Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cybersecurity). Showing records 1 – 30 of 399 total matches.

[1] [2] [3] [4] [5] … [14]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Plymouth

1. Alotaibi, Faisal Fahad G. Evaluation and enhancement of public cyber security awareness.

Degree: PhD, 2019, University of Plymouth

 With the spread of the Internet and the technology, Cyberspace has become the life of everyone, which requires them to be aware of the threats… (more)

Subjects/Keywords: Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, F. F. G. (2019). Evaluation and enhancement of public cyber security awareness. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/14209

Chicago Manual of Style (16th Edition):

Alotaibi, Faisal Fahad G. “Evaluation and enhancement of public cyber security awareness.” 2019. Doctoral Dissertation, University of Plymouth. Accessed May 07, 2021. http://hdl.handle.net/10026.1/14209.

MLA Handbook (7th Edition):

Alotaibi, Faisal Fahad G. “Evaluation and enhancement of public cyber security awareness.” 2019. Web. 07 May 2021.

Vancouver:

Alotaibi FFG. Evaluation and enhancement of public cyber security awareness. [Internet] [Doctoral dissertation]. University of Plymouth; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/10026.1/14209.

Council of Science Editors:

Alotaibi FFG. Evaluation and enhancement of public cyber security awareness. [Doctoral Dissertation]. University of Plymouth; 2019. Available from: http://hdl.handle.net/10026.1/14209


Nelson Mandela Metropolitan University

2. le Roux, Wickus. A framework to guide cybersecurity governance Efforts in Non-Profit Organisations.

Degree: 2019, Nelson Mandela Metropolitan University

 The average non-profit organisation is faced with the same cybersecurity challenges as an international multi-corporation that generates income. However, it may lack the competencies or… (more)

Subjects/Keywords: Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

le Roux, W. (2019). A framework to guide cybersecurity governance Efforts in Non-Profit Organisations. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/44544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

le Roux, Wickus. “A framework to guide cybersecurity governance Efforts in Non-Profit Organisations.” 2019. Thesis, Nelson Mandela Metropolitan University. Accessed May 07, 2021. http://hdl.handle.net/10948/44544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

le Roux, Wickus. “A framework to guide cybersecurity governance Efforts in Non-Profit Organisations.” 2019. Web. 07 May 2021.

Vancouver:

le Roux W. A framework to guide cybersecurity governance Efforts in Non-Profit Organisations. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/10948/44544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

le Roux W. A framework to guide cybersecurity governance Efforts in Non-Profit Organisations. [Thesis]. Nelson Mandela Metropolitan University; 2019. Available from: http://hdl.handle.net/10948/44544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

3. Abruzere, Damon F. Analysis of Information Security Risks with BIM Workflow.

Degree: M.S.A.S., Architecture, 2018, University of Florida

 This project was an exploration of the idea that the latest technology and processes being used in the construction, building, and engineering community are pushing… (more)

Subjects/Keywords: bim  – cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abruzere, D. F. (2018). Analysis of Information Security Risks with BIM Workflow. (Masters Thesis). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0054141

Chicago Manual of Style (16th Edition):

Abruzere, Damon F. “Analysis of Information Security Risks with BIM Workflow.” 2018. Masters Thesis, University of Florida. Accessed May 07, 2021. https://ufdc.ufl.edu/UFE0054141.

MLA Handbook (7th Edition):

Abruzere, Damon F. “Analysis of Information Security Risks with BIM Workflow.” 2018. Web. 07 May 2021.

Vancouver:

Abruzere DF. Analysis of Information Security Risks with BIM Workflow. [Internet] [Masters thesis]. University of Florida; 2018. [cited 2021 May 07]. Available from: https://ufdc.ufl.edu/UFE0054141.

Council of Science Editors:

Abruzere DF. Analysis of Information Security Risks with BIM Workflow. [Masters Thesis]. University of Florida; 2018. Available from: https://ufdc.ufl.edu/UFE0054141


University of Illinois – Urbana-Champaign

4. Al-Barakat, Laith M. A testbed to simulate cyber attacks on nuclear power plants.

Degree: MS, 5183, 2012, University of Illinois – Urbana-Champaign

 Nuclear power plants are critical infrastructures that must be safe and secure from undesirable intrusions: these intrusions are both physical and cyber. The increasing usage… (more)

Subjects/Keywords: Nuclear; Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Barakat, L. M. (2012). A testbed to simulate cyber attacks on nuclear power plants. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/29718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al-Barakat, Laith M. “A testbed to simulate cyber attacks on nuclear power plants.” 2012. Thesis, University of Illinois – Urbana-Champaign. Accessed May 07, 2021. http://hdl.handle.net/2142/29718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al-Barakat, Laith M. “A testbed to simulate cyber attacks on nuclear power plants.” 2012. Web. 07 May 2021.

Vancouver:

Al-Barakat LM. A testbed to simulate cyber attacks on nuclear power plants. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2012. [cited 2021 May 07]. Available from: http://hdl.handle.net/2142/29718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al-Barakat LM. A testbed to simulate cyber attacks on nuclear power plants. [Thesis]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/29718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Saskatchewan

5. Sparling, David Albert. Cybersecurity at a Crossroads: Government Perceptions of Sino-Canadian Relations in a Digital Context.

Degree: 2021, University of Saskatchewan

 Over the past decade, cybersecurity has emerged as a key locus of national security policy. The importance of cybersecurity will only increase as states navigate… (more)

Subjects/Keywords: Cybersecurity; Canada-China

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sparling, D. A. (2021). Cybersecurity at a Crossroads: Government Perceptions of Sino-Canadian Relations in a Digital Context. (Thesis). University of Saskatchewan. Retrieved from http://hdl.handle.net/10388/13323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sparling, David Albert. “Cybersecurity at a Crossroads: Government Perceptions of Sino-Canadian Relations in a Digital Context.” 2021. Thesis, University of Saskatchewan. Accessed May 07, 2021. http://hdl.handle.net/10388/13323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sparling, David Albert. “Cybersecurity at a Crossroads: Government Perceptions of Sino-Canadian Relations in a Digital Context.” 2021. Web. 07 May 2021.

Vancouver:

Sparling DA. Cybersecurity at a Crossroads: Government Perceptions of Sino-Canadian Relations in a Digital Context. [Internet] [Thesis]. University of Saskatchewan; 2021. [cited 2021 May 07]. Available from: http://hdl.handle.net/10388/13323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sparling DA. Cybersecurity at a Crossroads: Government Perceptions of Sino-Canadian Relations in a Digital Context. [Thesis]. University of Saskatchewan; 2021. Available from: http://hdl.handle.net/10388/13323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Spisak, Anthony. End-User: Security or Convenience.

Degree: 2017, Ferris State University

 The research will show the likelihood of end-users keeping employer or personal data safe. This research is shown in a flash drive drop experiment where… (more)

Subjects/Keywords: Cybersecurity.; Flash drives.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spisak, A. (2017). End-User: Security or Convenience. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6384

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Spisak, Anthony. “End-User: Security or Convenience.” 2017. Thesis, Ferris State University. Accessed May 07, 2021. http://hdl.handle.net/2323/6384.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Spisak, Anthony. “End-User: Security or Convenience.” 2017. Web. 07 May 2021.

Vancouver:

Spisak A. End-User: Security or Convenience. [Internet] [Thesis]. Ferris State University; 2017. [cited 2021 May 07]. Available from: http://hdl.handle.net/2323/6384.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Spisak A. End-User: Security or Convenience. [Thesis]. Ferris State University; 2017. Available from: http://hdl.handle.net/2323/6384

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

7. Canann, Taylor. Essays in Applied and Computational Game Theory.

Degree: PhD, Economics, 2019, University of Minnesota

 This dissertation considers computational and applied aspects of cooperative and non-cooperative game theory. The first chapter discusses a novel applied game theory approach within the… (more)

Subjects/Keywords: Cybersecurity; Game Theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Canann, T. (2019). Essays in Applied and Computational Game Theory. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/206318

Chicago Manual of Style (16th Edition):

Canann, Taylor. “Essays in Applied and Computational Game Theory.” 2019. Doctoral Dissertation, University of Minnesota. Accessed May 07, 2021. http://hdl.handle.net/11299/206318.

MLA Handbook (7th Edition):

Canann, Taylor. “Essays in Applied and Computational Game Theory.” 2019. Web. 07 May 2021.

Vancouver:

Canann T. Essays in Applied and Computational Game Theory. [Internet] [Doctoral dissertation]. University of Minnesota; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/11299/206318.

Council of Science Editors:

Canann T. Essays in Applied and Computational Game Theory. [Doctoral Dissertation]. University of Minnesota; 2019. Available from: http://hdl.handle.net/11299/206318


University of Hawaii – Manoa

8. de Laura, Davey A. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.

Degree: 2016, University of Hawaii – Manoa

M.A. University of Hawaii at Manoa 2010.

This policy study analyzes and describes the environment and challenges related to United States cybersecurity policy. Chapter one… (more)

Subjects/Keywords: cybersecurity; cyberwar; hacker

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

de Laura, D. A. (2016). United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. (Thesis). University of Hawaii – Manoa. Retrieved from http://hdl.handle.net/10125/101601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

de Laura, Davey A. “United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.” 2016. Thesis, University of Hawaii – Manoa. Accessed May 07, 2021. http://hdl.handle.net/10125/101601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

de Laura, Davey A. “United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.” 2016. Web. 07 May 2021.

Vancouver:

de Laura DA. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. [Internet] [Thesis]. University of Hawaii – Manoa; 2016. [cited 2021 May 07]. Available from: http://hdl.handle.net/10125/101601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

de Laura DA. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. [Thesis]. University of Hawaii – Manoa; 2016. Available from: http://hdl.handle.net/10125/101601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

9. Lambert, Timothy Michael. Enterprise platform systems management security threats and mitigation techniques.

Degree: MSin Engineering, Electrical and Computer engineering, 2016, University of Texas – Austin

 Developers and technologists of enterprise systems such as servers, storage and networking products must constantly anticipate new cybersecurity threats and evolving security requirements. These requirements… (more)

Subjects/Keywords: Enterprise platform cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lambert, T. M. (2016). Enterprise platform systems management security threats and mitigation techniques. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/46378

Chicago Manual of Style (16th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Masters Thesis, University of Texas – Austin. Accessed May 07, 2021. http://hdl.handle.net/2152/46378.

MLA Handbook (7th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Web. 07 May 2021.

Vancouver:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Internet] [Masters thesis]. University of Texas – Austin; 2016. [cited 2021 May 07]. Available from: http://hdl.handle.net/2152/46378.

Council of Science Editors:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Masters Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/46378


University of Texas – Austin

10. Lambert, Timothy Michael. Enterprise platform systems management security threats and mitigation techniques.

Degree: MSin Engineering, Electrical and Computer engineering, 2016, University of Texas – Austin

 Developers and technologists of enterprise systems such as servers, storage and networking products must constantly anticipate new cybersecurity threats and evolving security requirements. These requirements… (more)

Subjects/Keywords: Enterprise platform cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lambert, T. M. (2016). Enterprise platform systems management security threats and mitigation techniques. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/46570

Chicago Manual of Style (16th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Masters Thesis, University of Texas – Austin. Accessed May 07, 2021. http://hdl.handle.net/2152/46570.

MLA Handbook (7th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Web. 07 May 2021.

Vancouver:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Internet] [Masters thesis]. University of Texas – Austin; 2016. [cited 2021 May 07]. Available from: http://hdl.handle.net/2152/46570.

Council of Science Editors:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Masters Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/46570

11. Vakilinia, Iman. Collaborative Analysis of Cybersecurity Information Sharing.

Degree: 2019, University of Nevada – Reno

 As the complexity and number of cybersecurity incidents are growing, the traditional security measures are not enough to defend against attackers. In this situation, cyber… (more)

Subjects/Keywords: Cyber-insurance; Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vakilinia, I. (2019). Collaborative Analysis of Cybersecurity Information Sharing. (Thesis). University of Nevada – Reno. Retrieved from http://hdl.handle.net/11714/5773

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vakilinia, Iman. “Collaborative Analysis of Cybersecurity Information Sharing.” 2019. Thesis, University of Nevada – Reno. Accessed May 07, 2021. http://hdl.handle.net/11714/5773.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vakilinia, Iman. “Collaborative Analysis of Cybersecurity Information Sharing.” 2019. Web. 07 May 2021.

Vancouver:

Vakilinia I. Collaborative Analysis of Cybersecurity Information Sharing. [Internet] [Thesis]. University of Nevada – Reno; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/11714/5773.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vakilinia I. Collaborative Analysis of Cybersecurity Information Sharing. [Thesis]. University of Nevada – Reno; 2019. Available from: http://hdl.handle.net/11714/5773

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Tipparach, Santipab. The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application.

Degree: 2019, North Dakota State University

 Virtual Reality is currently an affordable and consumer ready technology used by many in the games and interactive media industry, however unlike the user interface… (more)

Subjects/Keywords: cybersecurity; virtual reality

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tipparach, S. (2019). The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application. (Thesis). North Dakota State University. Retrieved from http://hdl.handle.net/10365/31720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tipparach, Santipab. “The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application.” 2019. Thesis, North Dakota State University. Accessed May 07, 2021. http://hdl.handle.net/10365/31720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tipparach, Santipab. “The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application.” 2019. Web. 07 May 2021.

Vancouver:

Tipparach S. The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application. [Internet] [Thesis]. North Dakota State University; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/10365/31720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tipparach S. The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application. [Thesis]. North Dakota State University; 2019. Available from: http://hdl.handle.net/10365/31720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

13. Catota Quintana, Frankie. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.

Degree: 2016, Carnegie Mellon University

 When information technology is incorporated into the operations of financial critical infrastructure, it brings with it a range of cyber risks, and mitigating them requires… (more)

Subjects/Keywords: capacity building; cybersecurity capabilities; cybersecurity education; cybersecurity policy; developing nations; incident response

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Catota Quintana, F. (2016). Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/697

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Catota Quintana, Frankie. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Thesis, Carnegie Mellon University. Accessed May 07, 2021. http://repository.cmu.edu/dissertations/697.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Catota Quintana, Frankie. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Web. 07 May 2021.

Vancouver:

Catota Quintana F. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2021 May 07]. Available from: http://repository.cmu.edu/dissertations/697.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Catota Quintana F. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/697

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

14. Offenberger, Spencer. Validating a concept inventory for cybersecurity.

Degree: MS, Electrical & Computer Engr, 2019, University of Illinois – Urbana-Champaign

 The validity of a concept inventory is imperative to its adoption by the education community. In this thesis, we evaluate the validity of the Cybersecurity(more)

Subjects/Keywords: Cybersecurity Education; Cybersecurity Assessment Tools (CATS) Project; Cybersecurity Concept Inventory (CCI); Assessment Validation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Offenberger, S. (2019). Validating a concept inventory for cybersecurity. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/104793

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Offenberger, Spencer. “Validating a concept inventory for cybersecurity.” 2019. Thesis, University of Illinois – Urbana-Champaign. Accessed May 07, 2021. http://hdl.handle.net/2142/104793.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Offenberger, Spencer. “Validating a concept inventory for cybersecurity.” 2019. Web. 07 May 2021.

Vancouver:

Offenberger S. Validating a concept inventory for cybersecurity. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/2142/104793.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Offenberger S. Validating a concept inventory for cybersecurity. [Thesis]. University of Illinois – Urbana-Champaign; 2019. Available from: http://hdl.handle.net/2142/104793

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

15. Trueba de Buen, Ana Martha. The Role of Cyberspace in Interstate Tensions and Conflicts.

Degree: 2016, Leiden University

 There are few inventions whose impact on political, economic and social life is comparable to that of the Internet, as an increasing number of functions… (more)

Subjects/Keywords: Cybersecurity; conflict; tensions; interstate; cyberspace

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trueba de Buen, A. M. (2016). The Role of Cyberspace in Interstate Tensions and Conflicts. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/42682

Chicago Manual of Style (16th Edition):

Trueba de Buen, Ana Martha. “The Role of Cyberspace in Interstate Tensions and Conflicts.” 2016. Masters Thesis, Leiden University. Accessed May 07, 2021. http://hdl.handle.net/1887/42682.

MLA Handbook (7th Edition):

Trueba de Buen, Ana Martha. “The Role of Cyberspace in Interstate Tensions and Conflicts.” 2016. Web. 07 May 2021.

Vancouver:

Trueba de Buen AM. The Role of Cyberspace in Interstate Tensions and Conflicts. [Internet] [Masters thesis]. Leiden University; 2016. [cited 2021 May 07]. Available from: http://hdl.handle.net/1887/42682.

Council of Science Editors:

Trueba de Buen AM. The Role of Cyberspace in Interstate Tensions and Conflicts. [Masters Thesis]. Leiden University; 2016. Available from: http://hdl.handle.net/1887/42682

16. Akbari Koochaksaraee, Amir. End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice .

Degree: 2019, University of Ottawa

 Security and privacy practices of end-users on social media are an important area of research, as well as a top-of-mind concern for individuals as well… (more)

Subjects/Keywords: Cybersecurity; Social Media; End-users

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akbari Koochaksaraee, A. (2019). End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/39310

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Akbari Koochaksaraee, Amir. “End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice .” 2019. Thesis, University of Ottawa. Accessed May 07, 2021. http://hdl.handle.net/10393/39310.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Akbari Koochaksaraee, Amir. “End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice .” 2019. Web. 07 May 2021.

Vancouver:

Akbari Koochaksaraee A. End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice . [Internet] [Thesis]. University of Ottawa; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/10393/39310.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Akbari Koochaksaraee A. End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice . [Thesis]. University of Ottawa; 2019. Available from: http://hdl.handle.net/10393/39310

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

17. Brands, Thijs (author). PaDAWaNS: Proactive Domain Abuse Warning and Notification System.

Degree: 2019, Delft University of Technology

The counterfeit market is rapidly expanding into the online realm. Large amounts of fraudulent webshops advertise luxury clothing and fashion accessories, but ship counterfeit products… (more)

Subjects/Keywords: fraud detection; cybersecurity; Internet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brands, T. (. (2019). PaDAWaNS: Proactive Domain Abuse Warning and Notification System. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:7c308b9f-37ff-43ac-bac3-58da4ad475a3

Chicago Manual of Style (16th Edition):

Brands, Thijs (author). “PaDAWaNS: Proactive Domain Abuse Warning and Notification System.” 2019. Masters Thesis, Delft University of Technology. Accessed May 07, 2021. http://resolver.tudelft.nl/uuid:7c308b9f-37ff-43ac-bac3-58da4ad475a3.

MLA Handbook (7th Edition):

Brands, Thijs (author). “PaDAWaNS: Proactive Domain Abuse Warning and Notification System.” 2019. Web. 07 May 2021.

Vancouver:

Brands T(. PaDAWaNS: Proactive Domain Abuse Warning and Notification System. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2021 May 07]. Available from: http://resolver.tudelft.nl/uuid:7c308b9f-37ff-43ac-bac3-58da4ad475a3.

Council of Science Editors:

Brands T(. PaDAWaNS: Proactive Domain Abuse Warning and Notification System. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:7c308b9f-37ff-43ac-bac3-58da4ad475a3


Univerzitet u Beogradu

18. Luknar, Ivana, 1984-, 37347687. Borba protiv kiberterorizma u strateškim dokumentima Republike Srbije.

Degree: Fakultet političkih nauka, 2020, Univerzitet u Beogradu

Političke nauke - Politička teorija, politička istorija i metodologija političkih nauka / Political science - Political theory, political history, methodology of political science

Savremeni tehnološki… (more)

Subjects/Keywords: cyberterrorism; cybersecurity; cybercriminal; internet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luknar, Ivana, 1984-, 3. (2020). Borba protiv kiberterorizma u strateškim dokumentima Republike Srbije. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:22374/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luknar, Ivana, 1984-, 37347687. “Borba protiv kiberterorizma u strateškim dokumentima Republike Srbije.” 2020. Thesis, Univerzitet u Beogradu. Accessed May 07, 2021. https://fedorabg.bg.ac.rs/fedora/get/o:22374/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luknar, Ivana, 1984-, 37347687. “Borba protiv kiberterorizma u strateškim dokumentima Republike Srbije.” 2020. Web. 07 May 2021.

Vancouver:

Luknar, Ivana, 1984- 3. Borba protiv kiberterorizma u strateškim dokumentima Republike Srbije. [Internet] [Thesis]. Univerzitet u Beogradu; 2020. [cited 2021 May 07]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:22374/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luknar, Ivana, 1984- 3. Borba protiv kiberterorizma u strateškim dokumentima Republike Srbije. [Thesis]. Univerzitet u Beogradu; 2020. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:22374/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ghana

19. Otoo, C.K. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.

Degree: 2016, University of Ghana

 In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex… (more)

Subjects/Keywords: Cybersecurity; National Security; Human Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Otoo, C. K. (2016). Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. (Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/27439

Chicago Manual of Style (16th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Masters Thesis, University of Ghana. Accessed May 07, 2021. http://ugspace.ug.edu.gh/handle/123456789/27439.

MLA Handbook (7th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Web. 07 May 2021.

Vancouver:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Internet] [Masters thesis]. University of Ghana; 2016. [cited 2021 May 07]. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439.

Council of Science Editors:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Masters Thesis]. University of Ghana; 2016. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439


Royal Roads University

20. Laur, Brandon. Information security’s perception of phishing tactics .

Degree: 2018, Royal Roads University

 This research develops qualitative knowledge from the information security industry about communication tactics as a type of security vulnerability in infosec. These perspectives included security… (more)

Subjects/Keywords: Cybersecurity; Hacking; Infosec; Phishing; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laur, B. (2018). Information security’s perception of phishing tactics . (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Thesis, Royal Roads University. Accessed May 07, 2021. http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Web. 07 May 2021.

Vancouver:

Laur B. Information security’s perception of phishing tactics . [Internet] [Thesis]. Royal Roads University; 2018. [cited 2021 May 07]. Available from: http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laur B. Information security’s perception of phishing tactics . [Thesis]. Royal Roads University; 2018. Available from: http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oxford

21. Loughry, Joe. Security test and evaluation of cross domain systems.

Degree: PhD, 2014, University of Oxford

 In practicable multi-level secure systems it is necessary occasionally to transfer information in violation of security policy. Machines for doing this reliably and securely are… (more)

Subjects/Keywords: 005.8; Computer security; cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Loughry, J. (2014). Security test and evaluation of cross domain systems. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828

Chicago Manual of Style (16th Edition):

Loughry, Joe. “Security test and evaluation of cross domain systems.” 2014. Doctoral Dissertation, University of Oxford. Accessed May 07, 2021. http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828.

MLA Handbook (7th Edition):

Loughry, Joe. “Security test and evaluation of cross domain systems.” 2014. Web. 07 May 2021.

Vancouver:

Loughry J. Security test and evaluation of cross domain systems. [Internet] [Doctoral dissertation]. University of Oxford; 2014. [cited 2021 May 07]. Available from: http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828.

Council of Science Editors:

Loughry J. Security test and evaluation of cross domain systems. [Doctoral Dissertation]. University of Oxford; 2014. Available from: http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828


Brigham Young University

22. Mercado, Jonathan M. Correlating Easily and Unobtrusively Queried Computer Characteristics to Number and Severity of Vulnerabilities.

Degree: MS, 2018, Brigham Young University

Cybersecurity has become a top-of-mind concern as the threat landscape expands and organizations continue to undergo digital transformation. As the industry confronts this growth, tools… (more)

Subjects/Keywords: cybersecurity; vulnerability; network; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mercado, J. M. (2018). Correlating Easily and Unobtrusively Queried Computer Characteristics to Number and Severity of Vulnerabilities. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=9830&context=etd

Chicago Manual of Style (16th Edition):

Mercado, Jonathan M. “Correlating Easily and Unobtrusively Queried Computer Characteristics to Number and Severity of Vulnerabilities.” 2018. Masters Thesis, Brigham Young University. Accessed May 07, 2021. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=9830&context=etd.

MLA Handbook (7th Edition):

Mercado, Jonathan M. “Correlating Easily and Unobtrusively Queried Computer Characteristics to Number and Severity of Vulnerabilities.” 2018. Web. 07 May 2021.

Vancouver:

Mercado JM. Correlating Easily and Unobtrusively Queried Computer Characteristics to Number and Severity of Vulnerabilities. [Internet] [Masters thesis]. Brigham Young University; 2018. [cited 2021 May 07]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=9830&context=etd.

Council of Science Editors:

Mercado JM. Correlating Easily and Unobtrusively Queried Computer Characteristics to Number and Severity of Vulnerabilities. [Masters Thesis]. Brigham Young University; 2018. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=9830&context=etd

23. Corin, Ricardo Javier. Analysis Models for Security Protocols.

Degree: 2006, University of Twente

 In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model. Each extension considers a more realistic setting, closer to the real… (more)

Subjects/Keywords: SCS-Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Corin, R. J. (2006). Analysis Models for Security Protocols. (Doctoral Dissertation). University of Twente. Retrieved from https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html

Chicago Manual of Style (16th Edition):

Corin, Ricardo Javier. “Analysis Models for Security Protocols.” 2006. Doctoral Dissertation, University of Twente. Accessed May 07, 2021. https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html.

MLA Handbook (7th Edition):

Corin, Ricardo Javier. “Analysis Models for Security Protocols.” 2006. Web. 07 May 2021.

Vancouver:

Corin RJ. Analysis Models for Security Protocols. [Internet] [Doctoral dissertation]. University of Twente; 2006. [cited 2021 May 07]. Available from: https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html.

Council of Science Editors:

Corin RJ. Analysis Models for Security Protocols. [Doctoral Dissertation]. University of Twente; 2006. Available from: https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html


Virginia Tech

24. Mattina, Brendan Casey. MARCS: Mobile Augmented Reality for Cybersecurity.

Degree: MS, Computer Engineering, 2017, Virginia Tech

 Network analysts have long used two-dimensional security visualizations to make sense of network data. As networks grow larger and more complex, two-dimensional visualizations become more… (more)

Subjects/Keywords: Augmented Reality; Cybersecurity; Visualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mattina, B. C. (2017). MARCS: Mobile Augmented Reality for Cybersecurity. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78220

Chicago Manual of Style (16th Edition):

Mattina, Brendan Casey. “MARCS: Mobile Augmented Reality for Cybersecurity.” 2017. Masters Thesis, Virginia Tech. Accessed May 07, 2021. http://hdl.handle.net/10919/78220.

MLA Handbook (7th Edition):

Mattina, Brendan Casey. “MARCS: Mobile Augmented Reality for Cybersecurity.” 2017. Web. 07 May 2021.

Vancouver:

Mattina BC. MARCS: Mobile Augmented Reality for Cybersecurity. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2021 May 07]. Available from: http://hdl.handle.net/10919/78220.

Council of Science Editors:

Mattina BC. MARCS: Mobile Augmented Reality for Cybersecurity. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78220

25. Civins, Braden Eph. In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate.

Degree: Doctor of Jurisprudence, Law, 2011, University of Texas – Austin

 National discourse on cyberconflict has largely focused on defensive concerns, or protecting “critical infrastructure” from cyber threats. By contrast, the U.S. government’s employment of cyberattack… (more)

Subjects/Keywords: Cyberattack; Cybersecurity; Defense; National security

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Civins, B. E. (2011). In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-08-4199

Chicago Manual of Style (16th Edition):

Civins, Braden Eph. “In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate.” 2011. Doctoral Dissertation, University of Texas – Austin. Accessed May 07, 2021. http://hdl.handle.net/2152/ETD-UT-2011-08-4199.

MLA Handbook (7th Edition):

Civins, Braden Eph. “In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate.” 2011. Web. 07 May 2021.

Vancouver:

Civins BE. In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2011. [cited 2021 May 07]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4199.

Council of Science Editors:

Civins BE. In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by and for the computer illiterate. [Doctoral Dissertation]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4199

26. Pillai, Athira. Web-Based Automated System for Cyber Analytics.

Degree: 2019, University of Nevada – Reno

 There have been many cyber attacks in recent years despite significant increases in security measures. This research aims to address the following research question: Can… (more)

Subjects/Keywords: Analytics; Cybersecurity; NLP; Web-Automation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pillai, A. (2019). Web-Based Automated System for Cyber Analytics. (Thesis). University of Nevada – Reno. Retrieved from http://hdl.handle.net/11714/6007

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pillai, Athira. “Web-Based Automated System for Cyber Analytics.” 2019. Thesis, University of Nevada – Reno. Accessed May 07, 2021. http://hdl.handle.net/11714/6007.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pillai, Athira. “Web-Based Automated System for Cyber Analytics.” 2019. Web. 07 May 2021.

Vancouver:

Pillai A. Web-Based Automated System for Cyber Analytics. [Internet] [Thesis]. University of Nevada – Reno; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/11714/6007.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pillai A. Web-Based Automated System for Cyber Analytics. [Thesis]. University of Nevada – Reno; 2019. Available from: http://hdl.handle.net/11714/6007

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Backman, Sarah. The institutionalization of cybersecurity management at the EU-Level : 2013-2016.

Degree: Swedish National Defence College, 2016, Swedish National Defence College

  International cybersecurity is arguably one of the most serious, complex and recent security-issues of our time. The connectivity between EU member states regarding cybersecurity(more)

Subjects/Keywords: EU cybersecurity management; EU; cybersecurity; institutionalization; neofunctionalism; the NIS-Directive

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Backman, S. (2016). The institutionalization of cybersecurity management at the EU-Level : 2013-2016. (Thesis). Swedish National Defence College. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Backman, Sarah. “The institutionalization of cybersecurity management at the EU-Level : 2013-2016.” 2016. Thesis, Swedish National Defence College. Accessed May 07, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Backman, Sarah. “The institutionalization of cybersecurity management at the EU-Level : 2013-2016.” 2016. Web. 07 May 2021.

Vancouver:

Backman S. The institutionalization of cybersecurity management at the EU-Level : 2013-2016. [Internet] [Thesis]. Swedish National Defence College; 2016. [cited 2021 May 07]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Backman S. The institutionalization of cybersecurity management at the EU-Level : 2013-2016. [Thesis]. Swedish National Defence College; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

28. Quintana, Frankie Catota. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.

Degree: Theses and Dissertations, 2016, Carnegie Mellon University

  When information technology is incorporated into the operations of financial critical infrastructure, it brings with it a range of cyber risks, and mitigating them… (more)

Subjects/Keywords: Engineering not elsewhere classified; Public Policy; capacity building; cybersecurity capabilities; cybersecurity education; cybersecurity policy; developing nations; incident response

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Quintana, F. C. (2016). Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. (Thesis). Carnegie Mellon University. Retrieved from http://hdl.handle.net/10.1184/r1/6715514.v1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Quintana, Frankie Catota. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Thesis, Carnegie Mellon University. Accessed May 07, 2021. http://hdl.handle.net/10.1184/r1/6715514.v1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Quintana, Frankie Catota. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Web. 07 May 2021.

Vancouver:

Quintana FC. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2021 May 07]. Available from: http://hdl.handle.net/10.1184/r1/6715514.v1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Quintana FC. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Thesis]. Carnegie Mellon University; 2016. Available from: http://hdl.handle.net/10.1184/r1/6715514.v1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

29. Bai, Zhenyu. A Machine Learning Approach for RDP-based Lateral Movement Detection.

Degree: 2019, University of Waterloo

 Detecting cyber threats has been an on-going research endeavor. In this era, advanced persistent threats (APTs) can incur significant costs for organizations and businesses. The… (more)

Subjects/Keywords: cybersecurity; machine learning; authentication; RDP; lateral movement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bai, Z. (2019). A Machine Learning Approach for RDP-based Lateral Movement Detection. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/15074

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bai, Zhenyu. “A Machine Learning Approach for RDP-based Lateral Movement Detection.” 2019. Thesis, University of Waterloo. Accessed May 07, 2021. http://hdl.handle.net/10012/15074.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bai, Zhenyu. “A Machine Learning Approach for RDP-based Lateral Movement Detection.” 2019. Web. 07 May 2021.

Vancouver:

Bai Z. A Machine Learning Approach for RDP-based Lateral Movement Detection. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2021 May 07]. Available from: http://hdl.handle.net/10012/15074.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bai Z. A Machine Learning Approach for RDP-based Lateral Movement Detection. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/15074

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

30. Berman, Danielle Hope. Public Opinion Regarding Autonomous Vehicle Privacy and Security.

Degree: 2018, Penn State University

 The purpose of this thesis was to investigate privacy concerns related to autonomous vehicles with a focus on people’s level of comfort with autonomous vehicles… (more)

Subjects/Keywords: autonomous vehicles; public opinion; survey; privacy; cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Berman, D. H. (2018). Public Opinion Regarding Autonomous Vehicle Privacy and Security. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15033dvb5358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Berman, Danielle Hope. “Public Opinion Regarding Autonomous Vehicle Privacy and Security.” 2018. Thesis, Penn State University. Accessed May 07, 2021. https://submit-etda.libraries.psu.edu/catalog/15033dvb5358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Berman, Danielle Hope. “Public Opinion Regarding Autonomous Vehicle Privacy and Security.” 2018. Web. 07 May 2021.

Vancouver:

Berman DH. Public Opinion Regarding Autonomous Vehicle Privacy and Security. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 May 07]. Available from: https://submit-etda.libraries.psu.edu/catalog/15033dvb5358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Berman DH. Public Opinion Regarding Autonomous Vehicle Privacy and Security. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15033dvb5358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [14]

.