Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Detection System). Showing records 1 – 30 of 667 total matches.

[1] [2] [3] [4] [5] … [23]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Waterloo

1. Tran, Tung. Misconfiguration Analysis of Network Access Control Policies.

Degree: 2009, University of Waterloo

 Network access control (NAC) systems have a very important role in network security. However, NAC policy configuration is an extremely complicated and error-prone task due… (more)

Subjects/Keywords: firewall; intrusion detection system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tran, T. (2009). Misconfiguration Analysis of Network Access Control Policies. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/4285

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tran, Tung. “Misconfiguration Analysis of Network Access Control Policies.” 2009. Thesis, University of Waterloo. Accessed March 18, 2019. http://hdl.handle.net/10012/4285.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tran, Tung. “Misconfiguration Analysis of Network Access Control Policies.” 2009. Web. 18 Mar 2019.

Vancouver:

Tran T. Misconfiguration Analysis of Network Access Control Policies. [Internet] [Thesis]. University of Waterloo; 2009. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10012/4285.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tran T. Misconfiguration Analysis of Network Access Control Policies. [Thesis]. University of Waterloo; 2009. Available from: http://hdl.handle.net/10012/4285

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

2. Marhusin, Mohd Fadzli. Improving the Effectiveness of Behaviour-based Malware Detection.

Degree: Engineering & Information Technology, 2012, University of New South Wales

 Malware is software code that has malicious intent. In recent years, there have beenhuge changes in the threat landscape. As our dependency on the Internet… (more)

Subjects/Keywords: Self-propagating Worm; Malware Detection System; Intrusion Detection System; Session-based Detection; API Calls based Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marhusin, M. F. (2012). Improving the Effectiveness of Behaviour-based Malware Detection. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/52198 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10868/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Marhusin, Mohd Fadzli. “Improving the Effectiveness of Behaviour-based Malware Detection.” 2012. Doctoral Dissertation, University of New South Wales. Accessed March 18, 2019. http://handle.unsw.edu.au/1959.4/52198 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10868/SOURCE02?view=true.

MLA Handbook (7th Edition):

Marhusin, Mohd Fadzli. “Improving the Effectiveness of Behaviour-based Malware Detection.” 2012. Web. 18 Mar 2019.

Vancouver:

Marhusin MF. Improving the Effectiveness of Behaviour-based Malware Detection. [Internet] [Doctoral dissertation]. University of New South Wales; 2012. [cited 2019 Mar 18]. Available from: http://handle.unsw.edu.au/1959.4/52198 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10868/SOURCE02?view=true.

Council of Science Editors:

Marhusin MF. Improving the Effectiveness of Behaviour-based Malware Detection. [Doctoral Dissertation]. University of New South Wales; 2012. Available from: http://handle.unsw.edu.au/1959.4/52198 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:10868/SOURCE02?view=true


NSYSU

3. Chiou, Kai-sheng. A Multimodal Microphone Control System.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 Though there are many types of meeting room microphone control system in the market, the most common control method can be classified into either push-button… (more)

Subjects/Keywords: Skin color detection; Nose detection; Behavior detection; Optical flow; Microphone control system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiou, K. (2015). A Multimodal Microphone Control System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0614115-120518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiou, Kai-sheng. “A Multimodal Microphone Control System.” 2015. Thesis, NSYSU. Accessed March 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0614115-120518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiou, Kai-sheng. “A Multimodal Microphone Control System.” 2015. Web. 18 Mar 2019.

Vancouver:

Chiou K. A Multimodal Microphone Control System. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Mar 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0614115-120518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiou K. A Multimodal Microphone Control System. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0614115-120518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Punjabi University

4. Amandeep Kaur. Development of algorithms for automatic landmark detection for cephalometric system; -.

Degree: Computer Science, 2012, Punjabi University

The diagnostic value of cephalometric analysis depends on the accurate and reproducible identification of clearly defined landmarks on cephalometric radiographs. Manual landmark detection is a… (more)

Subjects/Keywords: Computer Science; Automatic Landmark Detection; cephalometric system; Image Enhancement; Edge Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaur, A. (2012). Development of algorithms for automatic landmark detection for cephalometric system; -. (Thesis). Punjabi University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/13589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kaur, Amandeep. “Development of algorithms for automatic landmark detection for cephalometric system; -.” 2012. Thesis, Punjabi University. Accessed March 18, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/13589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kaur, Amandeep. “Development of algorithms for automatic landmark detection for cephalometric system; -.” 2012. Web. 18 Mar 2019.

Vancouver:

Kaur A. Development of algorithms for automatic landmark detection for cephalometric system; -. [Internet] [Thesis]. Punjabi University; 2012. [cited 2019 Mar 18]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kaur A. Development of algorithms for automatic landmark detection for cephalometric system; -. [Thesis]. Punjabi University; 2012. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/13589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Lu, Bo-Han. Enhanced Verification of Lane-Based Front Vehicle Detection System in Daytime and Nighttime.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In this thesis, we present a front-vehicle detection system in both daytime and night time. The key philosophy is simplicity in order to reduce computation… (more)

Subjects/Keywords: vehicle detection; driver assisted system (DAS); lane detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, B. (2014). Enhanced Verification of Lane-Based Front Vehicle Detection System in Daytime and Nighttime. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728114-140100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lu, Bo-Han. “Enhanced Verification of Lane-Based Front Vehicle Detection System in Daytime and Nighttime.” 2014. Thesis, NSYSU. Accessed March 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728114-140100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lu, Bo-Han. “Enhanced Verification of Lane-Based Front Vehicle Detection System in Daytime and Nighttime.” 2014. Web. 18 Mar 2019.

Vancouver:

Lu B. Enhanced Verification of Lane-Based Front Vehicle Detection System in Daytime and Nighttime. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Mar 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728114-140100.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lu B. Enhanced Verification of Lane-Based Front Vehicle Detection System in Daytime and Nighttime. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728114-140100

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

6. Alayed, Hashem Ali. Behavior-based approaches for detecting cheating in online games.

Degree: PhD, Computer Science, 2015, University of Southern California

 The online games industry has grown rapidly over the last decade. As a result of this rapid growth, many techniques have been created in response… (more)

Subjects/Keywords: online games; cheating detection; machine learning; classification; anomaly detection; hybrid system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alayed, H. A. (2015). Behavior-based approaches for detecting cheating in online games. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/545519/rec/1058

Chicago Manual of Style (16th Edition):

Alayed, Hashem Ali. “Behavior-based approaches for detecting cheating in online games.” 2015. Doctoral Dissertation, University of Southern California. Accessed March 18, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/545519/rec/1058.

MLA Handbook (7th Edition):

Alayed, Hashem Ali. “Behavior-based approaches for detecting cheating in online games.” 2015. Web. 18 Mar 2019.

Vancouver:

Alayed HA. Behavior-based approaches for detecting cheating in online games. [Internet] [Doctoral dissertation]. University of Southern California; 2015. [cited 2019 Mar 18]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/545519/rec/1058.

Council of Science Editors:

Alayed HA. Behavior-based approaches for detecting cheating in online games. [Doctoral Dissertation]. University of Southern California; 2015. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/545519/rec/1058


Siauliai University

7. Donelavičius, Mantas. Plagiato patikros e. sistema mMoodle aplinkai.

Degree: Master, Informatics, 2013, Siauliai University

Baigiamajame magistro darbe nagrinėjamos plagiatų aptikimas, vertinami skirtingi algoritmai, užsienio šalių patirtis šioje srityje. Išnagrinėti pagrindiniai būdai, kuriais remiantis nustatomi plagiatai. Darbo metu sukurta plagiatų… (more)

Subjects/Keywords: Plagiatas; Moodle; Patikra; Plagiarism; Detection; System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Donelavičius, Mantas. (2013). Plagiato patikros e. sistema mMoodle aplinkai. (Masters Thesis). Siauliai University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130729_140119-61483 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Donelavičius, Mantas. “Plagiato patikros e. sistema mMoodle aplinkai.” 2013. Masters Thesis, Siauliai University. Accessed March 18, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130729_140119-61483 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Donelavičius, Mantas. “Plagiato patikros e. sistema mMoodle aplinkai.” 2013. Web. 18 Mar 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Donelavičius, Mantas. Plagiato patikros e. sistema mMoodle aplinkai. [Internet] [Masters thesis]. Siauliai University; 2013. [cited 2019 Mar 18]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130729_140119-61483 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Donelavičius, Mantas. Plagiato patikros e. sistema mMoodle aplinkai. [Masters Thesis]. Siauliai University; 2013. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130729_140119-61483 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Technology, Sydney

8. Tran, TP. Innovative machine learning techniques for security detection problems.

Degree: 2009, University of Technology, Sydney

 Most of the currently available network security techniques cannot cope with the dynamic and increasingly complex nature of the attacks on distributed computer systems. Therefore,… (more)

Subjects/Keywords: Intrusion detection system.; Machine learning.; Computer security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tran, T. (2009). Innovative machine learning techniques for security detection problems. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/30237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tran, TP. “Innovative machine learning techniques for security detection problems.” 2009. Thesis, University of Technology, Sydney. Accessed March 18, 2019. http://hdl.handle.net/10453/30237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tran, TP. “Innovative machine learning techniques for security detection problems.” 2009. Web. 18 Mar 2019.

Vancouver:

Tran T. Innovative machine learning techniques for security detection problems. [Internet] [Thesis]. University of Technology, Sydney; 2009. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10453/30237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tran T. Innovative machine learning techniques for security detection problems. [Thesis]. University of Technology, Sydney; 2009. Available from: http://hdl.handle.net/10453/30237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Cheng, Yu-Shan. Parity Detection for Some Three-Modulus Residue Number System.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 The residue number system (RNS) can be applied to cryptography, image processing, digital filtering, parallel computation, and cloud computing. It represents a large integer using… (more)

Subjects/Keywords: parity detection technique; residue number system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2014). Parity Detection for Some Three-Modulus Residue Number System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Thesis, NSYSU. Accessed March 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Web. 18 Mar 2019.

Vancouver:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Mar 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Yu Yang, Peng. Detecting Botnet-based Joint Attacks by Hidden Markov Model.

Degree: Master, Information Management, 2012, NSYSU

 We present a new detection model include monitoring network perimeter and hosts logs to counter the new method of attacking involve different hosts source during… (more)

Subjects/Keywords: Intrusion Detection System; Botnet; Hidden Markov Chain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu Yang, P. (2012). Detecting Botnet-based Joint Attacks by Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed March 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Web. 18 Mar 2019.

Vancouver:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Mar 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

11. Lee, Tae Yoon. A multi-function, disposable, microfluidic module for mutation detection.

Degree: PhD, Mechanical Engineering, 2009, Louisiana State University

 Recognition of point mutations in a codon 12 of the K-ras gene, most frequently observed, is considered to be useful in the early diagnosis of… (more)

Subjects/Keywords: Mutation Detection; Modular system; Microfluidics; LDR; PCR

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, T. Y. (2009). A multi-function, disposable, microfluidic module for mutation detection. (Doctoral Dissertation). Louisiana State University. Retrieved from etd-07102009-121806 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2120

Chicago Manual of Style (16th Edition):

Lee, Tae Yoon. “A multi-function, disposable, microfluidic module for mutation detection.” 2009. Doctoral Dissertation, Louisiana State University. Accessed March 18, 2019. etd-07102009-121806 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2120.

MLA Handbook (7th Edition):

Lee, Tae Yoon. “A multi-function, disposable, microfluidic module for mutation detection.” 2009. Web. 18 Mar 2019.

Vancouver:

Lee TY. A multi-function, disposable, microfluidic module for mutation detection. [Internet] [Doctoral dissertation]. Louisiana State University; 2009. [cited 2019 Mar 18]. Available from: etd-07102009-121806 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2120.

Council of Science Editors:

Lee TY. A multi-function, disposable, microfluidic module for mutation detection. [Doctoral Dissertation]. Louisiana State University; 2009. Available from: etd-07102009-121806 ; https://digitalcommons.lsu.edu/gradschool_dissertations/2120

12. Wang, Zhuo. Using Neural Networks in Intrusion Detection System for Cloud Computing .

Degree: 2014, California State University – San Marcos

 Information security is an issue of global concern nowadays. The complexity, accessibility, and extensiveness of the Internet have led to tremendous increase of security risk… (more)

Subjects/Keywords: Neural Networks; Intrusion Detection System; Cloud Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Z. (2014). Using Neural Networks in Intrusion Detection System for Cloud Computing . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.3/131348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Zhuo. “Using Neural Networks in Intrusion Detection System for Cloud Computing .” 2014. Thesis, California State University – San Marcos. Accessed March 18, 2019. http://hdl.handle.net/10211.3/131348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Zhuo. “Using Neural Networks in Intrusion Detection System for Cloud Computing .” 2014. Web. 18 Mar 2019.

Vancouver:

Wang Z. Using Neural Networks in Intrusion Detection System for Cloud Computing . [Internet] [Thesis]. California State University – San Marcos; 2014. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10211.3/131348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Z. Using Neural Networks in Intrusion Detection System for Cloud Computing . [Thesis]. California State University – San Marcos; 2014. Available from: http://hdl.handle.net/10211.3/131348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

13. Zhang, Han. Detecting advanced botnets in enterprise networks.

Degree: PhD, Computer Science, 2017, Colorado State University

 A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive… (more)

Subjects/Keywords: DNS; Network Security; Intrusion Detection System; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2017). Detecting advanced botnets in enterprise networks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181362

Chicago Manual of Style (16th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Doctoral Dissertation, Colorado State University. Accessed March 18, 2019. http://hdl.handle.net/10217/181362.

MLA Handbook (7th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Web. 18 Mar 2019.

Vancouver:

Zhang H. Detecting advanced botnets in enterprise networks. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10217/181362.

Council of Science Editors:

Zhang H. Detecting advanced botnets in enterprise networks. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181362


Penn State University

14. Li, Hao. SYSTEM CALL TRACE BASED PROBABILISTIC PROGRAM MODELING FOR EXPLOITATION DETECTION.

Degree: 2018, Penn State University

 Intrusion detection system (IDS) is a common and necessary application for modern software systems to monitor abnormal and potential exploit behaviors. Recent research works have… (more)

Subjects/Keywords: Intusion Detection; Program Modeling; HMM; System Call

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, H. (2018). SYSTEM CALL TRACE BASED PROBABILISTIC PROGRAM MODELING FOR EXPLOITATION DETECTION. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/14740hul175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Hao. “SYSTEM CALL TRACE BASED PROBABILISTIC PROGRAM MODELING FOR EXPLOITATION DETECTION.” 2018. Thesis, Penn State University. Accessed March 18, 2019. https://etda.libraries.psu.edu/catalog/14740hul175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Hao. “SYSTEM CALL TRACE BASED PROBABILISTIC PROGRAM MODELING FOR EXPLOITATION DETECTION.” 2018. Web. 18 Mar 2019.

Vancouver:

Li H. SYSTEM CALL TRACE BASED PROBABILISTIC PROGRAM MODELING FOR EXPLOITATION DETECTION. [Internet] [Thesis]. Penn State University; 2018. [cited 2019 Mar 18]. Available from: https://etda.libraries.psu.edu/catalog/14740hul175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li H. SYSTEM CALL TRACE BASED PROBABILISTIC PROGRAM MODELING FOR EXPLOITATION DETECTION. [Thesis]. Penn State University; 2018. Available from: https://etda.libraries.psu.edu/catalog/14740hul175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kent State University

15. Vasudevan, Swetha. Immune Based Event-Incident Model for Intrusion Detection Systems: A Nature Inspired Approach to Secure Computing.

Degree: MS, College of Arts and Sciences / Department of Computer Science, 2007, Kent State University

 Immune System is essential for the survival of the species. How exactly this sophisticated defense mechanism accomplishes the level of discrimination remains deeply enigmatic. Both… (more)

Subjects/Keywords: Computer Science; Intrusion Detection Systems; Immune System; Immune Detectors; Intrusion Detection Squad; Multi-Agent System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vasudevan, S. (2007). Immune Based Event-Incident Model for Intrusion Detection Systems: A Nature Inspired Approach to Secure Computing. (Masters Thesis). Kent State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=kent1182821562

Chicago Manual of Style (16th Edition):

Vasudevan, Swetha. “Immune Based Event-Incident Model for Intrusion Detection Systems: A Nature Inspired Approach to Secure Computing.” 2007. Masters Thesis, Kent State University. Accessed March 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1182821562.

MLA Handbook (7th Edition):

Vasudevan, Swetha. “Immune Based Event-Incident Model for Intrusion Detection Systems: A Nature Inspired Approach to Secure Computing.” 2007. Web. 18 Mar 2019.

Vancouver:

Vasudevan S. Immune Based Event-Incident Model for Intrusion Detection Systems: A Nature Inspired Approach to Secure Computing. [Internet] [Masters thesis]. Kent State University; 2007. [cited 2019 Mar 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1182821562.

Council of Science Editors:

Vasudevan S. Immune Based Event-Incident Model for Intrusion Detection Systems: A Nature Inspired Approach to Secure Computing. [Masters Thesis]. Kent State University; 2007. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1182821562


Oklahoma State University

16. Pillay, Rohit. Instantaneous Intrusion Detection System.

Degree: Computer Science Department, 2010, Oklahoma State University

 The security of computer networks is a critical issue. Deficiencies within these networks makes them venerable to malicious actions that compromise the integrity, confidentiality or… (more)

Subjects/Keywords: cc4 neural network; hybrid system; instantaneous detection of novel attacks; misuse based intrusion detection system; mlp neural network; network intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pillay, R. (2010). Instantaneous Intrusion Detection System. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pillay, Rohit. “Instantaneous Intrusion Detection System.” 2010. Thesis, Oklahoma State University. Accessed March 18, 2019. http://hdl.handle.net/11244/8224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pillay, Rohit. “Instantaneous Intrusion Detection System.” 2010. Web. 18 Mar 2019.

Vancouver:

Pillay R. Instantaneous Intrusion Detection System. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/11244/8224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pillay R. Instantaneous Intrusion Detection System. [Thesis]. Oklahoma State University; 2010. Available from: http://hdl.handle.net/11244/8224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

17. Dutta, Papiya. Treanmission Line Fault Location using Interoperability and Integration of Data and Model.

Degree: 2014, Texas A&M University

 This dissertation proposes selective scheme of transmission line fault location by choosing between two different types of fault location algorithms depending on the availability of… (more)

Subjects/Keywords: Power system fault detection; classification; location; Power system interoperability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dutta, P. (2014). Treanmission Line Fault Location using Interoperability and Integration of Data and Model. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/152466

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dutta, Papiya. “Treanmission Line Fault Location using Interoperability and Integration of Data and Model.” 2014. Thesis, Texas A&M University. Accessed March 18, 2019. http://hdl.handle.net/1969.1/152466.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dutta, Papiya. “Treanmission Line Fault Location using Interoperability and Integration of Data and Model.” 2014. Web. 18 Mar 2019.

Vancouver:

Dutta P. Treanmission Line Fault Location using Interoperability and Integration of Data and Model. [Internet] [Thesis]. Texas A&M University; 2014. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/1969.1/152466.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dutta P. Treanmission Line Fault Location using Interoperability and Integration of Data and Model. [Thesis]. Texas A&M University; 2014. Available from: http://hdl.handle.net/1969.1/152466

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Chang, Yu-han. Improving Detection Efficiency using Cloud Computing.

Degree: Master, Information Management, 2016, NSYSU

 Recently, with the popularity and convenience features of Internet, Internet has become one of the attacker profitable way to enter the local area network. Most… (more)

Subjects/Keywords: Distributed File System; Cloud Computing; Intrusion Detection System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, Y. (2016). Improving Detection Efficiency using Cloud Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Thesis, NSYSU. Accessed March 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Web. 18 Mar 2019.

Vancouver:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Mar 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


King Abdullah University of Science and Technology

19. Ledezma, Fernando. Detection of Cardiovascular Anomalies: An Observer-Based Approach.

Degree: 2012, King Abdullah University of Science and Technology

 In this thesis, a methodology for the detection of anomalies in the cardiovascular system is presented. The cardiovascular system is one of the most fascinating… (more)

Subjects/Keywords: Observers; Hybrid system; Fault detection and isolation; Cardiovascular system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ledezma, F. (2012). Detection of Cardiovascular Anomalies: An Observer-Based Approach. (Thesis). King Abdullah University of Science and Technology. Retrieved from http://hdl.handle.net/10754/235371

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ledezma, Fernando. “Detection of Cardiovascular Anomalies: An Observer-Based Approach.” 2012. Thesis, King Abdullah University of Science and Technology. Accessed March 18, 2019. http://hdl.handle.net/10754/235371.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ledezma, Fernando. “Detection of Cardiovascular Anomalies: An Observer-Based Approach.” 2012. Web. 18 Mar 2019.

Vancouver:

Ledezma F. Detection of Cardiovascular Anomalies: An Observer-Based Approach. [Internet] [Thesis]. King Abdullah University of Science and Technology; 2012. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10754/235371.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ledezma F. Detection of Cardiovascular Anomalies: An Observer-Based Approach. [Thesis]. King Abdullah University of Science and Technology; 2012. Available from: http://hdl.handle.net/10754/235371

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université Catholique de Louvain

20. Kabasele Ndonda, Gorby. Simulating attacks to evaluate intrusion detection systems in industrial control systems.

Degree: 2016, Université Catholique de Louvain

The number of attacks against industrial control systems and their networking infrastructure has dramatically increased recently. Consequently, research and development of intrusion detection systems (IDS)… (more)

Subjects/Keywords: Industrial Control System; Intrusion Detection System; SCADA; Snort; Simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kabasele Ndonda, G. (2016). Simulating attacks to evaluate intrusion detection systems in industrial control systems. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/thesis:4577

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kabasele Ndonda, Gorby. “Simulating attacks to evaluate intrusion detection systems in industrial control systems.” 2016. Thesis, Université Catholique de Louvain. Accessed March 18, 2019. http://hdl.handle.net/2078.1/thesis:4577.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kabasele Ndonda, Gorby. “Simulating attacks to evaluate intrusion detection systems in industrial control systems.” 2016. Web. 18 Mar 2019.

Vancouver:

Kabasele Ndonda G. Simulating attacks to evaluate intrusion detection systems in industrial control systems. [Internet] [Thesis]. Université Catholique de Louvain; 2016. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/2078.1/thesis:4577.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kabasele Ndonda G. Simulating attacks to evaluate intrusion detection systems in industrial control systems. [Thesis]. Université Catholique de Louvain; 2016. Available from: http://hdl.handle.net/2078.1/thesis:4577

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

21. Wang, Jisheng. Packet Inspection for Application Classification and Intrusion Detection.

Degree: PhD, Electrical Engineering, 2008, Penn State University

 Current computer networks remain vulnerable to a variety of families of attacks including scanning worms, distributed denial-of-service (DDoS) attacks targeting resources associated with end-systems or… (more)

Subjects/Keywords: Polymorphic Worms; Voice over IP; Data Digesting; Application Classification; Intrusion Detection System; Network Anomaly Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, J. (2008). Packet Inspection for Application Classification and Intrusion Detection. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8419

Chicago Manual of Style (16th Edition):

Wang, Jisheng. “Packet Inspection for Application Classification and Intrusion Detection.” 2008. Doctoral Dissertation, Penn State University. Accessed March 18, 2019. https://etda.libraries.psu.edu/catalog/8419.

MLA Handbook (7th Edition):

Wang, Jisheng. “Packet Inspection for Application Classification and Intrusion Detection.” 2008. Web. 18 Mar 2019.

Vancouver:

Wang J. Packet Inspection for Application Classification and Intrusion Detection. [Internet] [Doctoral dissertation]. Penn State University; 2008. [cited 2019 Mar 18]. Available from: https://etda.libraries.psu.edu/catalog/8419.

Council of Science Editors:

Wang J. Packet Inspection for Application Classification and Intrusion Detection. [Doctoral Dissertation]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8419


University of Waterloo

22. OTHMAN MOHAMED, Ayman M. Intelligent Low Voltage Series Arc Detection System.

Degree: 2015, University of Waterloo

 Protection from electric power hazardous has been used ever since applications of electricity were discovered. Hazards in the electric system can be in the form… (more)

Subjects/Keywords: Arc protection; Patteren recognitions arc detection; Low voltage arc detection and protection system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

OTHMAN MOHAMED, A. M. (2015). Intelligent Low Voltage Series Arc Detection System. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10050

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

OTHMAN MOHAMED, Ayman M. “Intelligent Low Voltage Series Arc Detection System.” 2015. Thesis, University of Waterloo. Accessed March 18, 2019. http://hdl.handle.net/10012/10050.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

OTHMAN MOHAMED, Ayman M. “Intelligent Low Voltage Series Arc Detection System.” 2015. Web. 18 Mar 2019.

Vancouver:

OTHMAN MOHAMED AM. Intelligent Low Voltage Series Arc Detection System. [Internet] [Thesis]. University of Waterloo; 2015. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10012/10050.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

OTHMAN MOHAMED AM. Intelligent Low Voltage Series Arc Detection System. [Thesis]. University of Waterloo; 2015. Available from: http://hdl.handle.net/10012/10050

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North-West University

23. Pelo, Herbert Leburu. Evaluation of an advanced fault detection system using Koeberg nuclear power plant data / H.L. Pelo.

Degree: 2013, North-West University

 The control and protection system of early nuclear power plants (Generation II) have been designed and built on the then reliable analog system. Technology has… (more)

Subjects/Keywords: Advanced fault detection; PCTRAN simulator; validation; steady state; fault detection; protection and control system; transients

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pelo, H. L. (2013). Evaluation of an advanced fault detection system using Koeberg nuclear power plant data / H.L. Pelo. (Thesis). North-West University. Retrieved from http://hdl.handle.net/10394/9686

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pelo, Herbert Leburu. “Evaluation of an advanced fault detection system using Koeberg nuclear power plant data / H.L. Pelo. ” 2013. Thesis, North-West University. Accessed March 18, 2019. http://hdl.handle.net/10394/9686.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pelo, Herbert Leburu. “Evaluation of an advanced fault detection system using Koeberg nuclear power plant data / H.L. Pelo. ” 2013. Web. 18 Mar 2019.

Vancouver:

Pelo HL. Evaluation of an advanced fault detection system using Koeberg nuclear power plant data / H.L. Pelo. [Internet] [Thesis]. North-West University; 2013. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10394/9686.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pelo HL. Evaluation of an advanced fault detection system using Koeberg nuclear power plant data / H.L. Pelo. [Thesis]. North-West University; 2013. Available from: http://hdl.handle.net/10394/9686

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

24. Al Rawashdeh, Khaled. Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems.

Degree: PhD, Engineering and Applied Science: Computer Science and Engineering, 2018, University of Cincinnati

 Real-time designs of deep learning algorithms are challenged by two less frequently addressed issues. The first is data inefficiency, i.e., the model requires several epochs… (more)

Subjects/Keywords: Computer Engineering; Deep Learning; Anomaly Detection; Artificial Intelligence; FPGA; Intrusion Detection; Embedded System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Rawashdeh, K. (2018). Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems. (Doctoral Dissertation). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315

Chicago Manual of Style (16th Edition):

Al Rawashdeh, Khaled. “Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems.” 2018. Doctoral Dissertation, University of Cincinnati. Accessed March 18, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.

MLA Handbook (7th Edition):

Al Rawashdeh, Khaled. “Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems.” 2018. Web. 18 Mar 2019.

Vancouver:

Al Rawashdeh K. Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems. [Internet] [Doctoral dissertation]. University of Cincinnati; 2018. [cited 2019 Mar 18]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315.

Council of Science Editors:

Al Rawashdeh K. Toward a Hardware-assisted Online Intrusion Detection System Based on Deep Learning Algorithms for Resource-Limited Embedded Systems. [Doctoral Dissertation]. University of Cincinnati; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535464571843315


University of Alberta

25. Pabon,Sergio. Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines.

Degree: MS, Department of Civil and Environmental Engineering, 2015, University of Alberta

 Computer model based leak detection technique is extensively applied in the energy pipeline industry. However, its effectiveness is often limited by the ability of the… (more)

Subjects/Keywords: Computer Model Based Leak Detection System in Liquid Pipelines; Computer Model Based Leak Detection System; Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pabon,Sergio. (2015). Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines. (Masters Thesis). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/kh04ds37n

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Pabon,Sergio. “Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines.” 2015. Masters Thesis, University of Alberta. Accessed March 18, 2019. https://era.library.ualberta.ca/files/kh04ds37n.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Pabon,Sergio. “Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines.” 2015. Web. 18 Mar 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Pabon,Sergio. Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines. [Internet] [Masters thesis]. University of Alberta; 2015. [cited 2019 Mar 18]. Available from: https://era.library.ualberta.ca/files/kh04ds37n.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Pabon,Sergio. Sensitivity Study of a Computer Model Based Leak Detection System in Liquid Pipelines. [Masters Thesis]. University of Alberta; 2015. Available from: https://era.library.ualberta.ca/files/kh04ds37n

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Queensland University of Technology

26. Hansen, Sinclair D. An intrusion detection system for supervisory control and data acquisition systems.

Degree: 2008, Queensland University of Technology

 Despite increased awareness of threats against Critical Infrastructure (CI), securing of Supervisory Control and Data Acquisition (SCADA) systems remains incomplete. The majority of research focuses… (more)

Subjects/Keywords: Information security; supervisory control and data acquisition (SCADA); intrusion detection system (IDS); remote telemetry device (RTU); anomaly detection; signature detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hansen, S. D. (2008). An intrusion detection system for supervisory control and data acquisition systems. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16636/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hansen, Sinclair D. “An intrusion detection system for supervisory control and data acquisition systems.” 2008. Thesis, Queensland University of Technology. Accessed March 18, 2019. https://eprints.qut.edu.au/16636/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hansen, Sinclair D. “An intrusion detection system for supervisory control and data acquisition systems.” 2008. Web. 18 Mar 2019.

Vancouver:

Hansen SD. An intrusion detection system for supervisory control and data acquisition systems. [Internet] [Thesis]. Queensland University of Technology; 2008. [cited 2019 Mar 18]. Available from: https://eprints.qut.edu.au/16636/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hansen SD. An intrusion detection system for supervisory control and data acquisition systems. [Thesis]. Queensland University of Technology; 2008. Available from: https://eprints.qut.edu.au/16636/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Bradford

27. Pagna Disso, Jules Ferdinand. A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment.

Degree: PhD, 2010, University of Bradford

 Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving… (more)

Subjects/Keywords: 004; Intrusion Detection System (IDS); Visibility of attacks; Multistage Intrusion Detection and Prevention System (MIDaPS); Performance evaluation; Snort; Computer network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pagna Disso, J. F. (2010). A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/5248

Chicago Manual of Style (16th Edition):

Pagna Disso, Jules Ferdinand. “A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment.” 2010. Doctoral Dissertation, University of Bradford. Accessed March 18, 2019. http://hdl.handle.net/10454/5248.

MLA Handbook (7th Edition):

Pagna Disso, Jules Ferdinand. “A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment.” 2010. Web. 18 Mar 2019.

Vancouver:

Pagna Disso JF. A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment. [Internet] [Doctoral dissertation]. University of Bradford; 2010. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/10454/5248.

Council of Science Editors:

Pagna Disso JF. A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment. [Doctoral Dissertation]. University of Bradford; 2010. Available from: http://hdl.handle.net/10454/5248


Anna University

28. Kola Sujatha, P. Data mining approach for hybrid intrusion detection system; -.

Degree: Information and Communication Engineering, 2014, Anna University

An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system The… (more)

Subjects/Keywords: Data mining; Eccentric classifier; Hybrid intrusion detection system; Information and communication engineering; Intrusion detection system; Malicious behavior; Network attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kola Sujatha, P. (2014). Data mining approach for hybrid intrusion detection system; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/24762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kola Sujatha, P. “Data mining approach for hybrid intrusion detection system; -.” 2014. Thesis, Anna University. Accessed March 18, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/24762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kola Sujatha, P. “Data mining approach for hybrid intrusion detection system; -.” 2014. Web. 18 Mar 2019.

Vancouver:

Kola Sujatha P. Data mining approach for hybrid intrusion detection system; -. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Mar 18]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/24762.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kola Sujatha P. Data mining approach for hybrid intrusion detection system; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/24762

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

29. Fleming, Theodor. Network Intrusion and Detection : An evaluation of SNORT.

Degree: Computer and Information Science, 2018, Linköping University

  Network security has become a vital part for computer networks to ensure that they operate as expected. With many of today's services relying on… (more)

Subjects/Keywords: network intrusion detection system; intrusion detection system; snort; snort evaluation; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fleming, T. (2018). Network Intrusion and Detection : An evaluation of SNORT. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fleming, Theodor. “Network Intrusion and Detection : An evaluation of SNORT.” 2018. Thesis, Linköping University. Accessed March 18, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fleming, Theodor. “Network Intrusion and Detection : An evaluation of SNORT.” 2018. Web. 18 Mar 2019.

Vancouver:

Fleming T. Network Intrusion and Detection : An evaluation of SNORT. [Internet] [Thesis]. Linköping University; 2018. [cited 2019 Mar 18]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fleming T. Network Intrusion and Detection : An evaluation of SNORT. [Thesis]. Linköping University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

30. Šafář, Martin. Implementace shlukování regulárních výrazů pomocí MapReduce přístupu .

Degree: 2014, Brno University of Technology

 Hlavním přínosem této práce je návrh a implementace aplikace, která využívá model MapReduce a Apache Hadoop pro urychlení shlukování regulárních výrazů. V této prácí jsou… (more)

Subjects/Keywords: Intrusion Detection System; MapReduce; Hadoop; Shlukování regulárních výrazů; Intrusion Detection System; MapReduce; Hadoop; Regular expression grouping

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šafář, M. (2014). Implementace shlukování regulárních výrazů pomocí MapReduce přístupu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/53052

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šafář, Martin. “Implementace shlukování regulárních výrazů pomocí MapReduce přístupu .” 2014. Thesis, Brno University of Technology. Accessed March 18, 2019. http://hdl.handle.net/11012/53052.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šafář, Martin. “Implementace shlukování regulárních výrazů pomocí MapReduce přístupu .” 2014. Web. 18 Mar 2019.

Vancouver:

Šafář M. Implementace shlukování regulárních výrazů pomocí MapReduce přístupu . [Internet] [Thesis]. Brno University of Technology; 2014. [cited 2019 Mar 18]. Available from: http://hdl.handle.net/11012/53052.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šafář M. Implementace shlukování regulárních výrazů pomocí MapReduce přístupu . [Thesis]. Brno University of Technology; 2014. Available from: http://hdl.handle.net/11012/53052

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [23]

.