Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cybersecurity). Showing records 1 – 30 of 164 total matches.

[1] [2] [3] [4] [5] [6]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Country

▼ Search Limiters


University of Illinois – Urbana-Champaign

1. Al-Barakat, Laith M. A testbed to simulate cyber attacks on nuclear power plants.

Degree: MS, 5183, 2012, University of Illinois – Urbana-Champaign

 Nuclear power plants are critical infrastructures that must be safe and secure from undesirable intrusions: these intrusions are both physical and cyber. The increasing usage… (more)

Subjects/Keywords: Nuclear; Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Barakat, L. M. (2012). A testbed to simulate cyber attacks on nuclear power plants. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/29718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al-Barakat, Laith M. “A testbed to simulate cyber attacks on nuclear power plants.” 2012. Thesis, University of Illinois – Urbana-Champaign. Accessed April 22, 2019. http://hdl.handle.net/2142/29718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al-Barakat, Laith M. “A testbed to simulate cyber attacks on nuclear power plants.” 2012. Web. 22 Apr 2019.

Vancouver:

Al-Barakat LM. A testbed to simulate cyber attacks on nuclear power plants. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2012. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/2142/29718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al-Barakat LM. A testbed to simulate cyber attacks on nuclear power plants. [Thesis]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/29718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hawaii – Manoa

2. de Laura, Davey A. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.

Degree: 2016, University of Hawaii – Manoa

M.A. University of Hawaii at Manoa 2010.

This policy study analyzes and describes the environment and challenges related to United States cybersecurity policy. Chapter one… (more)

Subjects/Keywords: cybersecurity; cyberwar; hacker

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

de Laura, D. A. (2016). United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. (Thesis). University of Hawaii – Manoa. Retrieved from http://hdl.handle.net/10125/101601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

de Laura, Davey A. “United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.” 2016. Thesis, University of Hawaii – Manoa. Accessed April 22, 2019. http://hdl.handle.net/10125/101601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

de Laura, Davey A. “United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.” 2016. Web. 22 Apr 2019.

Vancouver:

de Laura DA. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. [Internet] [Thesis]. University of Hawaii – Manoa; 2016. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/10125/101601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

de Laura DA. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. [Thesis]. University of Hawaii – Manoa; 2016. Available from: http://hdl.handle.net/10125/101601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

3. Lambert, Timothy Michael. Enterprise platform systems management security threats and mitigation techniques.

Degree: Electrical and Computer Engineering, 2016, University of Texas – Austin

 Developers and technologists of enterprise systems such as servers, storage and networking products must constantly anticipate new cybersecurity threats and evolving security requirements. These requirements… (more)

Subjects/Keywords: Enterprise platform cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lambert, T. M. (2016). Enterprise platform systems management security threats and mitigation techniques. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/46378

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Thesis, University of Texas – Austin. Accessed April 22, 2019. http://hdl.handle.net/2152/46378.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Web. 22 Apr 2019.

Vancouver:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Internet] [Thesis]. University of Texas – Austin; 2016. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/2152/46378.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/46378

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

4. Lambert, Timothy Michael. Enterprise platform systems management security threats and mitigation techniques.

Degree: Electrical and Computer Engineering, 2016, University of Texas – Austin

 Developers and technologists of enterprise systems such as servers, storage and networking products must constantly anticipate new cybersecurity threats and evolving security requirements. These requirements… (more)

Subjects/Keywords: Enterprise platform cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lambert, T. M. (2016). Enterprise platform systems management security threats and mitigation techniques. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/46570

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Thesis, University of Texas – Austin. Accessed April 22, 2019. http://hdl.handle.net/2152/46570.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Web. 22 Apr 2019.

Vancouver:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Internet] [Thesis]. University of Texas – Austin; 2016. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/2152/46570.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/46570

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

5. Catota Quintana, Frankie. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.

Degree: 2016, Carnegie Mellon University

 When information technology is incorporated into the operations of financial critical infrastructure, it brings with it a range of cyber risks, and mitigating them requires… (more)

Subjects/Keywords: capacity building; cybersecurity capabilities; cybersecurity education; cybersecurity policy; developing nations; incident response

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Catota Quintana, F. (2016). Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/697

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Catota Quintana, Frankie. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Thesis, Carnegie Mellon University. Accessed April 22, 2019. http://repository.cmu.edu/dissertations/697.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Catota Quintana, Frankie. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Web. 22 Apr 2019.

Vancouver:

Catota Quintana F. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2019 Apr 22]. Available from: http://repository.cmu.edu/dissertations/697.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Catota Quintana F. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/697

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

6. Trueba de Buen, Ana Martha. The Role of Cyberspace in Interstate Tensions and Conflicts.

Degree: 2016, Leiden University

 There are few inventions whose impact on political, economic and social life is comparable to that of the Internet, as an increasing number of functions… (more)

Subjects/Keywords: Cybersecurity; conflict; tensions; interstate; cyberspace

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trueba de Buen, A. M. (2016). The Role of Cyberspace in Interstate Tensions and Conflicts. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/42682

Chicago Manual of Style (16th Edition):

Trueba de Buen, Ana Martha. “The Role of Cyberspace in Interstate Tensions and Conflicts.” 2016. Masters Thesis, Leiden University. Accessed April 22, 2019. http://hdl.handle.net/1887/42682.

MLA Handbook (7th Edition):

Trueba de Buen, Ana Martha. “The Role of Cyberspace in Interstate Tensions and Conflicts.” 2016. Web. 22 Apr 2019.

Vancouver:

Trueba de Buen AM. The Role of Cyberspace in Interstate Tensions and Conflicts. [Internet] [Masters thesis]. Leiden University; 2016. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/1887/42682.

Council of Science Editors:

Trueba de Buen AM. The Role of Cyberspace in Interstate Tensions and Conflicts. [Masters Thesis]. Leiden University; 2016. Available from: http://hdl.handle.net/1887/42682

7. Misiaszek, Lorenia. Training Material for the Regular Systems Administrator Facing a Breach .

Degree: 2017, California State University – San Marcos

 Although most of today's successful companies are well aware of common data security issues and put a great deal of efforts towards preventing a data… (more)

Subjects/Keywords: Cybersecurity; Digital Forensics; Data Breach

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Misiaszek, L. (2017). Training Material for the Regular Systems Administrator Facing a Breach . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.3/194745

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Misiaszek, Lorenia. “Training Material for the Regular Systems Administrator Facing a Breach .” 2017. Thesis, California State University – San Marcos. Accessed April 22, 2019. http://hdl.handle.net/10211.3/194745.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Misiaszek, Lorenia. “Training Material for the Regular Systems Administrator Facing a Breach .” 2017. Web. 22 Apr 2019.

Vancouver:

Misiaszek L. Training Material for the Regular Systems Administrator Facing a Breach . [Internet] [Thesis]. California State University – San Marcos; 2017. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/10211.3/194745.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Misiaszek L. Training Material for the Regular Systems Administrator Facing a Breach . [Thesis]. California State University – San Marcos; 2017. Available from: http://hdl.handle.net/10211.3/194745

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Civins, Braden Eph. In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate.

Degree: Global Policy Studies, 2011, University of Texas – Austin

 National discourse on cyberconflict has largely focused on defensive concerns, or protecting “critical infrastructure” from cyber threats. By contrast, the U.S. government’s employment of cyberattack… (more)

Subjects/Keywords: Cyberattack; Cybersecurity; Defense; National security

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Civins, B. E. (2011). In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate. (Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-08-4199

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Civins, Braden Eph. “In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate.” 2011. Thesis, University of Texas – Austin. Accessed April 22, 2019. http://hdl.handle.net/2152/ETD-UT-2011-08-4199.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Civins, Braden Eph. “In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate.” 2011. Web. 22 Apr 2019.

Vancouver:

Civins BE. In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate. [Internet] [Thesis]. University of Texas – Austin; 2011. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4199.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Civins BE. In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate. [Thesis]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4199

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ghana

9. Otoo, C.K. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.

Degree: 2016, University of Ghana

 In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex… (more)

Subjects/Keywords: Cybersecurity; National Security; Human Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Otoo, C. K. (2016). Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. (Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/27439

Chicago Manual of Style (16th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Masters Thesis, University of Ghana. Accessed April 22, 2019. http://ugspace.ug.edu.gh/handle/123456789/27439.

MLA Handbook (7th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Web. 22 Apr 2019.

Vancouver:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Internet] [Masters thesis]. University of Ghana; 2016. [cited 2019 Apr 22]. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439.

Council of Science Editors:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Masters Thesis]. University of Ghana; 2016. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439


Virginia Tech

10. Mattina, Brendan Casey. MARCS: Mobile Augmented Reality for Cybersecurity.

Degree: MS, Electrical and Computer Engineering, 2017, Virginia Tech

 Network analysts have long used two-dimensional security visualizations to make sense of network data. As networks grow larger and more complex, two-dimensional visualizations become more… (more)

Subjects/Keywords: Augmented Reality; Cybersecurity; Visualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mattina, B. C. (2017). MARCS: Mobile Augmented Reality for Cybersecurity. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78220

Chicago Manual of Style (16th Edition):

Mattina, Brendan Casey. “MARCS: Mobile Augmented Reality for Cybersecurity.” 2017. Masters Thesis, Virginia Tech. Accessed April 22, 2019. http://hdl.handle.net/10919/78220.

MLA Handbook (7th Edition):

Mattina, Brendan Casey. “MARCS: Mobile Augmented Reality for Cybersecurity.” 2017. Web. 22 Apr 2019.

Vancouver:

Mattina BC. MARCS: Mobile Augmented Reality for Cybersecurity. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/10919/78220.

Council of Science Editors:

Mattina BC. MARCS: Mobile Augmented Reality for Cybersecurity. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78220


Cal Poly

11. Padlipsky, Sarah. Using Offline Activities to Enhance Online Cybersecurity Education.

Degree: MS, Computer Science, 2018, Cal Poly

  Since the beginning of the 21st century, the United States has experienced the impact of a technological revolution. One effect of this technological revolution… (more)

Subjects/Keywords: education; cybersecurity; Engineering Education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Padlipsky, S. (2018). Using Offline Activities to Enhance Online Cybersecurity Education. (Masters Thesis). Cal Poly. Retrieved from https://digitalcommons.calpoly.edu/theses/1956

Chicago Manual of Style (16th Edition):

Padlipsky, Sarah. “Using Offline Activities to Enhance Online Cybersecurity Education.” 2018. Masters Thesis, Cal Poly. Accessed April 22, 2019. https://digitalcommons.calpoly.edu/theses/1956.

MLA Handbook (7th Edition):

Padlipsky, Sarah. “Using Offline Activities to Enhance Online Cybersecurity Education.” 2018. Web. 22 Apr 2019.

Vancouver:

Padlipsky S. Using Offline Activities to Enhance Online Cybersecurity Education. [Internet] [Masters thesis]. Cal Poly; 2018. [cited 2019 Apr 22]. Available from: https://digitalcommons.calpoly.edu/theses/1956.

Council of Science Editors:

Padlipsky S. Using Offline Activities to Enhance Online Cybersecurity Education. [Masters Thesis]. Cal Poly; 2018. Available from: https://digitalcommons.calpoly.edu/theses/1956

12. Backman, Sarah. The institutionalization of cybersecurity management at the EU-Level : 2013-2016.

Degree: Swedish National Defence College, 2016, Swedish National Defence College

  International cybersecurity is arguably one of the most serious, complex and recent security-issues of our time. The connectivity between EU member states regarding cybersecurity(more)

Subjects/Keywords: EU cybersecurity management; EU; cybersecurity; institutionalization; neofunctionalism; the NIS-Directive

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Backman, S. (2016). The institutionalization of cybersecurity management at the EU-Level : 2013-2016. (Thesis). Swedish National Defence College. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Backman, Sarah. “The institutionalization of cybersecurity management at the EU-Level : 2013-2016.” 2016. Thesis, Swedish National Defence College. Accessed April 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Backman, Sarah. “The institutionalization of cybersecurity management at the EU-Level : 2013-2016.” 2016. Web. 22 Apr 2019.

Vancouver:

Backman S. The institutionalization of cybersecurity management at the EU-Level : 2013-2016. [Internet] [Thesis]. Swedish National Defence College; 2016. [cited 2019 Apr 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Backman S. The institutionalization of cybersecurity management at the EU-Level : 2013-2016. [Thesis]. Swedish National Defence College; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

13. Belenguer, Iria. Current and future challenges in hacktivism regulation in the European Union.

Degree: 2014, Leiden University

 In the past five years, a variety of social movements have used the information and communication technologies (ICTs) in ways that were not foreseen in… (more)

Subjects/Keywords: Internet governance; Cybersecurity; Hacktivism; European Union

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belenguer, I. (2014). Current and future challenges in hacktivism regulation in the European Union. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/32293

Chicago Manual of Style (16th Edition):

Belenguer, Iria. “Current and future challenges in hacktivism regulation in the European Union.” 2014. Masters Thesis, Leiden University. Accessed April 22, 2019. http://hdl.handle.net/1887/32293.

MLA Handbook (7th Edition):

Belenguer, Iria. “Current and future challenges in hacktivism regulation in the European Union.” 2014. Web. 22 Apr 2019.

Vancouver:

Belenguer I. Current and future challenges in hacktivism regulation in the European Union. [Internet] [Masters thesis]. Leiden University; 2014. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/1887/32293.

Council of Science Editors:

Belenguer I. Current and future challenges in hacktivism regulation in the European Union. [Masters Thesis]. Leiden University; 2014. Available from: http://hdl.handle.net/1887/32293


Northeastern University

14. Cortes, Sarah Lewis. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.

Degree: PhD, Information Assurance Program, 2017, Northeastern University

 Recent events continue to expose the ability and commitment of Government Intelligence Agencies (GIAs) to conduct cross-border surveillance of the Internet. These revelations have significant… (more)

Subjects/Keywords: anonymity; cybersecurity; MLAT; privacy; surveillance; Tor

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cortes, S. L. (2017). Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20262326

Chicago Manual of Style (16th Edition):

Cortes, Sarah Lewis. “Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.” 2017. Doctoral Dissertation, Northeastern University. Accessed April 22, 2019. http://hdl.handle.net/2047/D20262326.

MLA Handbook (7th Edition):

Cortes, Sarah Lewis. “Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.” 2017. Web. 22 Apr 2019.

Vancouver:

Cortes SL. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. [Internet] [Doctoral dissertation]. Northeastern University; 2017. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/2047/D20262326.

Council of Science Editors:

Cortes SL. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. [Doctoral Dissertation]. Northeastern University; 2017. Available from: http://hdl.handle.net/2047/D20262326

15. Kirkham, Andrew Nicholas. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.

Degree: 2016, Marquette University

 This thesis explores cybersecurity from the perspective of the Marquette University GasDay lab. We analyze three different areas of cybersecurity in three independent chapters. Our… (more)

Subjects/Keywords: cybersecurity; information security; penetration testing; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kirkham, A. N. (2016). Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. (Thesis). Marquette University. Retrieved from https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Thesis, Marquette University. Accessed April 22, 2019. https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Web. 22 Apr 2019.

Vancouver:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Internet] [Thesis]. Marquette University; 2016. [cited 2019 Apr 22]. Available from: https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Thesis]. Marquette University; 2016. Available from: https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Clemson University

16. Islam, Md Mhafuzul. CVGuard: A Software Platform to Detect and Prevent Cybersecurity Attacks for V2I Applications.

Degree: MS, Civil Engineering, 2018, Clemson University

 A connected vehicle (CV) environment is composed of a diverse data collection, data communication and dissemination, and computing infrastructure systems that are vulnerable to the… (more)

Subjects/Keywords: Connected Vehicle; Cybersecurity; Vehicle to Infrastructure communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Islam, M. M. (2018). CVGuard: A Software Platform to Detect and Prevent Cybersecurity Attacks for V2I Applications. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/2933

Chicago Manual of Style (16th Edition):

Islam, Md Mhafuzul. “CVGuard: A Software Platform to Detect and Prevent Cybersecurity Attacks for V2I Applications.” 2018. Masters Thesis, Clemson University. Accessed April 22, 2019. https://tigerprints.clemson.edu/all_theses/2933.

MLA Handbook (7th Edition):

Islam, Md Mhafuzul. “CVGuard: A Software Platform to Detect and Prevent Cybersecurity Attacks for V2I Applications.” 2018. Web. 22 Apr 2019.

Vancouver:

Islam MM. CVGuard: A Software Platform to Detect and Prevent Cybersecurity Attacks for V2I Applications. [Internet] [Masters thesis]. Clemson University; 2018. [cited 2019 Apr 22]. Available from: https://tigerprints.clemson.edu/all_theses/2933.

Council of Science Editors:

Islam MM. CVGuard: A Software Platform to Detect and Prevent Cybersecurity Attacks for V2I Applications. [Masters Thesis]. Clemson University; 2018. Available from: https://tigerprints.clemson.edu/all_theses/2933


University of Cincinnati

17. Toth, Samuel. Analyzing Binary Program Representation Through Evolution and Classification.

Degree: MS, Engineering and Applied Science: Computer Science, 2018, University of Cincinnati

 Binary Code is often represented in many different fashions- hex code, assembly, and even as '0's and '1's themselves. While this code is very useful… (more)

Subjects/Keywords: Computer Science; Genetic Algorithms; Cybersecurity; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Toth, S. (2018). Analyzing Binary Program Representation Through Evolution and Classification. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796

Chicago Manual of Style (16th Edition):

Toth, Samuel. “Analyzing Binary Program Representation Through Evolution and Classification.” 2018. Masters Thesis, University of Cincinnati. Accessed April 22, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796.

MLA Handbook (7th Edition):

Toth, Samuel. “Analyzing Binary Program Representation Through Evolution and Classification.” 2018. Web. 22 Apr 2019.

Vancouver:

Toth S. Analyzing Binary Program Representation Through Evolution and Classification. [Internet] [Masters thesis]. University of Cincinnati; 2018. [cited 2019 Apr 22]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796.

Council of Science Editors:

Toth S. Analyzing Binary Program Representation Through Evolution and Classification. [Masters Thesis]. University of Cincinnati; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796


University of Adelaide

18. Gunn, Lachlan James. On the use of stochastic systems for sensing and security.

Degree: 2017, University of Adelaide

 No measurement system is perfect, and two varieties of error compete to frustrate their designers and operators. Random errors produce measurement-to-measurement to variation, while systematic… (more)

Subjects/Keywords: security; cybersecurity; signal processing; key establishment; statistics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gunn, L. J. (2017). On the use of stochastic systems for sensing and security. (Thesis). University of Adelaide. Retrieved from http://hdl.handle.net/2440/114545

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gunn, Lachlan James. “On the use of stochastic systems for sensing and security.” 2017. Thesis, University of Adelaide. Accessed April 22, 2019. http://hdl.handle.net/2440/114545.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gunn, Lachlan James. “On the use of stochastic systems for sensing and security.” 2017. Web. 22 Apr 2019.

Vancouver:

Gunn LJ. On the use of stochastic systems for sensing and security. [Internet] [Thesis]. University of Adelaide; 2017. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/2440/114545.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gunn LJ. On the use of stochastic systems for sensing and security. [Thesis]. University of Adelaide; 2017. Available from: http://hdl.handle.net/2440/114545

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

19. Lerums, James Edward. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.

Degree: MS, Computer and Information Technology, 2016, Purdue University

 This thesis study introduces operational concepts for accelerating necessary cyber security improvements for critical infrastructure industrial control systems. National critical infrastructures’ industrial control systems experienced… (more)

Subjects/Keywords: Critical Infrastructure; Cybersecurity; Industrial Control Systems; Operationalization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lerums, J. E. (2016). Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Thesis, Purdue University. Accessed April 22, 2019. https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Web. 22 Apr 2019.

Vancouver:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Internet] [Thesis]. Purdue University; 2016. [cited 2019 Apr 22]. Available from: https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

20. Berman, Danielle. Public Opinion Regarding Autonomous Vehicle Privacy and Security.

Degree: 2018, Penn State University

 The purpose of this thesis was to investigate privacy concerns related to autonomous vehicles with a focus on peoples level of comfort with autonomous vehicles… (more)

Subjects/Keywords: autonomous vehicles; public opinion; survey; privacy; cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Berman, D. (2018). Public Opinion Regarding Autonomous Vehicle Privacy and Security. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/15033dvb5358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Berman, Danielle. “Public Opinion Regarding Autonomous Vehicle Privacy and Security.” 2018. Thesis, Penn State University. Accessed April 22, 2019. https://etda.libraries.psu.edu/catalog/15033dvb5358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Berman, Danielle. “Public Opinion Regarding Autonomous Vehicle Privacy and Security.” 2018. Web. 22 Apr 2019.

Vancouver:

Berman D. Public Opinion Regarding Autonomous Vehicle Privacy and Security. [Internet] [Thesis]. Penn State University; 2018. [cited 2019 Apr 22]. Available from: https://etda.libraries.psu.edu/catalog/15033dvb5358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Berman D. Public Opinion Regarding Autonomous Vehicle Privacy and Security. [Thesis]. Penn State University; 2018. Available from: https://etda.libraries.psu.edu/catalog/15033dvb5358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

21. Shu, Xiaokui. Threat Detection in Program Execution and Data Movement: Theory and Practice.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Program attacks are one of the oldest and fundamental cyber threats. They compromise the confidentiality of data, the integrity of program logic, and the availability… (more)

Subjects/Keywords: Cybersecurity; Program Anomaly Detection; Data Leak Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shu, X. (2016). Threat Detection in Program Execution and Data Movement: Theory and Practice. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/71463

Chicago Manual of Style (16th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Doctoral Dissertation, Virginia Tech. Accessed April 22, 2019. http://hdl.handle.net/10919/71463.

MLA Handbook (7th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Web. 22 Apr 2019.

Vancouver:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/10919/71463.

Council of Science Editors:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/71463


Virginia Tech

22. Kobezak, Philip D. Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations.

Degree: MS, Electrical and Computer Engineering, 2018, Virginia Tech

 Challenges exist in higher education networks with host inventory and identification. Any student, staff, faculty, or dedicated IT administrator can be the primary responsible personnel… (more)

Subjects/Keywords: Cybersecurity; Log Analysis; Network Inventory; Host Inventory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kobezak, P. D. (2018). Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/83375

Chicago Manual of Style (16th Edition):

Kobezak, Philip D. “Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations.” 2018. Masters Thesis, Virginia Tech. Accessed April 22, 2019. http://hdl.handle.net/10919/83375.

MLA Handbook (7th Edition):

Kobezak, Philip D. “Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations.” 2018. Web. 22 Apr 2019.

Vancouver:

Kobezak PD. Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations. [Internet] [Masters thesis]. Virginia Tech; 2018. [cited 2019 Apr 22]. Available from: http://hdl.handle.net/10919/83375.

Council of Science Editors:

Kobezak PD. Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations. [Masters Thesis]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/83375


Cal Poly

23. Levitsky, David. Assessing Risk In IoT Devices.

Degree: MS, Computer Science, 2018, Cal Poly

  The explosive growth of the Internet of Things ecosystem has thrust these devices into the center of our lives. Unfortunately, the desire to create… (more)

Subjects/Keywords: cybersecurity; IoT; Computer Engineering; Risk Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Levitsky, D. (2018). Assessing Risk In IoT Devices. (Masters Thesis). Cal Poly. Retrieved from https://digitalcommons.calpoly.edu/theses/1954

Chicago Manual of Style (16th Edition):

Levitsky, David. “Assessing Risk In IoT Devices.” 2018. Masters Thesis, Cal Poly. Accessed April 22, 2019. https://digitalcommons.calpoly.edu/theses/1954.

MLA Handbook (7th Edition):

Levitsky, David. “Assessing Risk In IoT Devices.” 2018. Web. 22 Apr 2019.

Vancouver:

Levitsky D. Assessing Risk In IoT Devices. [Internet] [Masters thesis]. Cal Poly; 2018. [cited 2019 Apr 22]. Available from: https://digitalcommons.calpoly.edu/theses/1954.

Council of Science Editors:

Levitsky D. Assessing Risk In IoT Devices. [Masters Thesis]. Cal Poly; 2018. Available from: https://digitalcommons.calpoly.edu/theses/1954


Universidade Nova

24. Fernandes, Ana. Cybersecurity.

Degree: 2018, Universidade Nova

 This study focus on the perspective of cybersecurity in the financial services industry namely the Banking & Capital Markets, Insurance and Wealth & Asset Management… (more)

Subjects/Keywords: Cybersecurity; Financial services; Careless employees; Cybersecurity budget.; Domínio/Área Científica::Ciências Sociais::Economia e Gestão

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fernandes, A. (2018). Cybersecurity. (Thesis). Universidade Nova. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/36548

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fernandes, Ana. “Cybersecurity.” 2018. Thesis, Universidade Nova. Accessed April 22, 2019. https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/36548.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fernandes, Ana. “Cybersecurity.” 2018. Web. 22 Apr 2019.

Vancouver:

Fernandes A. Cybersecurity. [Internet] [Thesis]. Universidade Nova; 2018. [cited 2019 Apr 22]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/36548.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fernandes A. Cybersecurity. [Thesis]. Universidade Nova; 2018. Available from: https://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/36548

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Vienna

25. Alvear, Larenas Maria José. What are states’ strategic responses to cyberattacks?.

Degree: 2017, University of Vienna

Was sind die strategischen Reaktionen von Staaten auf Cyberattacken? Das ist die gestellte Forschungsfrage, die versucht das Reagieren von Staaten auf Cyberangriffe und die Auswirkungen… (more)

Subjects/Keywords: 70.99 Sozialwissenschaften allgemein: Sonstiges; Cyberattacken / Cybersecurity / Verteidigung / Internationale Beziehungen; cyberattacks / cybersecurity / defence / international relations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alvear, L. M. J. (2017). What are states’ strategic responses to cyberattacks?. (Thesis). University of Vienna. Retrieved from http://othes.univie.ac.at/47707/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alvear, Larenas Maria José. “What are states’ strategic responses to cyberattacks?.” 2017. Thesis, University of Vienna. Accessed April 22, 2019. http://othes.univie.ac.at/47707/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alvear, Larenas Maria José. “What are states’ strategic responses to cyberattacks?.” 2017. Web. 22 Apr 2019.

Vancouver:

Alvear LMJ. What are states’ strategic responses to cyberattacks?. [Internet] [Thesis]. University of Vienna; 2017. [cited 2019 Apr 22]. Available from: http://othes.univie.ac.at/47707/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alvear LMJ. What are states’ strategic responses to cyberattacks?. [Thesis]. University of Vienna; 2017. Available from: http://othes.univie.ac.at/47707/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Allen, Adrienne. In the Internet We Trust? Security Issues in Internet Governance.

Degree: 2014, Johns Hopkins University

 Underlying all military, political, and individual use of the Internet is trust. The ability of the Internet to live up to that trust is weakening,… (more)

Subjects/Keywords: Internet; governance; cybersecurity; trust; information technology; data breach; certificate authorities;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Allen, A. (2014). In the Internet We Trust? Security Issues in Internet Governance. (Thesis). Johns Hopkins University. Retrieved from http://jhir.library.jhu.edu/handle/1774.2/38146

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Allen, Adrienne. “In the Internet We Trust? Security Issues in Internet Governance.” 2014. Thesis, Johns Hopkins University. Accessed April 22, 2019. http://jhir.library.jhu.edu/handle/1774.2/38146.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Allen, Adrienne. “In the Internet We Trust? Security Issues in Internet Governance.” 2014. Web. 22 Apr 2019.

Vancouver:

Allen A. In the Internet We Trust? Security Issues in Internet Governance. [Internet] [Thesis]. Johns Hopkins University; 2014. [cited 2019 Apr 22]. Available from: http://jhir.library.jhu.edu/handle/1774.2/38146.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Allen A. In the Internet We Trust? Security Issues in Internet Governance. [Thesis]. Johns Hopkins University; 2014. Available from: http://jhir.library.jhu.edu/handle/1774.2/38146

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Kandikanti, Puneet Kumar Goud. Investigation on Security Issues and Features in Social Media Sites (Face Book, Twitter, & Google+).

Degree: MS, Computer Science, 2017, Governors State University

  Social media sites allow users to communicate and share their information which are a matter of privacy for users, so users should be aware… (more)

Subjects/Keywords: Google Plus; Facebook; cybersecurity; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kandikanti, P. K. G. (2017). Investigation on Security Issues and Features in Social Media Sites (Face Book, Twitter, & Google+). (Thesis). Governors State University. Retrieved from http://opus.govst.edu/theses/94

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kandikanti, Puneet Kumar Goud. “Investigation on Security Issues and Features in Social Media Sites (Face Book, Twitter, & Google+).” 2017. Thesis, Governors State University. Accessed April 22, 2019. http://opus.govst.edu/theses/94.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kandikanti, Puneet Kumar Goud. “Investigation on Security Issues and Features in Social Media Sites (Face Book, Twitter, & Google+).” 2017. Web. 22 Apr 2019.

Vancouver:

Kandikanti PKG. Investigation on Security Issues and Features in Social Media Sites (Face Book, Twitter, & Google+). [Internet] [Thesis]. Governors State University; 2017. [cited 2019 Apr 22]. Available from: http://opus.govst.edu/theses/94.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kandikanti PKG. Investigation on Security Issues and Features in Social Media Sites (Face Book, Twitter, & Google+). [Thesis]. Governors State University; 2017. Available from: http://opus.govst.edu/theses/94

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Michigan Technological University

28. Guo, Yonghe. CYBERDEFENSE FRAMEWORK FOR ELECTRICAL DISTRIBUTION GRID.

Degree: PhD, Department of Electrical and Computer Engineering, 2015, Michigan Technological University

  Protecting cyberinfrastructure has been the general security subject that is related to availability, integrity, secrecy, and accountability. Critical infrastructure, such as power grid, has… (more)

Subjects/Keywords: Cybersecurity; Distribution Grid; Power system; Electrical and Computer Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guo, Y. (2015). CYBERDEFENSE FRAMEWORK FOR ELECTRICAL DISTRIBUTION GRID. (Doctoral Dissertation). Michigan Technological University. Retrieved from http://digitalcommons.mtu.edu/etd-restricted/234

Chicago Manual of Style (16th Edition):

Guo, Yonghe. “CYBERDEFENSE FRAMEWORK FOR ELECTRICAL DISTRIBUTION GRID.” 2015. Doctoral Dissertation, Michigan Technological University. Accessed April 22, 2019. http://digitalcommons.mtu.edu/etd-restricted/234.

MLA Handbook (7th Edition):

Guo, Yonghe. “CYBERDEFENSE FRAMEWORK FOR ELECTRICAL DISTRIBUTION GRID.” 2015. Web. 22 Apr 2019.

Vancouver:

Guo Y. CYBERDEFENSE FRAMEWORK FOR ELECTRICAL DISTRIBUTION GRID. [Internet] [Doctoral dissertation]. Michigan Technological University; 2015. [cited 2019 Apr 22]. Available from: http://digitalcommons.mtu.edu/etd-restricted/234.

Council of Science Editors:

Guo Y. CYBERDEFENSE FRAMEWORK FOR ELECTRICAL DISTRIBUTION GRID. [Doctoral Dissertation]. Michigan Technological University; 2015. Available from: http://digitalcommons.mtu.edu/etd-restricted/234


University of California – San Diego

29. Dao, Duy Duc. Essays on the Role of Externalities in Information Goods.

Degree: Management, 2017, University of California – San Diego

 My dissertation explores how negative externalities can be profitably managedin the entertainment and software industry.In Chapter 1, I study a movie studio's pricing and channeling… (more)

Subjects/Keywords: Management; cybersecurity; digital goods; economics; movie release; patch management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dao, D. D. (2017). Essays on the Role of Externalities in Information Goods. (Thesis). University of California – San Diego. Retrieved from http://www.escholarship.org/uc/item/0sp021vd

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dao, Duy Duc. “Essays on the Role of Externalities in Information Goods.” 2017. Thesis, University of California – San Diego. Accessed April 22, 2019. http://www.escholarship.org/uc/item/0sp021vd.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dao, Duy Duc. “Essays on the Role of Externalities in Information Goods.” 2017. Web. 22 Apr 2019.

Vancouver:

Dao DD. Essays on the Role of Externalities in Information Goods. [Internet] [Thesis]. University of California – San Diego; 2017. [cited 2019 Apr 22]. Available from: http://www.escholarship.org/uc/item/0sp021vd.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dao DD. Essays on the Role of Externalities in Information Goods. [Thesis]. University of California – San Diego; 2017. Available from: http://www.escholarship.org/uc/item/0sp021vd

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of California – San Diego

30. Chachra, Neha. Understanding URL Abuse for Profit.

Degree: Computer Science, 2015, University of California – San Diego

 Large-scale online scam campaigns pose a significant security threat to casual Internet users. Attackers simultaneously abuse millions of URLs to swindle visitors by selling counterfeit… (more)

Subjects/Keywords: Computer science; affiliate marketing; blacklisting; cybersecurity; measurement; online fraud

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chachra, N. (2015). Understanding URL Abuse for Profit. (Thesis). University of California – San Diego. Retrieved from http://www.escholarship.org/uc/item/7nw0f6bf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chachra, Neha. “Understanding URL Abuse for Profit.” 2015. Thesis, University of California – San Diego. Accessed April 22, 2019. http://www.escholarship.org/uc/item/7nw0f6bf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chachra, Neha. “Understanding URL Abuse for Profit.” 2015. Web. 22 Apr 2019.

Vancouver:

Chachra N. Understanding URL Abuse for Profit. [Internet] [Thesis]. University of California – San Diego; 2015. [cited 2019 Apr 22]. Available from: http://www.escholarship.org/uc/item/7nw0f6bf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chachra N. Understanding URL Abuse for Profit. [Thesis]. University of California – San Diego; 2015. Available from: http://www.escholarship.org/uc/item/7nw0f6bf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6]

.