Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Ports of entry Security measures). Showing records 1 – 30 of 269620 total matches.

[1] [2] [3] [4] [5] … [8988]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


University of Oklahoma

1. Huck, Robert Charles. A Building Block Apporach to Port Security.

Degree: PhD, 2011, University of Oklahoma

 To accomplish this, a fully distributed building block approach to port security is demonstrated. Based on prior work accomplished in the design and fielding of… (more)

Subjects/Keywords: Ports of entry – Security measures; Intelligent transportation systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huck, R. C. (2011). A Building Block Apporach to Port Security. (Doctoral Dissertation). University of Oklahoma. Retrieved from http://hdl.handle.net/11244/319129

Chicago Manual of Style (16th Edition):

Huck, Robert Charles. “A Building Block Apporach to Port Security.” 2011. Doctoral Dissertation, University of Oklahoma. Accessed January 25, 2021. http://hdl.handle.net/11244/319129.

MLA Handbook (7th Edition):

Huck, Robert Charles. “A Building Block Apporach to Port Security.” 2011. Web. 25 Jan 2021.

Vancouver:

Huck RC. A Building Block Apporach to Port Security. [Internet] [Doctoral dissertation]. University of Oklahoma; 2011. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/11244/319129.

Council of Science Editors:

Huck RC. A Building Block Apporach to Port Security. [Doctoral Dissertation]. University of Oklahoma; 2011. Available from: http://hdl.handle.net/11244/319129


University of Oklahoma

2. Al Akkoumi, Mouhammad. HUMAN DETECTION AND TRACKING ENHANCING SECURITY SYSTEMS AT PORTS OF ENTRY.

Degree: PhD, 2011, University of Oklahoma

 The presented research focuses on two human detectors based on the histogram of oriented gradients detection approach and the Haar-like feature detection approach. According to… (more)

Subjects/Keywords: Ports of entry – Security measures; Electronic security systems; Target acquisition; Automatic tracking; Detectors

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Akkoumi, M. (2011). HUMAN DETECTION AND TRACKING ENHANCING SECURITY SYSTEMS AT PORTS OF ENTRY. (Doctoral Dissertation). University of Oklahoma. Retrieved from http://hdl.handle.net/11244/319204

Chicago Manual of Style (16th Edition):

Al Akkoumi, Mouhammad. “HUMAN DETECTION AND TRACKING ENHANCING SECURITY SYSTEMS AT PORTS OF ENTRY.” 2011. Doctoral Dissertation, University of Oklahoma. Accessed January 25, 2021. http://hdl.handle.net/11244/319204.

MLA Handbook (7th Edition):

Al Akkoumi, Mouhammad. “HUMAN DETECTION AND TRACKING ENHANCING SECURITY SYSTEMS AT PORTS OF ENTRY.” 2011. Web. 25 Jan 2021.

Vancouver:

Al Akkoumi M. HUMAN DETECTION AND TRACKING ENHANCING SECURITY SYSTEMS AT PORTS OF ENTRY. [Internet] [Doctoral dissertation]. University of Oklahoma; 2011. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/11244/319204.

Council of Science Editors:

Al Akkoumi M. HUMAN DETECTION AND TRACKING ENHANCING SECURITY SYSTEMS AT PORTS OF ENTRY. [Doctoral Dissertation]. University of Oklahoma; 2011. Available from: http://hdl.handle.net/11244/319204


Brock University

3. Nyarko, Cynthia. Canada/U.S. border crossing: facilitation and constraint .

Degree: Department of Sociology, 2004, Brock University

 Abstract The aim of this research project is to draw on accounts of experiences ofborder crossing and regulation at the Canada/U.S. border at Niagara in… (more)

Subjects/Keywords: Social justice.; Ports of entry – Canada.; Ports of entry – United States.; Ports of entry – Security measures – United States.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyarko, C. (2004). Canada/U.S. border crossing: facilitation and constraint . (Thesis). Brock University. Retrieved from http://hdl.handle.net/10464/1794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nyarko, Cynthia. “Canada/U.S. border crossing: facilitation and constraint .” 2004. Thesis, Brock University. Accessed January 25, 2021. http://hdl.handle.net/10464/1794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nyarko, Cynthia. “Canada/U.S. border crossing: facilitation and constraint .” 2004. Web. 25 Jan 2021.

Vancouver:

Nyarko C. Canada/U.S. border crossing: facilitation and constraint . [Internet] [Thesis]. Brock University; 2004. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10464/1794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nyarko C. Canada/U.S. border crossing: facilitation and constraint . [Thesis]. Brock University; 2004. Available from: http://hdl.handle.net/10464/1794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Mylett, Tom. Maritime domain awareness (MDA) and the Texas police peace officer: understanding the vulnerability and terrorist threat.

Degree: 2009, Sam Houston State University

Subjects/Keywords: national security; ports of entry; terrorism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mylett, T. (2009). Maritime domain awareness (MDA) and the Texas police peace officer: understanding the vulnerability and terrorist threat. (Thesis). Sam Houston State University. Retrieved from http://hdl.handle.net/20.500.11875/2110

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mylett, Tom. “Maritime domain awareness (MDA) and the Texas police peace officer: understanding the vulnerability and terrorist threat.” 2009. Thesis, Sam Houston State University. Accessed January 25, 2021. http://hdl.handle.net/20.500.11875/2110.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mylett, Tom. “Maritime domain awareness (MDA) and the Texas police peace officer: understanding the vulnerability and terrorist threat.” 2009. Web. 25 Jan 2021.

Vancouver:

Mylett T. Maritime domain awareness (MDA) and the Texas police peace officer: understanding the vulnerability and terrorist threat. [Internet] [Thesis]. Sam Houston State University; 2009. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/20.500.11875/2110.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mylett T. Maritime domain awareness (MDA) and the Texas police peace officer: understanding the vulnerability and terrorist threat. [Thesis]. Sam Houston State University; 2009. Available from: http://hdl.handle.net/20.500.11875/2110

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

5. Ng, Ned. The role of special port and trade zones in China.

Degree: 2008, University of Hong Kong

Subjects/Keywords: Ports of entry - China.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ng, N. (2008). The role of special port and trade zones in China. (Thesis). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/54563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ng, Ned. “The role of special port and trade zones in China.” 2008. Thesis, University of Hong Kong. Accessed January 25, 2021. http://hdl.handle.net/10722/54563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ng, Ned. “The role of special port and trade zones in China.” 2008. Web. 25 Jan 2021.

Vancouver:

Ng N. The role of special port and trade zones in China. [Internet] [Thesis]. University of Hong Kong; 2008. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10722/54563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ng N. The role of special port and trade zones in China. [Thesis]. University of Hong Kong; 2008. Available from: http://hdl.handle.net/10722/54563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kansas State University

6. Rickel, Frank Edgar. The Kansas port of entry system.

Degree: MS, 1942, Kansas State University

Subjects/Keywords: Ports of entry – Kansas.; Masters theses

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rickel, F. E. (1942). The Kansas port of entry system. (Masters Thesis). Kansas State University. Retrieved from http://hdl.handle.net/2097/24326

Chicago Manual of Style (16th Edition):

Rickel, Frank Edgar. “The Kansas port of entry system.” 1942. Masters Thesis, Kansas State University. Accessed January 25, 2021. http://hdl.handle.net/2097/24326.

MLA Handbook (7th Edition):

Rickel, Frank Edgar. “The Kansas port of entry system.” 1942. Web. 25 Jan 2021.

Vancouver:

Rickel FE. The Kansas port of entry system. [Internet] [Masters thesis]. Kansas State University; 1942. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/2097/24326.

Council of Science Editors:

Rickel FE. The Kansas port of entry system. [Masters Thesis]. Kansas State University; 1942. Available from: http://hdl.handle.net/2097/24326


Hong Kong University of Science and Technology

7. Li, Maocheng. Social network inference and privacy preserving trajectory publishing in mobile phone data.

Degree: 2012, Hong Kong University of Science and Technology

 Mobile phone data are collected communication logs between human beings. There are two interesting aspects and applications of the data: finding social structures and mobility… (more)

Subjects/Keywords: Data protection ; Online social networks  – Security measures ; Cell phones  – Security measures ; Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, M. (2012). Social network inference and privacy preserving trajectory publishing in mobile phone data. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-7858 ; https://doi.org/10.14711/thesis-b1180252 ; http://repository.ust.hk/ir/bitstream/1783.1-7858/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Maocheng. “Social network inference and privacy preserving trajectory publishing in mobile phone data.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed January 25, 2021. http://repository.ust.hk/ir/Record/1783.1-7858 ; https://doi.org/10.14711/thesis-b1180252 ; http://repository.ust.hk/ir/bitstream/1783.1-7858/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Maocheng. “Social network inference and privacy preserving trajectory publishing in mobile phone data.” 2012. Web. 25 Jan 2021.

Vancouver:

Li M. Social network inference and privacy preserving trajectory publishing in mobile phone data. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2021 Jan 25]. Available from: http://repository.ust.hk/ir/Record/1783.1-7858 ; https://doi.org/10.14711/thesis-b1180252 ; http://repository.ust.hk/ir/bitstream/1783.1-7858/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li M. Social network inference and privacy preserving trajectory publishing in mobile phone data. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: http://repository.ust.hk/ir/Record/1783.1-7858 ; https://doi.org/10.14711/thesis-b1180252 ; http://repository.ust.hk/ir/bitstream/1783.1-7858/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

8. Syed, Madiha Haider. MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS.

Degree: 2019, Florida Atlantic University

Software systems increasingly interact with each other, forming ecosystems. Cloud is one such ecosystem that has evolved and enabled other technologies like IoT and containers.… (more)

Subjects/Keywords: Software ecosystems; Cloud computing – Security measures; Internet of things; Software architecture – Security measures; Computer modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Syed, M. H. (2019). MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS. (Thesis). Florida Atlantic University. Retrieved from http://fau.digital.flvc.org/islandora/object/fau:41965

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Syed, Madiha Haider. “MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS.” 2019. Thesis, Florida Atlantic University. Accessed January 25, 2021. http://fau.digital.flvc.org/islandora/object/fau:41965.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Syed, Madiha Haider. “MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS.” 2019. Web. 25 Jan 2021.

Vancouver:

Syed MH. MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS. [Internet] [Thesis]. Florida Atlantic University; 2019. [cited 2021 Jan 25]. Available from: http://fau.digital.flvc.org/islandora/object/fau:41965.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Syed MH. MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS. [Thesis]. Florida Atlantic University; 2019. Available from: http://fau.digital.flvc.org/islandora/object/fau:41965

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Northeastern University

9. Cassola, Aldo. Providing privacy from the residential cloud.

Degree: PhD, Department of Computer Science, 2015, Northeastern University

 The growth of mobile devices and computing has continued in recent years to the point where mobile network providers must not only upgrade their networks… (more)

Subjects/Keywords: anonymity; broadband; privacy; residential; security; Wi-Fi; Computer Sciences; Computer networks; Security measures; Web services; Security measures; Cloud computing; Security measures; Mobile computing; Security measures; Wireless LANs; Security measures; Broadband communication systems; Security measures; Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cassola, A. (2015). Providing privacy from the residential cloud. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/d20128811

Chicago Manual of Style (16th Edition):

Cassola, Aldo. “Providing privacy from the residential cloud.” 2015. Doctoral Dissertation, Northeastern University. Accessed January 25, 2021. http://hdl.handle.net/2047/d20128811.

MLA Handbook (7th Edition):

Cassola, Aldo. “Providing privacy from the residential cloud.” 2015. Web. 25 Jan 2021.

Vancouver:

Cassola A. Providing privacy from the residential cloud. [Internet] [Doctoral dissertation]. Northeastern University; 2015. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/2047/d20128811.

Council of Science Editors:

Cassola A. Providing privacy from the residential cloud. [Doctoral Dissertation]. Northeastern University; 2015. Available from: http://hdl.handle.net/2047/d20128811


Cape Peninsula University of Technology

10. Molema, Karabo Omphile. The conflict of interest between data sharing and data privacy : a middleware approach .

Degree: 2016, Cape Peninsula University of Technology

 People who are referred to as data owners in this study, use the Internet for various purposes and one of those is using online services… (more)

Subjects/Keywords: Computer security; Data protection; Computer networks  – Security measures; Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Molema, K. O. (2016). The conflict of interest between data sharing and data privacy : a middleware approach . (Thesis). Cape Peninsula University of Technology. Retrieved from http://etd.cput.ac.za/handle/20.500.11838/2415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Molema, Karabo Omphile. “The conflict of interest between data sharing and data privacy : a middleware approach .” 2016. Thesis, Cape Peninsula University of Technology. Accessed January 25, 2021. http://etd.cput.ac.za/handle/20.500.11838/2415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Molema, Karabo Omphile. “The conflict of interest between data sharing and data privacy : a middleware approach .” 2016. Web. 25 Jan 2021.

Vancouver:

Molema KO. The conflict of interest between data sharing and data privacy : a middleware approach . [Internet] [Thesis]. Cape Peninsula University of Technology; 2016. [cited 2021 Jan 25]. Available from: http://etd.cput.ac.za/handle/20.500.11838/2415.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Molema KO. The conflict of interest between data sharing and data privacy : a middleware approach . [Thesis]. Cape Peninsula University of Technology; 2016. Available from: http://etd.cput.ac.za/handle/20.500.11838/2415

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

11. Szyniszewska, Anna M. Analyzing Seasonal Risk Indicators of Mediterranean Fruit Fly Ceratitis Capitata (Medfly) Importation into Florida via Commodity Imports and Passenger Traffic.

Degree: PhD, Geography, 2013, University of Florida

 Mediterranean fruit fly (Medfly) is considered to be one of the most destructive invasive pests. It is highly polyphagus and widely spread across the world.… (more)

Subjects/Keywords: Airports; Commodities; Datasets; Fruit flies; Imports; Modeling; Passengers; Pests; Ports of entry; Species; distribution  – imports  – invasive  – maxent  – medfly  – niche  – passenger  – risk  – seasonality; City of Miami ( local )

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Szyniszewska, A. M. (2013). Analyzing Seasonal Risk Indicators of Mediterranean Fruit Fly Ceratitis Capitata (Medfly) Importation into Florida via Commodity Imports and Passenger Traffic. (Doctoral Dissertation). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0046114

Chicago Manual of Style (16th Edition):

Szyniszewska, Anna M. “Analyzing Seasonal Risk Indicators of Mediterranean Fruit Fly Ceratitis Capitata (Medfly) Importation into Florida via Commodity Imports and Passenger Traffic.” 2013. Doctoral Dissertation, University of Florida. Accessed January 25, 2021. https://ufdc.ufl.edu/UFE0046114.

MLA Handbook (7th Edition):

Szyniszewska, Anna M. “Analyzing Seasonal Risk Indicators of Mediterranean Fruit Fly Ceratitis Capitata (Medfly) Importation into Florida via Commodity Imports and Passenger Traffic.” 2013. Web. 25 Jan 2021.

Vancouver:

Szyniszewska AM. Analyzing Seasonal Risk Indicators of Mediterranean Fruit Fly Ceratitis Capitata (Medfly) Importation into Florida via Commodity Imports and Passenger Traffic. [Internet] [Doctoral dissertation]. University of Florida; 2013. [cited 2021 Jan 25]. Available from: https://ufdc.ufl.edu/UFE0046114.

Council of Science Editors:

Szyniszewska AM. Analyzing Seasonal Risk Indicators of Mediterranean Fruit Fly Ceratitis Capitata (Medfly) Importation into Florida via Commodity Imports and Passenger Traffic. [Doctoral Dissertation]. University of Florida; 2013. Available from: https://ufdc.ufl.edu/UFE0046114


University of Florida

12. Bible, Ryan Lee. The Theatrical Lighting Design for the Production of Measure for Measure.

Degree: 2013, University of Florida

Measure for Measure by William Shakespeare was a realized dramatic production that

Subjects/Keywords: Aluminum; Container terminals; Diameters; Lamps; Lighting design; Lumens; Ports of entry; Shutters; Theater; Types of ports

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bible, R. L. (2013). The Theatrical Lighting Design for the Production of Measure for Measure. (Thesis). University of Florida. Retrieved from https://ufdc.ufl.edu/AA00016990

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bible, Ryan Lee. “The Theatrical Lighting Design for the Production of Measure for Measure.” 2013. Thesis, University of Florida. Accessed January 25, 2021. https://ufdc.ufl.edu/AA00016990.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bible, Ryan Lee. “The Theatrical Lighting Design for the Production of Measure for Measure.” 2013. Web. 25 Jan 2021.

Vancouver:

Bible RL. The Theatrical Lighting Design for the Production of Measure for Measure. [Internet] [Thesis]. University of Florida; 2013. [cited 2021 Jan 25]. Available from: https://ufdc.ufl.edu/AA00016990.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bible RL. The Theatrical Lighting Design for the Production of Measure for Measure. [Thesis]. University of Florida; 2013. Available from: https://ufdc.ufl.edu/AA00016990

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vilnius University

13. Timofejevaitė, Raminta. Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis.

Degree: Master, 2014, Vilnius University

Šiame darbe nagrinėjamas socialinės apsaugos priemonių nedarbo rizikos atveju taikymas. Atskleidžiama nedarbo, kaip socialinės rizikos, samprata ir neigiama įtaka valstybės ekonominei raidai ir gerovei. Apžvelgiamas… (more)

Subjects/Keywords: Social protection; Social risk; Unemployment; Active social security measures; Passive social security measures; Experience of Lithuania; Experience of foreign countries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Timofejevaitė, Raminta. (2014). Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis. (Masters Thesis). Vilnius University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Timofejevaitė, Raminta. “Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis.” 2014. Masters Thesis, Vilnius University. Accessed January 25, 2021. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Timofejevaitė, Raminta. “Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis.” 2014. Web. 25 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Timofejevaitė, Raminta. Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis. [Internet] [Masters thesis]. Vilnius University; 2014. [cited 2021 Jan 25]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Timofejevaitė, Raminta. Socialinės apsaugos priemonės nedarbo rizikos atveju: Lietuvos ir užsienio valstybių patirtis. [Masters Thesis]. Vilnius University; 2014. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140627_180528-10323 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

14. Neshenko, Nataliia. A Network Telescope Approach for Inferring and Characterizing IoT Exploitations.

Degree: MS, 2018, Florida Atlantic University

While the seamless interconnection of IoT devices with the physical realm is envisioned to bring a plethora of critical improvements on many aspects and in… (more)

Subjects/Keywords: Internet of things.; Internet of things – Security measures.; Cyber intelligence (Computer security)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Neshenko, N. (2018). A Network Telescope Approach for Inferring and Characterizing IoT Exploitations. (Masters Thesis). Florida Atlantic University. Retrieved from http://fau.digital.flvc.org/islandora/object/fau:40745

Chicago Manual of Style (16th Edition):

Neshenko, Nataliia. “A Network Telescope Approach for Inferring and Characterizing IoT Exploitations.” 2018. Masters Thesis, Florida Atlantic University. Accessed January 25, 2021. http://fau.digital.flvc.org/islandora/object/fau:40745.

MLA Handbook (7th Edition):

Neshenko, Nataliia. “A Network Telescope Approach for Inferring and Characterizing IoT Exploitations.” 2018. Web. 25 Jan 2021.

Vancouver:

Neshenko N. A Network Telescope Approach for Inferring and Characterizing IoT Exploitations. [Internet] [Masters thesis]. Florida Atlantic University; 2018. [cited 2021 Jan 25]. Available from: http://fau.digital.flvc.org/islandora/object/fau:40745.

Council of Science Editors:

Neshenko N. A Network Telescope Approach for Inferring and Characterizing IoT Exploitations. [Masters Thesis]. Florida Atlantic University; 2018. Available from: http://fau.digital.flvc.org/islandora/object/fau:40745


Nelson Mandela Metropolitan University

15. Naudé, Kevin Alexander. Assessing program code through static structural similarity.

Degree: MSc, Faculty of Science, 2007, Nelson Mandela Metropolitan University

 Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been… (more)

Subjects/Keywords: Computer networks  – Security measures; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naudé, K. A. (2007). Assessing program code through static structural similarity. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/578

Chicago Manual of Style (16th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed January 25, 2021. http://hdl.handle.net/10948/578.

MLA Handbook (7th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Web. 25 Jan 2021.

Vancouver:

Naudé KA. Assessing program code through static structural similarity. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10948/578.

Council of Science Editors:

Naudé KA. Assessing program code through static structural similarity. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/578


University of Johannesburg

16. Tolnai, Annette. ISAP - an information security awareness portal.

Degree: 2010, University of Johannesburg

M.Sc.

The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a… (more)

Subjects/Keywords: Computer security; Internet security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2010). ISAP - an information security awareness portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Thesis, University of Johannesburg. Accessed January 25, 2021. http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Web. 25 Jan 2021.

Vancouver:

Tolnai A. ISAP - an information security awareness portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. ISAP - an information security awareness portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

17. Lambropoulos, David, 1991-. Leveraging psychological framing of warning messages to improve user security on smartphones.

Degree: MS, Electrical and Computer Engineering, 2018, Rutgers University

 The current way in which Android warns users about the capabilities their apps request, do not effectively warn users about their security risks. This work… (more)

Subjects/Keywords: Smartphones – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lambropoulos, David, 1. (2018). Leveraging psychological framing of warning messages to improve user security on smartphones. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/59153/

Chicago Manual of Style (16th Edition):

Lambropoulos, David, 1991-. “Leveraging psychological framing of warning messages to improve user security on smartphones.” 2018. Masters Thesis, Rutgers University. Accessed January 25, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/59153/.

MLA Handbook (7th Edition):

Lambropoulos, David, 1991-. “Leveraging psychological framing of warning messages to improve user security on smartphones.” 2018. Web. 25 Jan 2021.

Vancouver:

Lambropoulos, David 1. Leveraging psychological framing of warning messages to improve user security on smartphones. [Internet] [Masters thesis]. Rutgers University; 2018. [cited 2021 Jan 25]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/59153/.

Council of Science Editors:

Lambropoulos, David 1. Leveraging psychological framing of warning messages to improve user security on smartphones. [Masters Thesis]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/59153/


Massey University

18. Alavizadeh, Hooman. Effective security analysis for combinations of MTD techniques on cloud computing : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy (Ph.D.) in Computer Science, Massey University .

Degree: 2019, Massey University

 Moving Target Defense (MTD) is an emerging security mechanism that can introduce a dynamic defensive layer for a given system by changing the attack surface.… (more)

Subjects/Keywords: Cloud computing; Computer networks; Internet; Security measures; Computer security; Dean's List of Exceptional Theses

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alavizadeh, H. (2019). Effective security analysis for combinations of MTD techniques on cloud computing : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy (Ph.D.) in Computer Science, Massey University . (Thesis). Massey University. Retrieved from http://hdl.handle.net/10179/15238

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alavizadeh, Hooman. “Effective security analysis for combinations of MTD techniques on cloud computing : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy (Ph.D.) in Computer Science, Massey University .” 2019. Thesis, Massey University. Accessed January 25, 2021. http://hdl.handle.net/10179/15238.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alavizadeh, Hooman. “Effective security analysis for combinations of MTD techniques on cloud computing : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy (Ph.D.) in Computer Science, Massey University .” 2019. Web. 25 Jan 2021.

Vancouver:

Alavizadeh H. Effective security analysis for combinations of MTD techniques on cloud computing : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy (Ph.D.) in Computer Science, Massey University . [Internet] [Thesis]. Massey University; 2019. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10179/15238.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alavizadeh H. Effective security analysis for combinations of MTD techniques on cloud computing : a thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy (Ph.D.) in Computer Science, Massey University . [Thesis]. Massey University; 2019. Available from: http://hdl.handle.net/10179/15238

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Missouri – Kansas City

19. Pakhare, Swatesh V. VELOCITY : A NetFlow Based Optimized Geo-IP Lookup Tool.

Degree: 2016, University of Missouri – Kansas City

 It is a challenging task for network administrators to monitor their institution's network against undesirable behavior. While NetFlow is useful to gather flow-level data for… (more)

Subjects/Keywords: Computer networks  – Security measures; Thesis  – University of Missouri – Kansas City  – Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pakhare, S. V. (2016). VELOCITY : A NetFlow Based Optimized Geo-IP Lookup Tool. (Thesis). University of Missouri – Kansas City. Retrieved from http://hdl.handle.net/10355/50842

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pakhare, Swatesh V. “VELOCITY : A NetFlow Based Optimized Geo-IP Lookup Tool.” 2016. Thesis, University of Missouri – Kansas City. Accessed January 25, 2021. http://hdl.handle.net/10355/50842.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pakhare, Swatesh V. “VELOCITY : A NetFlow Based Optimized Geo-IP Lookup Tool.” 2016. Web. 25 Jan 2021.

Vancouver:

Pakhare SV. VELOCITY : A NetFlow Based Optimized Geo-IP Lookup Tool. [Internet] [Thesis]. University of Missouri – Kansas City; 2016. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10355/50842.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pakhare SV. VELOCITY : A NetFlow Based Optimized Geo-IP Lookup Tool. [Thesis]. University of Missouri – Kansas City; 2016. Available from: http://hdl.handle.net/10355/50842

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

20. Davis, Michael Reginald. Categorising Network Telescope data using big data enrichment techniques.

Degree: Faculty of Science, Computer Science, 2019, Rhodes University

 Network Telescopes, Internet backbone sampling, IDS and other forms of network-sourced Threat Intelligence provide researchers with insight into the methods and intent of remote entities… (more)

Subjects/Keywords: Denial of service attacks; Big data; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, M. R. (2019). Categorising Network Telescope data using big data enrichment techniques. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/92941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Davis, Michael Reginald. “Categorising Network Telescope data using big data enrichment techniques.” 2019. Thesis, Rhodes University. Accessed January 25, 2021. http://hdl.handle.net/10962/92941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Davis, Michael Reginald. “Categorising Network Telescope data using big data enrichment techniques.” 2019. Web. 25 Jan 2021.

Vancouver:

Davis MR. Categorising Network Telescope data using big data enrichment techniques. [Internet] [Thesis]. Rhodes University; 2019. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10962/92941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Davis MR. Categorising Network Telescope data using big data enrichment techniques. [Thesis]. Rhodes University; 2019. Available from: http://hdl.handle.net/10962/92941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Massey University

21. Li, Ping. Novel lightweight ciphertext-policy attribute-based encryption for IoT applications.

Degree: Master of Information Science, 2018, Massey University

 As more sensitive data are frequently shared over the Internet of Things (IoT) network, the confidentiality and security of IoT should be given special consideration.… (more)

Subjects/Keywords: Internet of things; Security measures; Data encryption (Computer science); Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, P. (2018). Novel lightweight ciphertext-policy attribute-based encryption for IoT applications. (Masters Thesis). Massey University. Retrieved from http://hdl.handle.net/10179/15198

Chicago Manual of Style (16th Edition):

Li, Ping. “Novel lightweight ciphertext-policy attribute-based encryption for IoT applications.” 2018. Masters Thesis, Massey University. Accessed January 25, 2021. http://hdl.handle.net/10179/15198.

MLA Handbook (7th Edition):

Li, Ping. “Novel lightweight ciphertext-policy attribute-based encryption for IoT applications.” 2018. Web. 25 Jan 2021.

Vancouver:

Li P. Novel lightweight ciphertext-policy attribute-based encryption for IoT applications. [Internet] [Masters thesis]. Massey University; 2018. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10179/15198.

Council of Science Editors:

Li P. Novel lightweight ciphertext-policy attribute-based encryption for IoT applications. [Masters Thesis]. Massey University; 2018. Available from: http://hdl.handle.net/10179/15198


Rhodes University

22. Mayisela, Simphiwe Hector. Data-centric security : towards a utopian model for protecting corporate data on mobile devices.

Degree: Faculty of Science, Computer Science, 2014, Rhodes University

 Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures; Mobile communication systems  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mayisela, S. H. (2014). Data-centric security : towards a utopian model for protecting corporate data on mobile devices. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Thesis, Rhodes University. Accessed January 25, 2021. http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Web. 25 Jan 2021.

Vancouver:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Internet] [Thesis]. Rhodes University; 2014. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Thesis]. Rhodes University; 2014. Available from: http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Macquarie University

23. Pal, Shantanu. Design and development of an access control architecture for the Internet of Things.

Degree: 2019, Macquarie University

Empirical thesis.

Bibliography: pages 263-311.

1. Introduction  – 2. Background and related work  – 3. Developing an IoT access control architecture  – 4. System implementation… (more)

Subjects/Keywords: Internet of things  – Security measures  – Mathematical models; Internet  – Access control  – Security measures; Computer architecture  – Design and construction; Internet of Things; access control; architecture design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pal, S. (2019). Design and development of an access control architecture for the Internet of Things. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1271424

Chicago Manual of Style (16th Edition):

Pal, Shantanu. “Design and development of an access control architecture for the Internet of Things.” 2019. Doctoral Dissertation, Macquarie University. Accessed January 25, 2021. http://hdl.handle.net/1959.14/1271424.

MLA Handbook (7th Edition):

Pal, Shantanu. “Design and development of an access control architecture for the Internet of Things.” 2019. Web. 25 Jan 2021.

Vancouver:

Pal S. Design and development of an access control architecture for the Internet of Things. [Internet] [Doctoral dissertation]. Macquarie University; 2019. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/1959.14/1271424.

Council of Science Editors:

Pal S. Design and development of an access control architecture for the Internet of Things. [Doctoral Dissertation]. Macquarie University; 2019. Available from: http://hdl.handle.net/1959.14/1271424


Nelson Mandela Metropolitan University

24. Coertze, Jacques Jacobus. A framework for information security governance in SMMEs.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved… (more)

Subjects/Keywords: Business  – Data processing  – Security measures; Management information systems  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coertze, J. J. (2012). A framework for information security governance in SMMEs. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed January 25, 2021. http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Web. 25 Jan 2021.

Vancouver:

Coertze JJ. A framework for information security governance in SMMEs. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coertze JJ. A framework for information security governance in SMMEs. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

25. Frauenstein, Edwin Donald. A framework to mitigate phishing threats.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld… (more)

Subjects/Keywords: Computer networks  – Security measures; Mobile computing  – Security measures; Online social networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frauenstein, E. D. (2013). A framework to mitigate phishing threats. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed January 25, 2021. http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Web. 25 Jan 2021.

Vancouver:

Frauenstein ED. A framework to mitigate phishing threats. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frauenstein ED. A framework to mitigate phishing threats. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

26. Diakite, Soumaila Dit Moule. WISP: a wireless information security portal.

Degree: 2010, University of Johannesburg

M.Sc.

Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless… (more)

Subjects/Keywords: Wireless communication systems security measures; Wireless LANs security measures; Computer networks security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diakite, S. D. M. (2010). WISP: a wireless information security portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Thesis, University of Johannesburg. Accessed January 25, 2021. http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Web. 25 Jan 2021.

Vancouver:

Diakite SDM. WISP: a wireless information security portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diakite SDM. WISP: a wireless information security portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

27. Al-Rejleh, Mohamad Oubai. Privacy by design : principles as a foundation to a more secure Internet of Things:.

Degree: 2016, Ryerson University

 The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and… (more)

Subjects/Keywords:

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Rejleh, M. O. (2016). Privacy by design : principles as a foundation to a more secure Internet of Things:. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A5809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al-Rejleh, Mohamad Oubai. “Privacy by design : principles as a foundation to a more secure Internet of Things:.” 2016. Thesis, Ryerson University. Accessed January 25, 2021. https://digital.library.ryerson.ca/islandora/object/RULA%3A5809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al-Rejleh, Mohamad Oubai. “Privacy by design : principles as a foundation to a more secure Internet of Things:.” 2016. Web. 25 Jan 2021.

Vancouver:

Al-Rejleh MO. Privacy by design : principles as a foundation to a more secure Internet of Things:. [Internet] [Thesis]. Ryerson University; 2016. [cited 2021 Jan 25]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A5809.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al-Rejleh MO. Privacy by design : principles as a foundation to a more secure Internet of Things:. [Thesis]. Ryerson University; 2016. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A5809

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Missouri – Kansas City

28. Almansoori, Mohammed. Smart City Open Data Network System: Openness, Security, and Privacy.

Degree: 2017, University of Missouri – Kansas City

 The increasing concentration of population around the cities poses challenges in their operation and services. On the other hand, the current technological revolution allows scalable… (more)

Subjects/Keywords: Computer networks; Computer networks  – Security measures; Thesis  – University of Missouri – Kansas City  – Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almansoori, M. (2017). Smart City Open Data Network System: Openness, Security, and Privacy. (Thesis). University of Missouri – Kansas City. Retrieved from http://hdl.handle.net/10355/64419

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Almansoori, Mohammed. “Smart City Open Data Network System: Openness, Security, and Privacy.” 2017. Thesis, University of Missouri – Kansas City. Accessed January 25, 2021. http://hdl.handle.net/10355/64419.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Almansoori, Mohammed. “Smart City Open Data Network System: Openness, Security, and Privacy.” 2017. Web. 25 Jan 2021.

Vancouver:

Almansoori M. Smart City Open Data Network System: Openness, Security, and Privacy. [Internet] [Thesis]. University of Missouri – Kansas City; 2017. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10355/64419.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Almansoori M. Smart City Open Data Network System: Openness, Security, and Privacy. [Thesis]. University of Missouri – Kansas City; 2017. Available from: http://hdl.handle.net/10355/64419

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

29. Skolmen, Dayne Edward. Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2016, Nelson Mandela Metropolitan University

 Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the… (more)

Subjects/Keywords: Cloud computing  – Security measures; Data protection  – Law and legislation  – South Africa; Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Skolmen, D. E. (2016). Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/12747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Skolmen, Dayne Edward. “Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption.” 2016. Thesis, Nelson Mandela Metropolitan University. Accessed January 25, 2021. http://hdl.handle.net/10948/12747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Skolmen, Dayne Edward. “Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption.” 2016. Web. 25 Jan 2021.

Vancouver:

Skolmen DE. Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2016. [cited 2021 Jan 25]. Available from: http://hdl.handle.net/10948/12747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Skolmen DE. Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption. [Thesis]. Nelson Mandela Metropolitan University; 2016. Available from: http://hdl.handle.net/10948/12747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

30. Shu, Jiayu CSE. Building intelligent mobile camera systems : visual privacy by design meets social interaction.

Degree: 2019, Hong Kong University of Science and Technology

 In recent years, cameras become ubiquitous in smartphones, smart glasses, IoT devices, and surveillance systems. By seeing the physical world and capturing beyond what humans… (more)

Subjects/Keywords: Data protection ; Privacy, Right of ; Data processing ; Digital cameras ; Security measures ; Social networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shu, J. C. (2019). Building intelligent mobile camera systems : visual privacy by design meets social interaction. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-102368 ; https://doi.org/10.14711/thesis-991012757567903412 ; http://repository.ust.hk/ir/bitstream/1783.1-102368/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shu, Jiayu CSE. “Building intelligent mobile camera systems : visual privacy by design meets social interaction.” 2019. Thesis, Hong Kong University of Science and Technology. Accessed January 25, 2021. http://repository.ust.hk/ir/Record/1783.1-102368 ; https://doi.org/10.14711/thesis-991012757567903412 ; http://repository.ust.hk/ir/bitstream/1783.1-102368/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shu, Jiayu CSE. “Building intelligent mobile camera systems : visual privacy by design meets social interaction.” 2019. Web. 25 Jan 2021.

Vancouver:

Shu JC. Building intelligent mobile camera systems : visual privacy by design meets social interaction. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2019. [cited 2021 Jan 25]. Available from: http://repository.ust.hk/ir/Record/1783.1-102368 ; https://doi.org/10.14711/thesis-991012757567903412 ; http://repository.ust.hk/ir/bitstream/1783.1-102368/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shu JC. Building intelligent mobile camera systems : visual privacy by design meets social interaction. [Thesis]. Hong Kong University of Science and Technology; 2019. Available from: http://repository.ust.hk/ir/Record/1783.1-102368 ; https://doi.org/10.14711/thesis-991012757567903412 ; http://repository.ust.hk/ir/bitstream/1783.1-102368/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [8988]

.