled power system which can increase efficiency, reliability and reduce… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vyas, M. (2011). Security issues in distributed energy resources (DER) in smart grid. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1229

Chicago Manual of Style (16th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Masters Thesis, California State University – Sacramento. Accessed April 13, 2021. http://hdl.handle.net/10211.9/1229.

MLA Handbook (7th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Web. 13 Apr 2021.

Vancouver:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/10211.9/1229.

Council of Science Editors:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1229


Delft University of Technology

7. Charalambous, Georgia (author). Development of Injected Code Attacks in Online Banking Fraud Incidents: An exploratory study for understanding the evolution of code used by cyber criminals in financial malware.

Degree: 2018, Delft University of Technology

The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code… (more)

Subjects/Keywords: malware analysis; Cyber Security; Cyber-attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Charalambous, G. (. (2018). Development of Injected Code Attacks in Online Banking Fraud Incidents: An exploratory study for understanding the evolution of code used by cyber criminals in financial malware. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:dd7ef146-1047-4067-a174-732aa5d2c317

Chicago Manual of Style (16th Edition):

Charalambous, Georgia (author). “Development of Injected Code Attacks in Online Banking Fraud Incidents: An exploratory study for understanding the evolution of code used by cyber criminals in financial malware.” 2018. Masters Thesis, Delft University of Technology. Accessed April 13, 2021. http://resolver.tudelft.nl/uuid:dd7ef146-1047-4067-a174-732aa5d2c317.

MLA Handbook (7th Edition):

Charalambous, Georgia (author). “Development of Injected Code Attacks in Online Banking Fraud Incidents: An exploratory study for understanding the evolution of code used by cyber criminals in financial malware.” 2018. Web. 13 Apr 2021.

Vancouver:

Charalambous G(. Development of Injected Code Attacks in Online Banking Fraud Incidents: An exploratory study for understanding the evolution of code used by cyber criminals in financial malware. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2021 Apr 13]. Available from: http://resolver.tudelft.nl/uuid:dd7ef146-1047-4067-a174-732aa5d2c317.

Council of Science Editors:

Charalambous G(. Development of Injected Code Attacks in Online Banking Fraud Incidents: An exploratory study for understanding the evolution of code used by cyber criminals in financial malware. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:dd7ef146-1047-4067-a174-732aa5d2c317


Texas State University – San Marcos

8. Siddique, Khan. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.

Degree: MS, Engineering, 2018, Texas State University – San Marcos

Cyber-Physical Systems (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered systems that integrate embedded computing technologies (cyber part)… (more)

Subjects/Keywords: Game theory; Cyber physical system; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Siddique, K. (2018). A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/9284

Chicago Manual of Style (16th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Masters Thesis, Texas State University – San Marcos. Accessed April 13, 2021. https://digital.library.txstate.edu/handle/10877/9284.

MLA Handbook (7th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Web. 13 Apr 2021.

Vancouver:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Internet] [Masters thesis]. Texas State University – San Marcos; 2018. [cited 2021 Apr 13]. Available from: https://digital.library.txstate.edu/handle/10877/9284.

Council of Science Editors:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Masters Thesis]. Texas State University – San Marcos; 2018. Available from: https://digital.library.txstate.edu/handle/10877/9284

9. Jusufovic, Almin. CYBERWAR - Det virtuella kriget.

Degree: 2014, , Faculty of Technology and Society (TS)

Syftet med denna uppsats är bland annat att utforska begreppet cyber-war. Cyber-attacker utgör stora hot mot infrastrukturen, datorstyrda system och nätverksbaserade tjänster, enligt tidigare… (more)

Subjects/Keywords: Cyber-war; Cyber-threat; Cyber-attack; Cyber-terrorism; Virtuella Attacker; Cyber krig; Virtuellt krig; Cyber war; Cyber threat; Cyber terrorism; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jusufovic, A. (2014). CYBERWAR - Det virtuella kriget. (Thesis). , Faculty of Technology and Society (TS). Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20276

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jusufovic, Almin. “CYBERWAR - Det virtuella kriget.” 2014. Thesis, , Faculty of Technology and Society (TS). Accessed April 13, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20276.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jusufovic, Almin. “CYBERWAR - Det virtuella kriget.” 2014. Web. 13 Apr 2021.

Vancouver:

Jusufovic A. CYBERWAR - Det virtuella kriget. [Internet] [Thesis]. , Faculty of Technology and Society (TS); 2014. [cited 2021 Apr 13]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20276.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jusufovic A. CYBERWAR - Det virtuella kriget. [Thesis]. , Faculty of Technology and Society (TS); 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20276

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

10. Niddodi, Chaitra Prasad. Secure integration of electric vehicles with the power grid.

Degree: MS, Computer Science, 2018, University of Illinois – Urbana-Champaign

 A wide variety of distributed energy resources (DERs) such as pluggable electric vehicles (EVs), solar arrays, smart buildings, etc. are now being connected to the… (more)

Subjects/Keywords: Cyber-Physical Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Niddodi, C. P. (2018). Secure integration of electric vehicles with the power grid. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/101372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Niddodi, Chaitra Prasad. “Secure integration of electric vehicles with the power grid.” 2018. Thesis, University of Illinois – Urbana-Champaign. Accessed April 13, 2021. http://hdl.handle.net/2142/101372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Niddodi, Chaitra Prasad. “Secure integration of electric vehicles with the power grid.” 2018. Web. 13 Apr 2021.

Vancouver:

Niddodi CP. Secure integration of electric vehicles with the power grid. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2018. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/2142/101372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Niddodi CP. Secure integration of electric vehicles with the power grid. [Thesis]. University of Illinois – Urbana-Champaign; 2018. Available from: http://hdl.handle.net/2142/101372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Royal Roads University

11. Neal, Patrick. Protecting the information society : exploring corporate decision makers’ attitudes towards active cyber defence as an online deterrence option .

Degree: 2019, Royal Roads University

 Protecting the Information Society consists of using passwords, firewalls, encryption, and educating end users on the safe internet security practices. Beginning in the 1990’s a… (more)

Subjects/Keywords: Active Cyber Defence; Cyber Crime; Cyber Deterrence; Cyber Warfare; Decision Making; Social Contract Theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Neal, P. (2019). Protecting the information society : exploring corporate decision makers’ attitudes towards active cyber defence as an online deterrence option . (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10613/11119

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Neal, Patrick. “Protecting the information society : exploring corporate decision makers’ attitudes towards active cyber defence as an online deterrence option .” 2019. Thesis, Royal Roads University. Accessed April 13, 2021. http://hdl.handle.net/10613/11119.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Neal, Patrick. “Protecting the information society : exploring corporate decision makers’ attitudes towards active cyber defence as an online deterrence option .” 2019. Web. 13 Apr 2021.

Vancouver:

Neal P. Protecting the information society : exploring corporate decision makers’ attitudes towards active cyber defence as an online deterrence option . [Internet] [Thesis]. Royal Roads University; 2019. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/10613/11119.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Neal P. Protecting the information society : exploring corporate decision makers’ attitudes towards active cyber defence as an online deterrence option . [Thesis]. Royal Roads University; 2019. Available from: http://hdl.handle.net/10613/11119

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

12. Gordon, Richard. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.

Degree: 2014, Victoria University of Wellington

Cyber-attacks present significant challenges to a modern, globalised world. Progressively used by criminal and terrorist organisations to attack or victimise non-state actors, governments are increasingly… (more)

Subjects/Keywords: Cyber; Privacy; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gordon, R. (2014). Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/3565

Chicago Manual of Style (16th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Masters Thesis, Victoria University of Wellington. Accessed April 13, 2021. http://hdl.handle.net/10063/3565.

MLA Handbook (7th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Web. 13 Apr 2021.

Vancouver:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Internet] [Masters thesis]. Victoria University of Wellington; 2014. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/10063/3565.

Council of Science Editors:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Masters Thesis]. Victoria University of Wellington; 2014. Available from: http://hdl.handle.net/10063/3565


Boise State University

13. Newell, Barry Edwin. Analysis of Cyber Incidents Between Dyadic Rivals.

Degree: 2016, Boise State University

Cyber conflict between states is a growing trend. There is a large body of research on cyber conflict, but there is very little quantitative analysis… (more)

Subjects/Keywords: cyber incident; cyber dispute; cyber conflict; cyberwarfare; cyber attack; dyadic rivalry; International Relations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Newell, B. E. (2016). Analysis of Cyber Incidents Between Dyadic Rivals. (Thesis). Boise State University. Retrieved from https://scholarworks.boisestate.edu/td/1133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Newell, Barry Edwin. “Analysis of Cyber Incidents Between Dyadic Rivals.” 2016. Thesis, Boise State University. Accessed April 13, 2021. https://scholarworks.boisestate.edu/td/1133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Newell, Barry Edwin. “Analysis of Cyber Incidents Between Dyadic Rivals.” 2016. Web. 13 Apr 2021.

Vancouver:

Newell BE. Analysis of Cyber Incidents Between Dyadic Rivals. [Internet] [Thesis]. Boise State University; 2016. [cited 2021 Apr 13]. Available from: https://scholarworks.boisestate.edu/td/1133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Newell BE. Analysis of Cyber Incidents Between Dyadic Rivals. [Thesis]. Boise State University; 2016. Available from: https://scholarworks.boisestate.edu/td/1133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Puttaroo, Mohammad Ally Rehaz. A behavioural study in runtime analysis environments and drive-by download attacks.

Degree: PhD, 2017, University of West London

 In the information age, the growth in availability of both technology and exploit kits have continuously contributed in a large volume of websites being compromised… (more)

Subjects/Keywords: Cyber security; Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puttaroo, M. A. R. (2017). A behavioural study in runtime analysis environments and drive-by download attacks. (Doctoral Dissertation). University of West London. Retrieved from https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802

Chicago Manual of Style (16th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Doctoral Dissertation, University of West London. Accessed April 13, 2021. https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

MLA Handbook (7th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Web. 13 Apr 2021.

Vancouver:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Internet] [Doctoral dissertation]. University of West London; 2017. [cited 2021 Apr 13]. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

Council of Science Editors:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Doctoral Dissertation]. University of West London; 2017. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802

15. Vakilinia, Iman. Collaborative Analysis of Cybersecurity Information Sharing.

Degree: 2019, University of Nevada – Reno

 As the complexity and number of cybersecurity incidents are growing, the traditional security measures are not enough to defend against attackers. In this situation, cyber(more)

Subjects/Keywords: Cyber-insurance; Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vakilinia, I. (2019). Collaborative Analysis of Cybersecurity Information Sharing. (Thesis). University of Nevada – Reno. Retrieved from http://hdl.handle.net/11714/5773

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vakilinia, Iman. “Collaborative Analysis of Cybersecurity Information Sharing.” 2019. Thesis, University of Nevada – Reno. Accessed April 13, 2021. http://hdl.handle.net/11714/5773.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vakilinia, Iman. “Collaborative Analysis of Cybersecurity Information Sharing.” 2019. Web. 13 Apr 2021.

Vancouver:

Vakilinia I. Collaborative Analysis of Cybersecurity Information Sharing. [Internet] [Thesis]. University of Nevada – Reno; 2019. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/11714/5773.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vakilinia I. Collaborative Analysis of Cybersecurity Information Sharing. [Thesis]. University of Nevada – Reno; 2019. Available from: http://hdl.handle.net/11714/5773

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

16. Moskal, Stephen Frank. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.

Degree: MS, Computer Engineering, 2016, Rochester Institute of Technology

  Computer networks are becoming more complex as the reliance on these network increases in this era of exponential technological growth. This makes the potential… (more)

Subjects/Keywords: Cyber attack behavior; Cyber attack modeling; Cyber threat analytics; Simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moskal, S. F. (2016). Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9216

Chicago Manual of Style (16th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed April 13, 2021. https://scholarworks.rit.edu/theses/9216.

MLA Handbook (7th Edition):

Moskal, Stephen Frank. “Knowledge-based Decision Making for Simulating Cyber Attack Behaviors.” 2016. Web. 13 Apr 2021.

Vancouver:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2021 Apr 13]. Available from: https://scholarworks.rit.edu/theses/9216.

Council of Science Editors:

Moskal SF. Knowledge-based Decision Making for Simulating Cyber Attack Behaviors. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9216


University of KwaZulu-Natal

17. Mthembu, Sibusisiwe Nothando. Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security.

Degree: 2019, University of KwaZulu-Natal

 Modern shipping companies are reliant on the proliferation of refined technological advancements such as Electric Chart Display and Information Systems (ECDIS), Automatic Identification System (AIS),… (more)

Subjects/Keywords: Maritime cyber security.; Icefog.; Malware.; Phishing.; Cyber-attacks.; Cyber threats.; Cybercrimes.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mthembu, S. N. (2019). Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security. (Thesis). University of KwaZulu-Natal. Retrieved from https://researchspace.ukzn.ac.za/handle/10413/18627

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mthembu, Sibusisiwe Nothando. “Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security.” 2019. Thesis, University of KwaZulu-Natal. Accessed April 13, 2021. https://researchspace.ukzn.ac.za/handle/10413/18627.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mthembu, Sibusisiwe Nothando. “Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security.” 2019. Web. 13 Apr 2021.

Vancouver:

Mthembu SN. Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security. [Internet] [Thesis]. University of KwaZulu-Natal; 2019. [cited 2021 Apr 13]. Available from: https://researchspace.ukzn.ac.za/handle/10413/18627.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mthembu SN. Navigating the complex maritime cyber regime: a review of the international and domestic regulatory framework on maritime cyber security. [Thesis]. University of KwaZulu-Natal; 2019. Available from: https://researchspace.ukzn.ac.za/handle/10413/18627

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rice University

18. Dressler, Judson. Analyzing the use of Cyber in Warfare at the Strategic, Operational, and Tactical Levels.

Degree: PhD, Engineering, 2015, Rice University

 The United States relies on networked computing for all manner of economic, social, and civic activity. However, cyberspace also presents potential adversaries with an avenue… (more)

Subjects/Keywords: Cyber Warfare; Cyber Domain; Cyber Situational Awareness; OpSec; Social Media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dressler, J. (2015). Analyzing the use of Cyber in Warfare at the Strategic, Operational, and Tactical Levels. (Doctoral Dissertation). Rice University. Retrieved from http://hdl.handle.net/1911/88340

Chicago Manual of Style (16th Edition):

Dressler, Judson. “Analyzing the use of Cyber in Warfare at the Strategic, Operational, and Tactical Levels.” 2015. Doctoral Dissertation, Rice University. Accessed April 13, 2021. http://hdl.handle.net/1911/88340.

MLA Handbook (7th Edition):

Dressler, Judson. “Analyzing the use of Cyber in Warfare at the Strategic, Operational, and Tactical Levels.” 2015. Web. 13 Apr 2021.

Vancouver:

Dressler J. Analyzing the use of Cyber in Warfare at the Strategic, Operational, and Tactical Levels. [Internet] [Doctoral dissertation]. Rice University; 2015. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/1911/88340.

Council of Science Editors:

Dressler J. Analyzing the use of Cyber in Warfare at the Strategic, Operational, and Tactical Levels. [Doctoral Dissertation]. Rice University; 2015. Available from: http://hdl.handle.net/1911/88340


Delft University of Technology

19. Verkerke, A.T. (author). Towards a cyber approach for large organisations.

Degree: 2015, Delft University of Technology

 Participation in cyberspace is of key importance for large organisations (and the functioning of our society), but to participate responsibly a comprehensive cyber approach is… (more)

Subjects/Keywords: cyber security; standards; cyber resilience; cyber governance; risk management; situational awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verkerke, A. T. (. (2015). Towards a cyber approach for large organisations. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

Chicago Manual of Style (16th Edition):

Verkerke, A T (author). “Towards a cyber approach for large organisations.” 2015. Masters Thesis, Delft University of Technology. Accessed April 13, 2021. http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

MLA Handbook (7th Edition):

Verkerke, A T (author). “Towards a cyber approach for large organisations.” 2015. Web. 13 Apr 2021.

Vancouver:

Verkerke AT(. Towards a cyber approach for large organisations. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2021 Apr 13]. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

Council of Science Editors:

Verkerke AT(. Towards a cyber approach for large organisations. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e


University of Waterloo

20. Engli, Francis William. Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks.

Degree: 2020, University of Waterloo

 China and Russia have increased their pursuit of using cyber attacks as an offensive tool in overall state strategy. China pursues passive cyber attacks while… (more)

Subjects/Keywords: Active Cyber Attack; Passive Cyber Attack; Cyber Strategy; China; Russia

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Engli, F. W. (2020). Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/16440

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Engli, Francis William. “Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks.” 2020. Thesis, University of Waterloo. Accessed April 13, 2021. http://hdl.handle.net/10012/16440.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Engli, Francis William. “Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks.” 2020. Web. 13 Apr 2021.

Vancouver:

Engli FW. Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks. [Internet] [Thesis]. University of Waterloo; 2020. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/10012/16440.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Engli FW. Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks. [Thesis]. University of Waterloo; 2020. Available from: http://hdl.handle.net/10012/16440

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. MEYER, WILLIAM. Cyberhot 2000-talets största risk .

Degree: Chalmers tekniska högskola / Institutionen för mekanik och maritima vetenskaper, 2020, Chalmers University of Technology

 Det ökade antalet cyberattacker och incidenter på företag med anknytning till sjöfarten fick det globala organet för lagstiftning inom sjöfarten, IMO, att ta ställning till… (more)

Subjects/Keywords: IMO; ISM; SMS; Cyber Risk Management; Cyber Security; Cyber Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MEYER, W. (2020). Cyberhot 2000-talets största risk . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/301879

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MEYER, WILLIAM. “Cyberhot 2000-talets största risk .” 2020. Thesis, Chalmers University of Technology. Accessed April 13, 2021. http://hdl.handle.net/20.500.12380/301879.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MEYER, WILLIAM. “Cyberhot 2000-talets största risk .” 2020. Web. 13 Apr 2021.

Vancouver:

MEYER W. Cyberhot 2000-talets största risk . [Internet] [Thesis]. Chalmers University of Technology; 2020. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/20.500.12380/301879.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MEYER W. Cyberhot 2000-talets största risk . [Thesis]. Chalmers University of Technology; 2020. Available from: http://hdl.handle.net/20.500.12380/301879

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

22. Andal, Stephenie Lois. Cyber Sovereignty: A New Vision in China .

Degree: 2018, University of Sydney

 Research on China’s strategy of cyber sovereignty to date has been inadequate, conceiving of the blueprint as a domestic Party censorship and surveillance mechanism, effectively… (more)

Subjects/Keywords: China; cyber sovereignty; Internet governance; cyber security; Hong Kong; cyber governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andal, S. L. (2018). Cyber Sovereignty: A New Vision in China . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Thesis, University of Sydney. Accessed April 13, 2021. http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Web. 13 Apr 2021.

Vancouver:

Andal SL. Cyber Sovereignty: A New Vision in China . [Internet] [Thesis]. University of Sydney; 2018. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andal SL. Cyber Sovereignty: A New Vision in China . [Thesis]. University of Sydney; 2018. Available from: http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

23. Novakovic, Kristina. The ethics of cyber-attacks: A language problem.

Degree: Humanities & Social Sciences, 2018, University of New South Wales

 A major debate within cyber ethics literature concerns the way in which the moral nature of cyber-attacks should be understood. The debate can be divided… (more)

Subjects/Keywords: cyber-attacks; ethics; cyber ethics; cybersecurity; just war theory; cyber war

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Novakovic, K. (2018). The ethics of cyber-attacks: A language problem. (Masters Thesis). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/60376 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51964/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Novakovic, Kristina. “The ethics of cyber-attacks: A language problem.” 2018. Masters Thesis, University of New South Wales. Accessed April 13, 2021. http://handle.unsw.edu.au/1959.4/60376 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51964/SOURCE02?view=true.

MLA Handbook (7th Edition):

Novakovic, Kristina. “The ethics of cyber-attacks: A language problem.” 2018. Web. 13 Apr 2021.

Vancouver:

Novakovic K. The ethics of cyber-attacks: A language problem. [Internet] [Masters thesis]. University of New South Wales; 2018. [cited 2021 Apr 13]. Available from: http://handle.unsw.edu.au/1959.4/60376 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51964/SOURCE02?view=true.

Council of Science Editors:

Novakovic K. The ethics of cyber-attacks: A language problem. [Masters Thesis]. University of New South Wales; 2018. Available from: http://handle.unsw.edu.au/1959.4/60376 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51964/SOURCE02?view=true


University of South Africa

24. Sissing, Shandre Kim. A criminological exploration of cyber stalking in South Africa .

Degree: 2013, University of South Africa

 The introduction of cyber technology, accompanied by its fast developing nature, has not only resulted in numerous advantages to its user and society as a… (more)

Subjects/Keywords: Cyber stalking; Vindictive cyber stalking; Composed cyber stalking; Intimate cyber stalking; Stalking; Cyber stalking victims; Social networks; Internet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sissing, S. K. (2013). A criminological exploration of cyber stalking in South Africa . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/13067

Chicago Manual of Style (16th Edition):

Sissing, Shandre Kim. “A criminological exploration of cyber stalking in South Africa .” 2013. Masters Thesis, University of South Africa. Accessed April 13, 2021. http://hdl.handle.net/10500/13067.

MLA Handbook (7th Edition):

Sissing, Shandre Kim. “A criminological exploration of cyber stalking in South Africa .” 2013. Web. 13 Apr 2021.

Vancouver:

Sissing SK. A criminological exploration of cyber stalking in South Africa . [Internet] [Masters thesis]. University of South Africa; 2013. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/10500/13067.

Council of Science Editors:

Sissing SK. A criminological exploration of cyber stalking in South Africa . [Masters Thesis]. University of South Africa; 2013. Available from: http://hdl.handle.net/10500/13067


Univerzitet u Beogradu

25. Mladenović, Dragan D. 1972-. Multidisciplinarni aspekti sajber ratovanja.

Degree: Fakultet organizacionih nauka, 2016, Univerzitet u Beogradu

Multidisciplinarne studije / pravne i računarske studije

Sajber ratovanje je ratovanje u sajber prostoru, zasnovano na primeni informacionokomunikacionih tehnologija. Ono predstavlja specifičan oblik međunarodnih sukoba,… (more)

Subjects/Keywords: cyberspace; cyber warfare; cyber attack; cyber weapon; cyberspace conflict; LOAC; international law

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mladenović, D. D. 1. (2016). Multidisciplinarni aspekti sajber ratovanja. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mladenović, Dragan D 1972-. “Multidisciplinarni aspekti sajber ratovanja.” 2016. Thesis, Univerzitet u Beogradu. Accessed April 13, 2021. https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mladenović, Dragan D 1972-. “Multidisciplinarni aspekti sajber ratovanja.” 2016. Web. 13 Apr 2021.

Vancouver:

Mladenović DD1. Multidisciplinarni aspekti sajber ratovanja. [Internet] [Thesis]. Univerzitet u Beogradu; 2016. [cited 2021 Apr 13]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mladenović DD1. Multidisciplinarni aspekti sajber ratovanja. [Thesis]. Univerzitet u Beogradu; 2016. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:13691/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Van De Sandt, Erik. Deviant security : the technical computer security practices of cyber criminals.

Degree: PhD, 2019, University of Bristol

 The dominant academic and practitioners' perspective on security evolves around law-abiding referent objects of security who are under attack by law-breaking threat agents. This study… (more)

Subjects/Keywords: 004; cyber crime; cyber security; cyber criminals; deviant security; investigations; police; law-enforcement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van De Sandt, E. (2019). Deviant security : the technical computer security practices of cyber criminals. (Doctoral Dissertation). University of Bristol. Retrieved from http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb

Chicago Manual of Style (16th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Doctoral Dissertation, University of Bristol. Accessed April 13, 2021. http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

MLA Handbook (7th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Web. 13 Apr 2021.

Vancouver:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

Council of Science Editors:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Doctoral Dissertation]. University of Bristol; 2019. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb


Delft University of Technology

27. Martinez Bustamante, Inés (author). Drivers and impediments for cyber insurance adoption among Dutch SMEs.

Degree: 2018, Delft University of Technology

Cyber security is getting more attention in the last decades. Unfortunately, the 100% cyber security protection is impractical and impossible, and therefore, we need to… (more)

Subjects/Keywords: cyber security; cyber risk; cyber insurance; qualitative study; protection motivation theory; Decision-Making

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martinez Bustamante, I. (. (2018). Drivers and impediments for cyber insurance adoption among Dutch SMEs. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4503fb87-2a46-4ea4-883a-6b48a4a345bc

Chicago Manual of Style (16th Edition):

Martinez Bustamante, Inés (author). “Drivers and impediments for cyber insurance adoption among Dutch SMEs.” 2018. Masters Thesis, Delft University of Technology. Accessed April 13, 2021. http://resolver.tudelft.nl/uuid:4503fb87-2a46-4ea4-883a-6b48a4a345bc.

MLA Handbook (7th Edition):

Martinez Bustamante, Inés (author). “Drivers and impediments for cyber insurance adoption among Dutch SMEs.” 2018. Web. 13 Apr 2021.

Vancouver:

Martinez Bustamante I(. Drivers and impediments for cyber insurance adoption among Dutch SMEs. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2021 Apr 13]. Available from: http://resolver.tudelft.nl/uuid:4503fb87-2a46-4ea4-883a-6b48a4a345bc.

Council of Science Editors:

Martinez Bustamante I(. Drivers and impediments for cyber insurance adoption among Dutch SMEs. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:4503fb87-2a46-4ea4-883a-6b48a4a345bc


University of Bristol

28. Hewlett, Emma M. Human detection of attacks against cyber-physical systems.

Degree: PhD, 2020, University of Bristol

Cyber attacks are a persistent threat that is continually evolving to match the technology landscape. This increasingly includes systems that incorporate physical components, including personal… (more)

Subjects/Keywords: Cyber security; Industrial Control Systems; Cyber Physical Systems; Cyber attacks; Human factors

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hewlett, E. M. (2020). Human detection of attacks against cyber-physical systems. (Doctoral Dissertation). University of Bristol. Retrieved from http://hdl.handle.net/1983/280cae8a-83c0-4b4f-aeba-1ad93e9e4f02

Chicago Manual of Style (16th Edition):

Hewlett, Emma M. “Human detection of attacks against cyber-physical systems.” 2020. Doctoral Dissertation, University of Bristol. Accessed April 13, 2021. http://hdl.handle.net/1983/280cae8a-83c0-4b4f-aeba-1ad93e9e4f02.

MLA Handbook (7th Edition):

Hewlett, Emma M. “Human detection of attacks against cyber-physical systems.” 2020. Web. 13 Apr 2021.

Vancouver:

Hewlett EM. Human detection of attacks against cyber-physical systems. [Internet] [Doctoral dissertation]. University of Bristol; 2020. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/1983/280cae8a-83c0-4b4f-aeba-1ad93e9e4f02.

Council of Science Editors:

Hewlett EM. Human detection of attacks against cyber-physical systems. [Doctoral Dissertation]. University of Bristol; 2020. Available from: http://hdl.handle.net/1983/280cae8a-83c0-4b4f-aeba-1ad93e9e4f02


University of Bristol

29. Van De Sandt, Erik. Deviant security : the technical computer security practices of cyber criminals.

Degree: PhD, 2019, University of Bristol

 The dominant academic and practitioners' perspective on security evolves around law-abiding referent objects of security who are under attack by law-breaking threat agents. This study… (more)

Subjects/Keywords: 004; cyber crime; cyber security; cyber criminals; deviant security; investigations; police; law-enforcement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van De Sandt, E. (2019). Deviant security : the technical computer security practices of cyber criminals. (Doctoral Dissertation). University of Bristol. Retrieved from https://research-information.bris.ac.uk/en/studentTheses/5159c595-b3a6-4908-8054-aadc3d948ebb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774525

Chicago Manual of Style (16th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Doctoral Dissertation, University of Bristol. Accessed April 13, 2021. https://research-information.bris.ac.uk/en/studentTheses/5159c595-b3a6-4908-8054-aadc3d948ebb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774525.

MLA Handbook (7th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Web. 13 Apr 2021.

Vancouver:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2021 Apr 13]. Available from: https://research-information.bris.ac.uk/en/studentTheses/5159c595-b3a6-4908-8054-aadc3d948ebb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774525.

Council of Science Editors:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Doctoral Dissertation]. University of Bristol; 2019. Available from: https://research-information.bris.ac.uk/en/studentTheses/5159c595-b3a6-4908-8054-aadc3d948ebb ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774525


University of Oxford

30. Akinrolabu, Olusola. Cyber supply chain risks in cloud computing : the effect of transparency on the risk assessment of SaaS applications.

Degree: PhD, 2020, University of Oxford

 While the cloud model has many economic and functional advantages, the increased external interactions of cloud applications have expanded the complexity of its architectures and… (more)

Subjects/Keywords: Computer science; Cyber Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akinrolabu, O. (2020). Cyber supply chain risks in cloud computing : the effect of transparency on the risk assessment of SaaS applications. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:44ae9da5-3a98-41b8-8905-958c5b08bcf7 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.800123

Chicago Manual of Style (16th Edition):

Akinrolabu, Olusola. “Cyber supply chain risks in cloud computing : the effect of transparency on the risk assessment of SaaS applications.” 2020. Doctoral Dissertation, University of Oxford. Accessed April 13, 2021. http://ora.ox.ac.uk/objects/uuid:44ae9da5-3a98-41b8-8905-958c5b08bcf7 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.800123.

MLA Handbook (7th Edition):

Akinrolabu, Olusola. “Cyber supply chain risks in cloud computing : the effect of transparency on the risk assessment of SaaS applications.” 2020. Web. 13 Apr 2021.

Vancouver:

Akinrolabu O. Cyber supply chain risks in cloud computing : the effect of transparency on the risk assessment of SaaS applications. [Internet] [Doctoral dissertation]. University of Oxford; 2020. [cited 2021 Apr 13]. Available from: http://ora.ox.ac.uk/objects/uuid:44ae9da5-3a98-41b8-8905-958c5b08bcf7 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.800123.

Council of Science Editors:

Akinrolabu O. Cyber supply chain risks in cloud computing : the effect of transparency on the risk assessment of SaaS applications. [Doctoral Dissertation]. University of Oxford; 2020. Available from: http://ora.ox.ac.uk/objects/uuid:44ae9da5-3a98-41b8-8905-958c5b08bcf7 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.800123

[1] [2] [3] [4] [5] … [48]

.