Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Data Security). Showing records 1 – 30 of 1059 total matches.

[1] [2] [3] [4] [5] … [36]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Virginia Tech

1. Deng, Yipan. DeviceGuard: External Device-Assisted System And Data Security.

Degree: MS, Computer Science, 2011, Virginia Tech

 This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such… (more)

Subjects/Keywords: Host Security; System Security; Data Security; Smartphone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deng, Y. (2011). DeviceGuard: External Device-Assisted System And Data Security. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76767

Chicago Manual of Style (16th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Masters Thesis, Virginia Tech. Accessed October 16, 2019. http://hdl.handle.net/10919/76767.

MLA Handbook (7th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Web. 16 Oct 2019.

Vancouver:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10919/76767.

Council of Science Editors:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76767


Open Universiteit Nederland

2. Jacobs, Edson. To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? .

Degree: 2017, Open Universiteit Nederland

 Het doel van dit onderzoek is om na te gaan in hoeverre het binnen de Arubaanse overheidsdiensten mogelijk is data op smartphones van de medewerkers… (more)

Subjects/Keywords: Mobile Security; Cybercrime Data; Data Security; Enterprise Security Architect; Information Security; Organizational Data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacobs, E. (2017). To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/9563

Chicago Manual of Style (16th Edition):

Jacobs, Edson. “To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? .” 2017. Masters Thesis, Open Universiteit Nederland. Accessed October 16, 2019. http://hdl.handle.net/1820/9563.

MLA Handbook (7th Edition):

Jacobs, Edson. “To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? .” 2017. Web. 16 Oct 2019.

Vancouver:

Jacobs E. To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? . [Internet] [Masters thesis]. Open Universiteit Nederland; 2017. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/1820/9563.

Council of Science Editors:

Jacobs E. To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? . [Masters Thesis]. Open Universiteit Nederland; 2017. Available from: http://hdl.handle.net/1820/9563

3. Rawat, Umashankar. Secure and efficient distributed cryptographic file systems;.

Degree: Computer Science Engineering, 2013, Jaypee University of Engineering and Technology, Guna

The need for data security emerges from the widespread deployment of shared file systems, greater mobility of computers and the rapid miniaturization of storage devices.… (more)

Subjects/Keywords: Cryptography; Data Security; Distributed System; Linux Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawat, U. (2013). Secure and efficient distributed cryptographic file systems;. (Thesis). Jaypee University of Engineering and Technology, Guna. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Thesis, Jaypee University of Engineering and Technology, Guna. Accessed October 16, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Web. 16 Oct 2019.

Vancouver:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Internet] [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. [cited 2019 Oct 16]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

4. Bohlscheid, Hans-Michael. Social security data mining : an Australian case study.

Degree: 2013, University of Technology, Sydney

Data mining in business applications has become an increasingly recognized and accepted area of enterprise data mining in recent years. In general, while the general… (more)

Subjects/Keywords: Social security.; Data mining.; Australia.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bohlscheid, H. (2013). Social security data mining : an Australian case study. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/24089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bohlscheid, Hans-Michael. “Social security data mining : an Australian case study.” 2013. Thesis, University of Technology, Sydney. Accessed October 16, 2019. http://hdl.handle.net/10453/24089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bohlscheid, Hans-Michael. “Social security data mining : an Australian case study.” 2013. Web. 16 Oct 2019.

Vancouver:

Bohlscheid H. Social security data mining : an Australian case study. [Internet] [Thesis]. University of Technology, Sydney; 2013. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10453/24089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bohlscheid H. Social security data mining : an Australian case study. [Thesis]. University of Technology, Sydney; 2013. Available from: http://hdl.handle.net/10453/24089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

5. Chen, L. Achieving trust-oriented data protection in the cloud environment.

Degree: 2014, University of Technology, Sydney

 Cloud computing has gained increasing acceptance in recent years. In privacy-conscious domains such as healthcare and banking, however, data security and privacy are the greatest… (more)

Subjects/Keywords: Data protection.; Cloud computing.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, L. (2014). Achieving trust-oriented data protection in the cloud environment. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Thesis, University of Technology, Sydney. Accessed October 16, 2019. http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Web. 16 Oct 2019.

Vancouver:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Internet] [Thesis]. University of Technology, Sydney; 2014. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Thesis]. University of Technology, Sydney; 2014. Available from: http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

6. Oost, DJ. Information security management : an empirical analysis of its constitution.

Degree: 2009, University of Technology, Sydney

 This thesis addresses the following research questions: How does analysis of the everyday discursive work of information security managers inform us about the phenomena that… (more)

Subjects/Keywords: Computer security.; Data protection.; Management.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oost, D. (2009). Information security management : an empirical analysis of its constitution. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Oost, DJ. “Information security management : an empirical analysis of its constitution.” 2009. Thesis, University of Technology, Sydney. Accessed October 16, 2019. http://hdl.handle.net/10453/29869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Oost, DJ. “Information security management : an empirical analysis of its constitution.” 2009. Web. 16 Oct 2019.

Vancouver:

Oost D. Information security management : an empirical analysis of its constitution. [Internet] [Thesis]. University of Technology, Sydney; 2009. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10453/29869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Oost D. Information security management : an empirical analysis of its constitution. [Thesis]. University of Technology, Sydney; 2009. Available from: http://hdl.handle.net/10453/29869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

7. Bai, Kun. Damage Management in Database Management Systems.

Degree: PhD, Information Sciences and Technology, 2009, Penn State University

 In the past two decades there have been many advances in the field of computer security. However, since vulnerabilities cannot be completely removed from a… (more)

Subjects/Keywords: Security; Data Damage; Database; Integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bai, K. (2009). Damage Management in Database Management Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/10565

Chicago Manual of Style (16th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2009. Doctoral Dissertation, Penn State University. Accessed October 16, 2019. https://etda.libraries.psu.edu/catalog/10565.

MLA Handbook (7th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2009. Web. 16 Oct 2019.

Vancouver:

Bai K. Damage Management in Database Management Systems. [Internet] [Doctoral dissertation]. Penn State University; 2009. [cited 2019 Oct 16]. Available from: https://etda.libraries.psu.edu/catalog/10565.

Council of Science Editors:

Bai K. Damage Management in Database Management Systems. [Doctoral Dissertation]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/10565


Nelson Mandela Metropolitan University

8. [No author]. A framework for information security management in local government.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2017, Nelson Mandela Metropolitan University

 Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the… (more)

Subjects/Keywords: Computer security  – Management; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2017). A framework for information security management in local government. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “A framework for information security management in local government.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “A framework for information security management in local government.” 2017. Web. 16 Oct 2019.

Vancouver:

author] [. A framework for information security management in local government. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. A framework for information security management in local government. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

9. Von Solms, Rossouw. Information security management : processes and metrics.

Degree: 2014, University of Johannesburg

PhD. (Informatics)

Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization.… (more)

Subjects/Keywords: Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). Information security management : processes and metrics. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Thesis, University of Johannesburg. Accessed October 16, 2019. http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Web. 16 Oct 2019.

Vancouver:

Von Solms R. Information security management : processes and metrics. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. Information security management : processes and metrics. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

10. DeYoung, Mark Edward. Privacy Preserving Network Security Data Analytics.

Degree: PhD, Electrical and Computer Engineering, 2018, Virginia Tech

 The problem of revealing accurate statistics about a population while maintaining privacy of individuals is extensively studied in several related disciplines. Statisticians, information security experts,… (more)

Subjects/Keywords: Privacy; Data Analytics; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

DeYoung, M. E. (2018). Privacy Preserving Network Security Data Analytics. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/82909

Chicago Manual of Style (16th Edition):

DeYoung, Mark Edward. “Privacy Preserving Network Security Data Analytics.” 2018. Doctoral Dissertation, Virginia Tech. Accessed October 16, 2019. http://hdl.handle.net/10919/82909.

MLA Handbook (7th Edition):

DeYoung, Mark Edward. “Privacy Preserving Network Security Data Analytics.” 2018. Web. 16 Oct 2019.

Vancouver:

DeYoung ME. Privacy Preserving Network Security Data Analytics. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10919/82909.

Council of Science Editors:

DeYoung ME. Privacy Preserving Network Security Data Analytics. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/82909


Rutgers University

11. Salles-Loustau, Gabriel, 1986-. Data protection via virtual micro security perimeters.

Degree: PhD, Electrical and Computer Engineering, 2018, Rutgers University

Mobile devices have become the platform of reference for data consumption. Between personal and work related usages, users entrust their mobile devices to handle data(more)

Subjects/Keywords: Computer security; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salles-Loustau, Gabriel, 1. (2018). Data protection via virtual micro security perimeters. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/57699/

Chicago Manual of Style (16th Edition):

Salles-Loustau, Gabriel, 1986-. “Data protection via virtual micro security perimeters.” 2018. Doctoral Dissertation, Rutgers University. Accessed October 16, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/57699/.

MLA Handbook (7th Edition):

Salles-Loustau, Gabriel, 1986-. “Data protection via virtual micro security perimeters.” 2018. Web. 16 Oct 2019.

Vancouver:

Salles-Loustau, Gabriel 1. Data protection via virtual micro security perimeters. [Internet] [Doctoral dissertation]. Rutgers University; 2018. [cited 2019 Oct 16]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57699/.

Council of Science Editors:

Salles-Loustau, Gabriel 1. Data protection via virtual micro security perimeters. [Doctoral Dissertation]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57699/


University of Sydney

12. Nan, Lihao. Privacy Preserving Representation Learning For Complex Data .

Degree: 2019, University of Sydney

 Here we consider a common data encryption problem encountered by users who want to disclose some data to gain utility but preserve their private information.… (more)

Subjects/Keywords: Privacy; Data security; Representation; Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nan, L. (2019). Privacy Preserving Representation Learning For Complex Data . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/20662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nan, Lihao. “Privacy Preserving Representation Learning For Complex Data .” 2019. Thesis, University of Sydney. Accessed October 16, 2019. http://hdl.handle.net/2123/20662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nan, Lihao. “Privacy Preserving Representation Learning For Complex Data .” 2019. Web. 16 Oct 2019.

Vancouver:

Nan L. Privacy Preserving Representation Learning For Complex Data . [Internet] [Thesis]. University of Sydney; 2019. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/2123/20662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nan L. Privacy Preserving Representation Learning For Complex Data . [Thesis]. University of Sydney; 2019. Available from: http://hdl.handle.net/2123/20662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Temple University

13. Huang, Xueli. Achieving Data Privacy and Security in Cloud.

Degree: PhD, 2016, Temple University

Computer and Information Science

The growing concerns in term of the privacy of data stored in public cloud have restrained the widespread adoption of cloud… (more)

Subjects/Keywords: Computer science;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, X. (2016). Achieving Data Privacy and Security in Cloud. (Doctoral Dissertation). Temple University. Retrieved from http://digital.library.temple.edu/u?/p245801coll10,372805

Chicago Manual of Style (16th Edition):

Huang, Xueli. “Achieving Data Privacy and Security in Cloud.” 2016. Doctoral Dissertation, Temple University. Accessed October 16, 2019. http://digital.library.temple.edu/u?/p245801coll10,372805.

MLA Handbook (7th Edition):

Huang, Xueli. “Achieving Data Privacy and Security in Cloud.” 2016. Web. 16 Oct 2019.

Vancouver:

Huang X. Achieving Data Privacy and Security in Cloud. [Internet] [Doctoral dissertation]. Temple University; 2016. [cited 2019 Oct 16]. Available from: http://digital.library.temple.edu/u?/p245801coll10,372805.

Council of Science Editors:

Huang X. Achieving Data Privacy and Security in Cloud. [Doctoral Dissertation]. Temple University; 2016. Available from: http://digital.library.temple.edu/u?/p245801coll10,372805


Nelson Mandela Metropolitan University

14. Okere, Irene Onyekachi. A control framework for the assessment of information security culture.

Degree: MTech, Faculty of Business and Economic Sciences, 2013, Nelson Mandela Metropolitan University

 The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal… (more)

Subjects/Keywords: Data encryption (Computer science); Business  – Data processing  – Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okere, I. O. (2013). A control framework for the assessment of information security culture. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019861

Chicago Manual of Style (16th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Masters Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/d1019861.

MLA Handbook (7th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Web. 16 Oct 2019.

Vancouver:

Okere IO. A control framework for the assessment of information security culture. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/d1019861.

Council of Science Editors:

Okere IO. A control framework for the assessment of information security culture. [Masters Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1019861


University of Johannesburg

15. Von Solms, Rossouw. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.

Degree: 2014, University of Johannesburg

M.Sc. (Informatics)

Information is power. Any organization must secure and protect its entire information assets. Management is responsible for the well-being of the organization and… (more)

Subjects/Keywords: Electronic data processing departments - Security measures; Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/10599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.” 2014. Thesis, University of Johannesburg. Accessed October 16, 2019. http://hdl.handle.net/10210/10599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.” 2014. Web. 16 Oct 2019.

Vancouver:

Von Solms R. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10210/10599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/10599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

16. Anwar, Adnan. Data-Driven Stealthy Injection Attacks on Smart Grid.

Degree: Engineering & Information Technology, 2017, University of New South Wales

 Smart grid cyber-security has come to the forefront of national security priorities due to emergence of new cyber threats such as the False Data Injection… (more)

Subjects/Keywords: false data injection; smart grid; cyber security; scada security; data-driven

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anwar, A. (2017). Data-Driven Stealthy Injection Attacks on Smart Grid. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Anwar, Adnan. “Data-Driven Stealthy Injection Attacks on Smart Grid.” 2017. Doctoral Dissertation, University of New South Wales. Accessed October 16, 2019. http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true.

MLA Handbook (7th Edition):

Anwar, Adnan. “Data-Driven Stealthy Injection Attacks on Smart Grid.” 2017. Web. 16 Oct 2019.

Vancouver:

Anwar A. Data-Driven Stealthy Injection Attacks on Smart Grid. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2019 Oct 16]. Available from: http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true.

Council of Science Editors:

Anwar A. Data-Driven Stealthy Injection Attacks on Smart Grid. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true


Nelson Mandela Metropolitan University

17. Scharnick, Nicholas. Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises.

Degree: 2018, Nelson Mandela Metropolitan University

 Technology has become important in the business environment as it ensures that a business is competitive and it also drives the business processes. However, in… (more)

Subjects/Keywords: Computer security; Information technology  – Security measures; Data protection; Business  – Data processing  – Security measures; Small business  – Data processing  – Security measures  – South Africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Scharnick, N. (2018). Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/34799

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Scharnick, Nicholas. “Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises.” 2018. Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/34799.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Scharnick, Nicholas. “Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises.” 2018. Web. 16 Oct 2019.

Vancouver:

Scharnick N. Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2018. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/34799.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Scharnick N. Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises. [Thesis]. Nelson Mandela Metropolitan University; 2018. Available from: http://hdl.handle.net/10948/34799

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

18. Parakh, Abhishek. New Information Dispersal Techniques for Trustworthy Computing.

Degree: Computer Science Department, 2011, Oklahoma State University

 Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for… (more)

Subjects/Keywords: cloud computing; data partitioning; data storage security; distributed secure data storage; distributed security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parakh, A. (2011). New Information Dispersal Techniques for Trustworthy Computing. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Thesis, Oklahoma State University. Accessed October 16, 2019. http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Web. 16 Oct 2019.

Vancouver:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

19. Alharbi, Khalid. A framework for privacy-preserving data sharing in smart grid.

Degree: 2016, University of Ontario Institute of Technology

 While smart grid introduces a lot of enhancements to the traditional power grid and improves managing and controlling consumers demands, it also introduces security and… (more)

Subjects/Keywords: Smart grid; Privacy; Security; Data sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alharbi, K. (2016). A framework for privacy-preserving data sharing in smart grid. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alharbi, Khalid. “A framework for privacy-preserving data sharing in smart grid.” 2016. Thesis, University of Ontario Institute of Technology. Accessed October 16, 2019. http://hdl.handle.net/10155/739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alharbi, Khalid. “A framework for privacy-preserving data sharing in smart grid.” 2016. Web. 16 Oct 2019.

Vancouver:

Alharbi K. A framework for privacy-preserving data sharing in smart grid. [Internet] [Thesis]. University of Ontario Institute of Technology; 2016. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10155/739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alharbi K. A framework for privacy-preserving data sharing in smart grid. [Thesis]. University of Ontario Institute of Technology; 2016. Available from: http://hdl.handle.net/10155/739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

20. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 16 Oct 2019.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507


Nelson Mandela Metropolitan University

21. Reid, Rayne. A brain-compatible approach to the presentation of cyber security educational material.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2012). A brain-compatible approach to the presentation of cyber security educational material. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019895

Chicago Manual of Style (16th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/d1019895.

MLA Handbook (7th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Web. 16 Oct 2019.

Vancouver:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/d1019895.

Council of Science Editors:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1019895


Nelson Mandela Metropolitan University

22. Maninjwa, Prosecutor Mvikeli. Managing an information security policy architecture : a technical documentation perspective.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However,… (more)

Subjects/Keywords: Computer security  – Management; Computer architecture; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maninjwa, P. M. (2012). Managing an information security policy architecture : a technical documentation perspective. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1020757

Chicago Manual of Style (16th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/d1020757.

MLA Handbook (7th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Web. 16 Oct 2019.

Vancouver:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/d1020757.

Council of Science Editors:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1020757


Nelson Mandela Metropolitan University

23. Boshoff, Ryno. A baseline for information security knowledge for end users.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boshoff, R. (2012). A baseline for information security knowledge for end users. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Web. 16 Oct 2019.

Vancouver:

Boshoff R. A baseline for information security knowledge for end users. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boshoff R. A baseline for information security knowledge for end users. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

24. Cui, Xingmin. Data privacy of Android applications and name privacy of NDN.

Degree: PhD, 2016, University of Hong Kong

 We get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two… (more)

Subjects/Keywords: Computer networks - Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, X. (2016). Data privacy of Android applications and name privacy of NDN. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/236581

Chicago Manual of Style (16th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Doctoral Dissertation, University of Hong Kong. Accessed October 16, 2019. http://hdl.handle.net/10722/236581.

MLA Handbook (7th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Web. 16 Oct 2019.

Vancouver:

Cui X. Data privacy of Android applications and name privacy of NDN. [Internet] [Doctoral dissertation]. University of Hong Kong; 2016. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10722/236581.

Council of Science Editors:

Cui X. Data privacy of Android applications and name privacy of NDN. [Doctoral Dissertation]. University of Hong Kong; 2016. Available from: http://hdl.handle.net/10722/236581


University of Tasmania

25. Scanlan, JD. DynamicWEB : a conceptual clustering algorithm for a changing world.

Degree: 2011, University of Tasmania

 This research was motivated by problems in network security, where an attacker often deliberately changes their identifying information and behaviour in order to camouflage their… (more)

Subjects/Keywords: machine learning; data mining; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Scanlan, J. (2011). DynamicWEB : a conceptual clustering algorithm for a changing world. (Thesis). University of Tasmania. Retrieved from https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Scanlan, JD. “DynamicWEB : a conceptual clustering algorithm for a changing world.” 2011. Thesis, University of Tasmania. Accessed October 16, 2019. https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania..

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Scanlan, JD. “DynamicWEB : a conceptual clustering algorithm for a changing world.” 2011. Web. 16 Oct 2019.

Vancouver:

Scanlan J. DynamicWEB : a conceptual clustering algorithm for a changing world. [Internet] [Thesis]. University of Tasmania; 2011. [cited 2019 Oct 16]. Available from: https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania..

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Scanlan J. DynamicWEB : a conceptual clustering algorithm for a changing world. [Thesis]. University of Tasmania; 2011. Available from: https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

26. Jansson, Kenny. A model for cultivating resistance to social engineering attacks.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University

 The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in… (more)

Subjects/Keywords: Computer security; Data protection; Human-computer interaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jansson, K. (2011). A model for cultivating resistance to social engineering attacks. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed October 16, 2019. http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Web. 16 Oct 2019.

Vancouver:

Jansson K. A model for cultivating resistance to social engineering attacks. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2019 Oct 16]. Available from: http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jansson K. A model for cultivating resistance to social engineering attacks. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queen Mary, University of London

27. Möller, Carolin. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.

Degree: PhD, 2017, Queen Mary, University of London

 Since nearly two decades threats to public security through events such as 9/11, the Madrid (2004) and London (2005) bombings and more recently the Paris… (more)

Subjects/Keywords: Law; Data protection; Privacy; Terrorism; public security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Möller, C. (2017). The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. (Doctoral Dissertation). Queen Mary, University of London. Retrieved from http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979

Chicago Manual of Style (16th Edition):

Möller, Carolin. “The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.” 2017. Doctoral Dissertation, Queen Mary, University of London. Accessed October 16, 2019. http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979.

MLA Handbook (7th Edition):

Möller, Carolin. “The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes.” 2017. Web. 16 Oct 2019.

Vancouver:

Möller C. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. [Internet] [Doctoral dissertation]. Queen Mary, University of London; 2017. [cited 2019 Oct 16]. Available from: http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979.

Council of Science Editors:

Möller C. The evolution of data protection and privacy in the public security context : an institutional analysis of three EU data retention and access regimes. [Doctoral Dissertation]. Queen Mary, University of London; 2017. Available from: http://qmro.qmul.ac.uk/xmlui/handle/123456789/25911 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.765979


Delft University of Technology

28. Van Kouteren, H.J.W. Ibidas: to serve and to protect:.

Degree: 2009, Delft University of Technology

 In this thesis we present the database security mechanism and Web services implementation for the Ibidas system. The security mechanism restricts access to data by… (more)

Subjects/Keywords: Ibidas; data integration; web services; database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Kouteren, H. J. W. (2009). Ibidas: to serve and to protect:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb

Chicago Manual of Style (16th Edition):

Van Kouteren, H J W. “Ibidas: to serve and to protect:.” 2009. Masters Thesis, Delft University of Technology. Accessed October 16, 2019. http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb.

MLA Handbook (7th Edition):

Van Kouteren, H J W. “Ibidas: to serve and to protect:.” 2009. Web. 16 Oct 2019.

Vancouver:

Van Kouteren HJW. Ibidas: to serve and to protect:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2019 Oct 16]. Available from: http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb.

Council of Science Editors:

Van Kouteren HJW. Ibidas: to serve and to protect:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb


Mississippi State University

29. Mohanty, Somya Darsan. Ordered Merkle Tree - a versatile data-structure for security kernels.

Degree: PhD, Computer Science and Engineering, 2013, Mississippi State University

  Hidden undesired functionality is an unavoidable reality in any complex hardware or software component. Undesired functionality deliberately introduced Trojan horses or accidentally introduced bugsin… (more)

Subjects/Keywords: Authenticated Data-Structures; Trustworthy Computing; Security Kernels

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohanty, S. D. (2013). Ordered Merkle Tree - a versatile data-structure for security kernels. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;

Chicago Manual of Style (16th Edition):

Mohanty, Somya Darsan. “Ordered Merkle Tree - a versatile data-structure for security kernels.” 2013. Doctoral Dissertation, Mississippi State University. Accessed October 16, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;.

MLA Handbook (7th Edition):

Mohanty, Somya Darsan. “Ordered Merkle Tree - a versatile data-structure for security kernels.” 2013. Web. 16 Oct 2019.

Vancouver:

Mohanty SD. Ordered Merkle Tree - a versatile data-structure for security kernels. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2019 Oct 16]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;.

Council of Science Editors:

Mohanty SD. Ordered Merkle Tree - a versatile data-structure for security kernels. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;


University of North Carolina – Greensboro

30. Whitworth, Jeffrey N. Applying hybrid cloud systems to solve challenges posed by the big data problem.

Degree: 2013, University of North Carolina – Greensboro

 The problem of Big Data poses challenges to traditional compute systems used for Machine Learning (ML) techniques that extract, analyze and visualize important information. New… (more)

Subjects/Keywords: Big data; Cloud computing – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Whitworth, J. N. (2013). Applying hybrid cloud systems to solve challenges posed by the big data problem. (Masters Thesis). University of North Carolina – Greensboro. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603

Chicago Manual of Style (16th Edition):

Whitworth, Jeffrey N. “Applying hybrid cloud systems to solve challenges posed by the big data problem.” 2013. Masters Thesis, University of North Carolina – Greensboro. Accessed October 16, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603.

MLA Handbook (7th Edition):

Whitworth, Jeffrey N. “Applying hybrid cloud systems to solve challenges posed by the big data problem.” 2013. Web. 16 Oct 2019.

Vancouver:

Whitworth JN. Applying hybrid cloud systems to solve challenges posed by the big data problem. [Internet] [Masters thesis]. University of North Carolina – Greensboro; 2013. [cited 2019 Oct 16]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603.

Council of Science Editors:

Whitworth JN. Applying hybrid cloud systems to solve challenges posed by the big data problem. [Masters Thesis]. University of North Carolina – Greensboro; 2013. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603

[1] [2] [3] [4] [5] … [36]

.