Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cybersecurity). Showing records 1 – 30 of 253 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Country

▼ Search Limiters


University of Plymouth

1. Alotaibi, Faisal Fahad G. Evaluation and enhancement of public cyber security awareness.

Degree: PhD, 2019, University of Plymouth

 With the spread of the Internet and the technology, Cyberspace has become the life of everyone, which requires them to be aware of the threats… (more)

Subjects/Keywords: Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alotaibi, F. F. G. (2019). Evaluation and enhancement of public cyber security awareness. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/14209

Chicago Manual of Style (16th Edition):

Alotaibi, Faisal Fahad G. “Evaluation and enhancement of public cyber security awareness.” 2019. Doctoral Dissertation, University of Plymouth. Accessed June 01, 2020. http://hdl.handle.net/10026.1/14209.

MLA Handbook (7th Edition):

Alotaibi, Faisal Fahad G. “Evaluation and enhancement of public cyber security awareness.” 2019. Web. 01 Jun 2020.

Vancouver:

Alotaibi FFG. Evaluation and enhancement of public cyber security awareness. [Internet] [Doctoral dissertation]. University of Plymouth; 2019. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10026.1/14209.

Council of Science Editors:

Alotaibi FFG. Evaluation and enhancement of public cyber security awareness. [Doctoral Dissertation]. University of Plymouth; 2019. Available from: http://hdl.handle.net/10026.1/14209


Nelson Mandela Metropolitan University

2. le Roux, Wickus. A framework to guide cybersecurity governance Efforts in Non-Profit Organisations.

Degree: 2019, Nelson Mandela Metropolitan University

 The average non-profit organisation is faced with the same cybersecurity challenges as an international multi-corporation that generates income. However, it may lack the competencies or… (more)

Subjects/Keywords: Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

le Roux, W. (2019). A framework to guide cybersecurity governance Efforts in Non-Profit Organisations. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/44544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

le Roux, Wickus. “A framework to guide cybersecurity governance Efforts in Non-Profit Organisations.” 2019. Thesis, Nelson Mandela Metropolitan University. Accessed June 01, 2020. http://hdl.handle.net/10948/44544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

le Roux, Wickus. “A framework to guide cybersecurity governance Efforts in Non-Profit Organisations.” 2019. Web. 01 Jun 2020.

Vancouver:

le Roux W. A framework to guide cybersecurity governance Efforts in Non-Profit Organisations. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2019. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10948/44544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

le Roux W. A framework to guide cybersecurity governance Efforts in Non-Profit Organisations. [Thesis]. Nelson Mandela Metropolitan University; 2019. Available from: http://hdl.handle.net/10948/44544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

3. Al-Barakat, Laith M. A testbed to simulate cyber attacks on nuclear power plants.

Degree: MS, 5183, 2012, University of Illinois – Urbana-Champaign

 Nuclear power plants are critical infrastructures that must be safe and secure from undesirable intrusions: these intrusions are both physical and cyber. The increasing usage… (more)

Subjects/Keywords: Nuclear; Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Barakat, L. M. (2012). A testbed to simulate cyber attacks on nuclear power plants. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/29718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al-Barakat, Laith M. “A testbed to simulate cyber attacks on nuclear power plants.” 2012. Thesis, University of Illinois – Urbana-Champaign. Accessed June 01, 2020. http://hdl.handle.net/2142/29718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al-Barakat, Laith M. “A testbed to simulate cyber attacks on nuclear power plants.” 2012. Web. 01 Jun 2020.

Vancouver:

Al-Barakat LM. A testbed to simulate cyber attacks on nuclear power plants. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/2142/29718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al-Barakat LM. A testbed to simulate cyber attacks on nuclear power plants. [Thesis]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/29718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

4. Abruzere, Damon F. Analysis of Information Security Risks with BIM Workflow.

Degree: M.S.A.S., Architecture, 2018, University of Florida

 This project was an exploration of the idea that the latest technology and processes being used in the construction, building, and engineering community are pushing… (more)

Subjects/Keywords: bim  – cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abruzere, D. F. (2018). Analysis of Information Security Risks with BIM Workflow. (Masters Thesis). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0054141

Chicago Manual of Style (16th Edition):

Abruzere, Damon F. “Analysis of Information Security Risks with BIM Workflow.” 2018. Masters Thesis, University of Florida. Accessed June 01, 2020. https://ufdc.ufl.edu/UFE0054141.

MLA Handbook (7th Edition):

Abruzere, Damon F. “Analysis of Information Security Risks with BIM Workflow.” 2018. Web. 01 Jun 2020.

Vancouver:

Abruzere DF. Analysis of Information Security Risks with BIM Workflow. [Internet] [Masters thesis]. University of Florida; 2018. [cited 2020 Jun 01]. Available from: https://ufdc.ufl.edu/UFE0054141.

Council of Science Editors:

Abruzere DF. Analysis of Information Security Risks with BIM Workflow. [Masters Thesis]. University of Florida; 2018. Available from: https://ufdc.ufl.edu/UFE0054141


University of Texas – Austin

5. Lambert, Timothy Michael. Enterprise platform systems management security threats and mitigation techniques.

Degree: MSin Engineering, Electrical and Computer engineering, 2016, University of Texas – Austin

 Developers and technologists of enterprise systems such as servers, storage and networking products must constantly anticipate new cybersecurity threats and evolving security requirements. These requirements… (more)

Subjects/Keywords: Enterprise platform cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lambert, T. M. (2016). Enterprise platform systems management security threats and mitigation techniques. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/46378

Chicago Manual of Style (16th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Masters Thesis, University of Texas – Austin. Accessed June 01, 2020. http://hdl.handle.net/2152/46378.

MLA Handbook (7th Edition):

Lambert, Timothy Michael. “Enterprise platform systems management security threats and mitigation techniques.” 2016. Web. 01 Jun 2020.

Vancouver:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Internet] [Masters thesis]. University of Texas – Austin; 2016. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/2152/46378.

Council of Science Editors:

Lambert TM. Enterprise platform systems management security threats and mitigation techniques. [Masters Thesis]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/46378

6. Spisak, Anthony. End-User: Security or Convenience.

Degree: 2017, Ferris State University

 The research will show the likelihood of end-users keeping employer or personal data safe. This research is shown in a flash drive drop experiment where… (more)

Subjects/Keywords: Cybersecurity.; Flash drives.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spisak, A. (2017). End-User: Security or Convenience. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6384

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Spisak, Anthony. “End-User: Security or Convenience.” 2017. Thesis, Ferris State University. Accessed June 01, 2020. http://hdl.handle.net/2323/6384.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Spisak, Anthony. “End-User: Security or Convenience.” 2017. Web. 01 Jun 2020.

Vancouver:

Spisak A. End-User: Security or Convenience. [Internet] [Thesis]. Ferris State University; 2017. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/2323/6384.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Spisak A. End-User: Security or Convenience. [Thesis]. Ferris State University; 2017. Available from: http://hdl.handle.net/2323/6384

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

7. Canann, Taylor. Essays in Applied and Computational Game Theory.

Degree: PhD, Economics, 2019, University of Minnesota

 This dissertation considers computational and applied aspects of cooperative and non-cooperative game theory. The first chapter discusses a novel applied game theory approach within the… (more)

Subjects/Keywords: Cybersecurity; Game Theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Canann, T. (2019). Essays in Applied and Computational Game Theory. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/206318

Chicago Manual of Style (16th Edition):

Canann, Taylor. “Essays in Applied and Computational Game Theory.” 2019. Doctoral Dissertation, University of Minnesota. Accessed June 01, 2020. http://hdl.handle.net/11299/206318.

MLA Handbook (7th Edition):

Canann, Taylor. “Essays in Applied and Computational Game Theory.” 2019. Web. 01 Jun 2020.

Vancouver:

Canann T. Essays in Applied and Computational Game Theory. [Internet] [Doctoral dissertation]. University of Minnesota; 2019. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/11299/206318.

Council of Science Editors:

Canann T. Essays in Applied and Computational Game Theory. [Doctoral Dissertation]. University of Minnesota; 2019. Available from: http://hdl.handle.net/11299/206318


University of Hawaii – Manoa

8. de Laura, Davey A. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.

Degree: 2016, University of Hawaii – Manoa

M.A. University of Hawaii at Manoa 2010.

This policy study analyzes and describes the environment and challenges related to United States cybersecurity policy. Chapter one… (more)

Subjects/Keywords: cybersecurity; cyberwar; hacker

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

de Laura, D. A. (2016). United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. (Thesis). University of Hawaii – Manoa. Retrieved from http://hdl.handle.net/10125/101601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

de Laura, Davey A. “United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.” 2016. Thesis, University of Hawaii – Manoa. Accessed June 01, 2020. http://hdl.handle.net/10125/101601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

de Laura, Davey A. “United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar.” 2016. Web. 01 Jun 2020.

Vancouver:

de Laura DA. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. [Internet] [Thesis]. University of Hawaii – Manoa; 2016. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10125/101601.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

de Laura DA. United States government cybersecurity policy : protecting critical infrastructures from malicious hacker attack methods and cyberwar. [Thesis]. University of Hawaii – Manoa; 2016. Available from: http://hdl.handle.net/10125/101601

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

9. Catota Quintana, Frankie. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.

Degree: 2016, Carnegie Mellon University

 When information technology is incorporated into the operations of financial critical infrastructure, it brings with it a range of cyber risks, and mitigating them requires… (more)

Subjects/Keywords: capacity building; cybersecurity capabilities; cybersecurity education; cybersecurity policy; developing nations; incident response

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Catota Quintana, F. (2016). Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/697

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Catota Quintana, Frankie. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Thesis, Carnegie Mellon University. Accessed June 01, 2020. http://repository.cmu.edu/dissertations/697.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Catota Quintana, Frankie. “Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation.” 2016. Web. 01 Jun 2020.

Vancouver:

Catota Quintana F. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2020 Jun 01]. Available from: http://repository.cmu.edu/dissertations/697.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Catota Quintana F. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/697

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

10. Offenberger, Spencer. Validating a concept inventory for cybersecurity.

Degree: MS, Electrical & Computer Engr, 2019, University of Illinois – Urbana-Champaign

 The validity of a concept inventory is imperative to its adoption by the education community. In this thesis, we evaluate the validity of the Cybersecurity(more)

Subjects/Keywords: Cybersecurity Education; Cybersecurity Assessment Tools (CATS) Project; Cybersecurity Concept Inventory (CCI); Assessment Validation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Offenberger, S. (2019). Validating a concept inventory for cybersecurity. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/104793

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Offenberger, Spencer. “Validating a concept inventory for cybersecurity.” 2019. Thesis, University of Illinois – Urbana-Champaign. Accessed June 01, 2020. http://hdl.handle.net/2142/104793.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Offenberger, Spencer. “Validating a concept inventory for cybersecurity.” 2019. Web. 01 Jun 2020.

Vancouver:

Offenberger S. Validating a concept inventory for cybersecurity. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2019. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/2142/104793.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Offenberger S. Validating a concept inventory for cybersecurity. [Thesis]. University of Illinois – Urbana-Champaign; 2019. Available from: http://hdl.handle.net/2142/104793

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

11. Trueba de Buen, Ana Martha. The Role of Cyberspace in Interstate Tensions and Conflicts.

Degree: 2016, Leiden University

 There are few inventions whose impact on political, economic and social life is comparable to that of the Internet, as an increasing number of functions… (more)

Subjects/Keywords: Cybersecurity; conflict; tensions; interstate; cyberspace

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trueba de Buen, A. M. (2016). The Role of Cyberspace in Interstate Tensions and Conflicts. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/42682

Chicago Manual of Style (16th Edition):

Trueba de Buen, Ana Martha. “The Role of Cyberspace in Interstate Tensions and Conflicts.” 2016. Masters Thesis, Leiden University. Accessed June 01, 2020. http://hdl.handle.net/1887/42682.

MLA Handbook (7th Edition):

Trueba de Buen, Ana Martha. “The Role of Cyberspace in Interstate Tensions and Conflicts.” 2016. Web. 01 Jun 2020.

Vancouver:

Trueba de Buen AM. The Role of Cyberspace in Interstate Tensions and Conflicts. [Internet] [Masters thesis]. Leiden University; 2016. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/1887/42682.

Council of Science Editors:

Trueba de Buen AM. The Role of Cyberspace in Interstate Tensions and Conflicts. [Masters Thesis]. Leiden University; 2016. Available from: http://hdl.handle.net/1887/42682


University of Oxford

12. Loughry, Joe. Security test and evaluation of cross domain systems.

Degree: PhD, 2014, University of Oxford

 In practicable multi-level secure systems it is necessary occasionally to transfer information in violation of security policy. Machines for doing this reliably and securely are… (more)

Subjects/Keywords: 005.8; Computer security; cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Loughry, J. (2014). Security test and evaluation of cross domain systems. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828

Chicago Manual of Style (16th Edition):

Loughry, Joe. “Security test and evaluation of cross domain systems.” 2014. Doctoral Dissertation, University of Oxford. Accessed June 01, 2020. http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828.

MLA Handbook (7th Edition):

Loughry, Joe. “Security test and evaluation of cross domain systems.” 2014. Web. 01 Jun 2020.

Vancouver:

Loughry J. Security test and evaluation of cross domain systems. [Internet] [Doctoral dissertation]. University of Oxford; 2014. [cited 2020 Jun 01]. Available from: http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828.

Council of Science Editors:

Loughry J. Security test and evaluation of cross domain systems. [Doctoral Dissertation]. University of Oxford; 2014. Available from: http://ora.ox.ac.uk/objects/uuid:71694222-3ef1-4fe6-9637-c8586798f352 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.711828


University of Ghana

13. Otoo, C.K. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.

Degree: 2016, University of Ghana

 In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex… (more)

Subjects/Keywords: Cybersecurity; National Security; Human Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Otoo, C. K. (2016). Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. (Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/27439

Chicago Manual of Style (16th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Masters Thesis, University of Ghana. Accessed June 01, 2020. http://ugspace.ug.edu.gh/handle/123456789/27439.

MLA Handbook (7th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Web. 01 Jun 2020.

Vancouver:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Internet] [Masters thesis]. University of Ghana; 2016. [cited 2020 Jun 01]. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439.

Council of Science Editors:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Masters Thesis]. University of Ghana; 2016. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439

14. Akbari Koochaksaraee, Amir. End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice .

Degree: 2019, University of Ottawa

 Security and privacy practices of end-users on social media are an important area of research, as well as a top-of-mind concern for individuals as well… (more)

Subjects/Keywords: Cybersecurity; Social Media; End-users

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akbari Koochaksaraee, A. (2019). End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/39310

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Akbari Koochaksaraee, Amir. “End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice .” 2019. Thesis, University of Ottawa. Accessed June 01, 2020. http://hdl.handle.net/10393/39310.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Akbari Koochaksaraee, Amir. “End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice .” 2019. Web. 01 Jun 2020.

Vancouver:

Akbari Koochaksaraee A. End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice . [Internet] [Thesis]. University of Ottawa; 2019. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10393/39310.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Akbari Koochaksaraee A. End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice . [Thesis]. University of Ottawa; 2019. Available from: http://hdl.handle.net/10393/39310

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Royal Roads University

15. Laur, Brandon. Information security’s perception of phishing tactics .

Degree: 2018, Royal Roads University

 This research develops qualitative knowledge from the information security industry about communication tactics as a type of security vulnerability in infosec. These perspectives included security… (more)

Subjects/Keywords: Cybersecurity; Hacking; Infosec; Phishing; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laur, B. (2018). Information security’s perception of phishing tactics . (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Thesis, Royal Roads University. Accessed June 01, 2020. http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Web. 01 Jun 2020.

Vancouver:

Laur B. Information security’s perception of phishing tactics . [Internet] [Thesis]. Royal Roads University; 2018. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laur B. Information security’s perception of phishing tactics . [Thesis]. Royal Roads University; 2018. Available from: http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

16. Mattina, Brendan Casey. MARCS: Mobile Augmented Reality for Cybersecurity.

Degree: MS, Electrical and Computer Engineering, 2017, Virginia Tech

 Network analysts have long used two-dimensional security visualizations to make sense of network data. As networks grow larger and more complex, two-dimensional visualizations become more… (more)

Subjects/Keywords: Augmented Reality; Cybersecurity; Visualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mattina, B. C. (2017). MARCS: Mobile Augmented Reality for Cybersecurity. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78220

Chicago Manual of Style (16th Edition):

Mattina, Brendan Casey. “MARCS: Mobile Augmented Reality for Cybersecurity.” 2017. Masters Thesis, Virginia Tech. Accessed June 01, 2020. http://hdl.handle.net/10919/78220.

MLA Handbook (7th Edition):

Mattina, Brendan Casey. “MARCS: Mobile Augmented Reality for Cybersecurity.” 2017. Web. 01 Jun 2020.

Vancouver:

Mattina BC. MARCS: Mobile Augmented Reality for Cybersecurity. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10919/78220.

Council of Science Editors:

Mattina BC. MARCS: Mobile Augmented Reality for Cybersecurity. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78220


University of Florida

17. Arceneaux, Phillip C. Information Intervention and the Need for a Social Cybersecurity Perspective The Power Struggle between Digital Diplomacy and Computational Propaganda.

Degree: PhD, Mass Communication - Journalism and Communications, 2019, University of Florida

 Where political communication scholarship of the 20th century was plagued with debates surrounding propaganda and public diplomacy, the 21st century is facing similar debates surrounding… (more)

Subjects/Keywords: cybersecurity  – disinformation  – internationallaw  – propaganda  – publicdiplomacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arceneaux, P. C. (2019). Information Intervention and the Need for a Social Cybersecurity Perspective The Power Struggle between Digital Diplomacy and Computational Propaganda. (Doctoral Dissertation). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0054265

Chicago Manual of Style (16th Edition):

Arceneaux, Phillip C. “Information Intervention and the Need for a Social Cybersecurity Perspective The Power Struggle between Digital Diplomacy and Computational Propaganda.” 2019. Doctoral Dissertation, University of Florida. Accessed June 01, 2020. https://ufdc.ufl.edu/UFE0054265.

MLA Handbook (7th Edition):

Arceneaux, Phillip C. “Information Intervention and the Need for a Social Cybersecurity Perspective The Power Struggle between Digital Diplomacy and Computational Propaganda.” 2019. Web. 01 Jun 2020.

Vancouver:

Arceneaux PC. Information Intervention and the Need for a Social Cybersecurity Perspective The Power Struggle between Digital Diplomacy and Computational Propaganda. [Internet] [Doctoral dissertation]. University of Florida; 2019. [cited 2020 Jun 01]. Available from: https://ufdc.ufl.edu/UFE0054265.

Council of Science Editors:

Arceneaux PC. Information Intervention and the Need for a Social Cybersecurity Perspective The Power Struggle between Digital Diplomacy and Computational Propaganda. [Doctoral Dissertation]. University of Florida; 2019. Available from: https://ufdc.ufl.edu/UFE0054265

18. Corin, Ricardo Javier. Analysis Models for Security Protocols.

Degree: 2006, University of Twente

 In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model. Each extension considers a more realistic setting, closer to the real… (more)

Subjects/Keywords: SCS-Cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Corin, R. J. (2006). Analysis Models for Security Protocols. (Doctoral Dissertation). University of Twente. Retrieved from https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html

Chicago Manual of Style (16th Edition):

Corin, Ricardo Javier. “Analysis Models for Security Protocols.” 2006. Doctoral Dissertation, University of Twente. Accessed June 01, 2020. https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html.

MLA Handbook (7th Edition):

Corin, Ricardo Javier. “Analysis Models for Security Protocols.” 2006. Web. 01 Jun 2020.

Vancouver:

Corin RJ. Analysis Models for Security Protocols. [Internet] [Doctoral dissertation]. University of Twente; 2006. [cited 2020 Jun 01]. Available from: https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html.

Council of Science Editors:

Corin RJ. Analysis Models for Security Protocols. [Doctoral Dissertation]. University of Twente; 2006. Available from: https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html ; urn:nbn:nl:ui:28-50892 ; 825feb67-8488-497b-b2e9-2772479ca4c4 ; urn:isbn:90-365-2279-X ; urn:nbn:nl:ui:28-50892 ; https://research.utwente.nl/en/publications/analysis-models-for-security-protocols(825feb67-8488-497b-b2e9-2772479ca4c4).html

19. Backman, Sarah. The institutionalization of cybersecurity management at the EU-Level : 2013-2016.

Degree: Swedish National Defence College, 2016, Swedish National Defence College

  International cybersecurity is arguably one of the most serious, complex and recent security-issues of our time. The connectivity between EU member states regarding cybersecurity(more)

Subjects/Keywords: EU cybersecurity management; EU; cybersecurity; institutionalization; neofunctionalism; the NIS-Directive

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Backman, S. (2016). The institutionalization of cybersecurity management at the EU-Level : 2013-2016. (Thesis). Swedish National Defence College. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Backman, Sarah. “The institutionalization of cybersecurity management at the EU-Level : 2013-2016.” 2016. Thesis, Swedish National Defence College. Accessed June 01, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Backman, Sarah. “The institutionalization of cybersecurity management at the EU-Level : 2013-2016.” 2016. Web. 01 Jun 2020.

Vancouver:

Backman S. The institutionalization of cybersecurity management at the EU-Level : 2013-2016. [Internet] [Thesis]. Swedish National Defence College; 2016. [cited 2020 Jun 01]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Backman S. The institutionalization of cybersecurity management at the EU-Level : 2013-2016. [Thesis]. Swedish National Defence College; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Kirkham, Andrew Nicholas. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.

Degree: 2016, Marquette University

 This thesis explores cybersecurity from the perspective of the Marquette University GasDay lab. We analyze three different areas of cybersecurity in three independent chapters. Our… (more)

Subjects/Keywords: cybersecurity; information security; penetration testing; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kirkham, A. N. (2016). Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. (Thesis). Marquette University. Retrieved from https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Thesis, Marquette University. Accessed June 01, 2020. https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Web. 01 Jun 2020.

Vancouver:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Internet] [Thesis]. Marquette University; 2016. [cited 2020 Jun 01]. Available from: https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Thesis]. Marquette University; 2016. Available from: https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

21. Belenguer, Iria. Current and future challenges in hacktivism regulation in the European Union.

Degree: 2014, Leiden University

 In the past five years, a variety of social movements have used the information and communication technologies (ICTs) in ways that were not foreseen in… (more)

Subjects/Keywords: Internet governance; Cybersecurity; Hacktivism; European Union

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belenguer, I. (2014). Current and future challenges in hacktivism regulation in the European Union. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/32293

Chicago Manual of Style (16th Edition):

Belenguer, Iria. “Current and future challenges in hacktivism regulation in the European Union.” 2014. Masters Thesis, Leiden University. Accessed June 01, 2020. http://hdl.handle.net/1887/32293.

MLA Handbook (7th Edition):

Belenguer, Iria. “Current and future challenges in hacktivism regulation in the European Union.” 2014. Web. 01 Jun 2020.

Vancouver:

Belenguer I. Current and future challenges in hacktivism regulation in the European Union. [Internet] [Masters thesis]. Leiden University; 2014. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/1887/32293.

Council of Science Editors:

Belenguer I. Current and future challenges in hacktivism regulation in the European Union. [Masters Thesis]. Leiden University; 2014. Available from: http://hdl.handle.net/1887/32293


Purdue University

22. Lerums, James Edward. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.

Degree: MS, Computer and Information Technology, 2016, Purdue University

 This thesis study introduces operational concepts for accelerating necessary cyber security improvements for critical infrastructure industrial control systems. National critical infrastructures’ industrial control systems experienced… (more)

Subjects/Keywords: Critical Infrastructure; Cybersecurity; Industrial Control Systems; Operationalization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lerums, J. E. (2016). Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Thesis, Purdue University. Accessed June 01, 2020. https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lerums, James Edward. “Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems.” 2016. Web. 01 Jun 2020.

Vancouver:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Jun 01]. Available from: https://docs.lib.purdue.edu/open_access_theses/1129.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lerums JE. Accelerating Cyber Security Improvements for Critical Infrastructure Industrial Control Systems. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/1129

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

23. Berman, Danielle. Public Opinion Regarding Autonomous Vehicle Privacy and Security.

Degree: 2018, Penn State University

 The purpose of this thesis was to investigate privacy concerns related to autonomous vehicles with a focus on peoples level of comfort with autonomous vehicles… (more)

Subjects/Keywords: autonomous vehicles; public opinion; survey; privacy; cybersecurity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Berman, D. (2018). Public Opinion Regarding Autonomous Vehicle Privacy and Security. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/15033dvb5358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Berman, Danielle. “Public Opinion Regarding Autonomous Vehicle Privacy and Security.” 2018. Thesis, Penn State University. Accessed June 01, 2020. https://etda.libraries.psu.edu/catalog/15033dvb5358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Berman, Danielle. “Public Opinion Regarding Autonomous Vehicle Privacy and Security.” 2018. Web. 01 Jun 2020.

Vancouver:

Berman D. Public Opinion Regarding Autonomous Vehicle Privacy and Security. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Jun 01]. Available from: https://etda.libraries.psu.edu/catalog/15033dvb5358.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Berman D. Public Opinion Regarding Autonomous Vehicle Privacy and Security. [Thesis]. Penn State University; 2018. Available from: https://etda.libraries.psu.edu/catalog/15033dvb5358

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

24. Shu, Xiaokui. Threat Detection in Program Execution and Data Movement: Theory and Practice.

Degree: PhD, Computer Science, 2016, Virginia Tech

 Program attacks are one of the oldest and fundamental cyber threats. They compromise the confidentiality of data, the integrity of program logic, and the availability… (more)

Subjects/Keywords: Cybersecurity; Program Anomaly Detection; Data Leak Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shu, X. (2016). Threat Detection in Program Execution and Data Movement: Theory and Practice. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/71463

Chicago Manual of Style (16th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Doctoral Dissertation, Virginia Tech. Accessed June 01, 2020. http://hdl.handle.net/10919/71463.

MLA Handbook (7th Edition):

Shu, Xiaokui. “Threat Detection in Program Execution and Data Movement: Theory and Practice.” 2016. Web. 01 Jun 2020.

Vancouver:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Internet] [Doctoral dissertation]. Virginia Tech; 2016. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10919/71463.

Council of Science Editors:

Shu X. Threat Detection in Program Execution and Data Movement: Theory and Practice. [Doctoral Dissertation]. Virginia Tech; 2016. Available from: http://hdl.handle.net/10919/71463

25. Toth, Samuel. Analyzing Binary Program Representation Through Evolution and Classification.

Degree: MS, Engineering and Applied Science: Computer Science, 2018, University of Cincinnati

 Binary Code is often represented in many different fashions- hex code, assembly, and even as '0's and '1's themselves. While this code is very useful… (more)

Subjects/Keywords: Computer Science; Genetic Algorithms; Cybersecurity; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Toth, S. (2018). Analyzing Binary Program Representation Through Evolution and Classification. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796

Chicago Manual of Style (16th Edition):

Toth, Samuel. “Analyzing Binary Program Representation Through Evolution and Classification.” 2018. Masters Thesis, University of Cincinnati. Accessed June 01, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796.

MLA Handbook (7th Edition):

Toth, Samuel. “Analyzing Binary Program Representation Through Evolution and Classification.” 2018. Web. 01 Jun 2020.

Vancouver:

Toth S. Analyzing Binary Program Representation Through Evolution and Classification. [Internet] [Masters thesis]. University of Cincinnati; 2018. [cited 2020 Jun 01]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796.

Council of Science Editors:

Toth S. Analyzing Binary Program Representation Through Evolution and Classification. [Masters Thesis]. University of Cincinnati; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1544000100127796


University of Waterloo

26. Bai, Zhenyu. A Machine Learning Approach for RDP-based Lateral Movement Detection.

Degree: 2019, University of Waterloo

 Detecting cyber threats has been an on-going research endeavor. In this era, advanced persistent threats (APTs) can incur significant costs for organizations and businesses. The… (more)

Subjects/Keywords: cybersecurity; machine learning; authentication; RDP; lateral movement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bai, Z. (2019). A Machine Learning Approach for RDP-based Lateral Movement Detection. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/15074

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bai, Zhenyu. “A Machine Learning Approach for RDP-based Lateral Movement Detection.” 2019. Thesis, University of Waterloo. Accessed June 01, 2020. http://hdl.handle.net/10012/15074.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bai, Zhenyu. “A Machine Learning Approach for RDP-based Lateral Movement Detection.” 2019. Web. 01 Jun 2020.

Vancouver:

Bai Z. A Machine Learning Approach for RDP-based Lateral Movement Detection. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/10012/15074.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bai Z. A Machine Learning Approach for RDP-based Lateral Movement Detection. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/15074

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Vazquez, Juan Carlos Barrera. The Influence of Demographic Factors on the Cybersecurity Awareness Level of Individuals in an Academic Environment.

Degree: MA -MA, Information Systems and Technology, 2019, York University

 Nowadays the notion of cybersecurity has claimed center stage in the daily life of individuals and organizations. Losses incurred to cyber-attacks are the result of… (more)

Subjects/Keywords: Educational technology; cybersecurity; information security; computer security; cybersecurity awareness; information security awareness; computer risk awareness; computer self awareness; cyber risk awareness; individual cybersecurity awareness; cybersecurity awareness in higher education.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vazquez, J. C. B. (2019). The Influence of Demographic Factors on the Cybersecurity Awareness Level of Individuals in an Academic Environment. (Masters Thesis). York University. Retrieved from https://yorkspace.library.yorku.ca/xmlui/handle/10315/36700

Chicago Manual of Style (16th Edition):

Vazquez, Juan Carlos Barrera. “The Influence of Demographic Factors on the Cybersecurity Awareness Level of Individuals in an Academic Environment.” 2019. Masters Thesis, York University. Accessed June 01, 2020. https://yorkspace.library.yorku.ca/xmlui/handle/10315/36700.

MLA Handbook (7th Edition):

Vazquez, Juan Carlos Barrera. “The Influence of Demographic Factors on the Cybersecurity Awareness Level of Individuals in an Academic Environment.” 2019. Web. 01 Jun 2020.

Vancouver:

Vazquez JCB. The Influence of Demographic Factors on the Cybersecurity Awareness Level of Individuals in an Academic Environment. [Internet] [Masters thesis]. York University; 2019. [cited 2020 Jun 01]. Available from: https://yorkspace.library.yorku.ca/xmlui/handle/10315/36700.

Council of Science Editors:

Vazquez JCB. The Influence of Demographic Factors on the Cybersecurity Awareness Level of Individuals in an Academic Environment. [Masters Thesis]. York University; 2019. Available from: https://yorkspace.library.yorku.ca/xmlui/handle/10315/36700

28. Cortes, Sarah Lewis. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.

Degree: PhD, Information Assurance Program, 2017, Northeastern University

 Recent events continue to expose the ability and commitment of Government Intelligence Agencies (GIAs) to conduct cross-border surveillance of the Internet. These revelations have significant… (more)

Subjects/Keywords: anonymity; cybersecurity; MLAT; privacy; surveillance; Tor

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cortes, S. L. (2017). Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20262326

Chicago Manual of Style (16th Edition):

Cortes, Sarah Lewis. “Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.” 2017. Doctoral Dissertation, Northeastern University. Accessed June 01, 2020. http://hdl.handle.net/2047/D20262326.

MLA Handbook (7th Edition):

Cortes, Sarah Lewis. “Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor.” 2017. Web. 01 Jun 2020.

Vancouver:

Cortes SL. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. [Internet] [Doctoral dissertation]. Northeastern University; 2017. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/2047/D20262326.

Council of Science Editors:

Cortes SL. Jurisdictional arbitrage: quantifying and counteracting the threat of government intelligence agencies against Tor. [Doctoral Dissertation]. Northeastern University; 2017. Available from: http://hdl.handle.net/2047/D20262326


Utah State University

29. Shirley, Brandon L. Developing and Securing Software for Small Space Systems.

Degree: PhD, Computer Science, 2019, Utah State University

  The space systems industry is moving towards smaller multi-vendor satellites, known as Small Space. This shift is driven by economic and technological factors that… (more)

Subjects/Keywords: space; software; cybersecurity; reuse; modularity; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shirley, B. L. (2019). Developing and Securing Software for Small Space Systems. (Doctoral Dissertation). Utah State University. Retrieved from https://digitalcommons.usu.edu/etd/7544

Chicago Manual of Style (16th Edition):

Shirley, Brandon L. “Developing and Securing Software for Small Space Systems.” 2019. Doctoral Dissertation, Utah State University. Accessed June 01, 2020. https://digitalcommons.usu.edu/etd/7544.

MLA Handbook (7th Edition):

Shirley, Brandon L. “Developing and Securing Software for Small Space Systems.” 2019. Web. 01 Jun 2020.

Vancouver:

Shirley BL. Developing and Securing Software for Small Space Systems. [Internet] [Doctoral dissertation]. Utah State University; 2019. [cited 2020 Jun 01]. Available from: https://digitalcommons.usu.edu/etd/7544.

Council of Science Editors:

Shirley BL. Developing and Securing Software for Small Space Systems. [Doctoral Dissertation]. Utah State University; 2019. Available from: https://digitalcommons.usu.edu/etd/7544

30. Nguyen Duy, Anh. Residential Wi-Fi Pentesting.

Degree: 2017, Ferris State University

 Wardriving is a technique used by cybercriminals to hack into wireless network (Wi-Fi) to steal information. The attacker drives around businesses to find Wi-Fi signals… (more)

Subjects/Keywords: Wardriving.; Cybersecurity.; Wireless networks.; Wi-fi.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen Duy, A. (2017). Residential Wi-Fi Pentesting. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6382

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nguyen Duy, Anh. “Residential Wi-Fi Pentesting.” 2017. Thesis, Ferris State University. Accessed June 01, 2020. http://hdl.handle.net/2323/6382.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nguyen Duy, Anh. “Residential Wi-Fi Pentesting.” 2017. Web. 01 Jun 2020.

Vancouver:

Nguyen Duy A. Residential Wi-Fi Pentesting. [Internet] [Thesis]. Ferris State University; 2017. [cited 2020 Jun 01]. Available from: http://hdl.handle.net/2323/6382.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nguyen Duy A. Residential Wi-Fi Pentesting. [Thesis]. Ferris State University; 2017. Available from: http://hdl.handle.net/2323/6382

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] [8] [9]

.