Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Security ). Showing records 1 – 30 of 15460 total matches.

[1] [2] [3] [4] [5] … [516]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters

1. Küpçü, Alptekin. Efficient Cryptography for the Next Generation Secure Cloud.

Degree: PhD, Computer Science, 2010, Brown University

 Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since… (more)

Subjects/Keywords: security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Küpçü, A. (2010). Efficient Cryptography for the Next Generation Secure Cloud. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:11123/

Chicago Manual of Style (16th Edition):

Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure Cloud.” 2010. Doctoral Dissertation, Brown University. Accessed January 21, 2021. https://repository.library.brown.edu/studio/item/bdr:11123/.

MLA Handbook (7th Edition):

Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure Cloud.” 2010. Web. 21 Jan 2021.

Vancouver:

Küpçü A. Efficient Cryptography for the Next Generation Secure Cloud. [Internet] [Doctoral dissertation]. Brown University; 2010. [cited 2021 Jan 21]. Available from: https://repository.library.brown.edu/studio/item/bdr:11123/.

Council of Science Editors:

Küpçü A. Efficient Cryptography for the Next Generation Secure Cloud. [Doctoral Dissertation]. Brown University; 2010. Available from: https://repository.library.brown.edu/studio/item/bdr:11123/


University of Colorado

2. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed January 21, 2021. https://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 21 Jan 2021.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2021 Jan 21]. Available from: https://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: https://scholar.colorado.edu/csci_gradetds/69


George Mason University

3. Vella, Andre`. From National Security to Environmental Security: A Historical Overview .

Degree: 2012, George Mason University

 The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow… (more)

Subjects/Keywords: Environmental Security; National Security; Security; Environment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vella, A. (2012). From National Security to Environmental Security: A Historical Overview . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7528

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vella, Andre`. “From National Security to Environmental Security: A Historical Overview .” 2012. Thesis, George Mason University. Accessed January 21, 2021. http://hdl.handle.net/1920/7528.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vella, Andre`. “From National Security to Environmental Security: A Historical Overview .” 2012. Web. 21 Jan 2021.

Vancouver:

Vella A. From National Security to Environmental Security: A Historical Overview . [Internet] [Thesis]. George Mason University; 2012. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/1920/7528.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vella A. From National Security to Environmental Security: A Historical Overview . [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7528

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

4. Deng, Yipan. DeviceGuard: External Device-Assisted System And Data Security.

Degree: MS, Computer Science, 2011, Virginia Tech

 This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such… (more)

Subjects/Keywords: Host Security; System Security; Data Security; Smartphone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deng, Y. (2011). DeviceGuard: External Device-Assisted System And Data Security. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76767

Chicago Manual of Style (16th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Masters Thesis, Virginia Tech. Accessed January 21, 2021. http://hdl.handle.net/10919/76767.

MLA Handbook (7th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Web. 21 Jan 2021.

Vancouver:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10919/76767.

Council of Science Editors:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76767


University of Cincinnati

5. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed January 21, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 21 Jan 2021.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2021 Jan 21]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234


Penn State University

6. Ren, Chuangang. A Study of Selected Issues in Android Security.

Degree: 2016, Penn State University

 Mobile devices such as smartphones have become an integral part of society today, shaping people’s daily life, changing the landscape of how business operate and… (more)

Subjects/Keywords: Android; Computer Security; Android Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ren, C. (2016). A Study of Selected Issues in Android Security. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/b5644r534

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Thesis, Penn State University. Accessed January 21, 2021. https://submit-etda.libraries.psu.edu/catalog/b5644r534.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Web. 21 Jan 2021.

Vancouver:

Ren C. A Study of Selected Issues in Android Security. [Internet] [Thesis]. Penn State University; 2016. [cited 2021 Jan 21]. Available from: https://submit-etda.libraries.psu.edu/catalog/b5644r534.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ren C. A Study of Selected Issues in Android Security. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/b5644r534

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

7. Hunny, Umme. Orthogonal Security Defect Classification for Secure Software Development .

Degree: Computing, 2012, Queens University

Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than… (more)

Subjects/Keywords: Security defect classification ; Software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hunny, U. (2012). Orthogonal Security Defect Classification for Secure Software Development . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Thesis, Queens University. Accessed January 21, 2021. http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Web. 21 Jan 2021.

Vancouver:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Internet] [Thesis]. Queens University; 2012. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Thesis]. Queens University; 2012. Available from: http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

8. Van der Merwe, Isak Pieter. Rolprofiele vir die bestuur van inligtingsekerheid.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The aim of this study is to introduce a model that can be used to manage the security profiles by using a role… (more)

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, I. P. (2014). Rolprofiele vir die bestuur van inligtingsekerheid. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Thesis, University of Johannesburg. Accessed January 21, 2021. http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Web. 21 Jan 2021.

Vancouver:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

9. Tolnai, Annette. ISAP - an information security awareness portal.

Degree: 2010, University of Johannesburg

M.Sc.

The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a… (more)

Subjects/Keywords: Computer security; Internet security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2010). ISAP - an information security awareness portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Thesis, University of Johannesburg. Accessed January 21, 2021. http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Web. 21 Jan 2021.

Vancouver:

Tolnai A. ISAP - an information security awareness portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. ISAP - an information security awareness portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Liberty University

10. Bass, Chelsea. Flying Thru Security.

Degree: 2017, Liberty University

 Due to the Transportation Security Act (TSA), which passed in November 2011, airport security has drastically changed. The new security checkpoint practices have caused security(more)

Subjects/Keywords: Airport Security; Airport Security Solutions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bass, C. (2017). Flying Thru Security. (Masters Thesis). Liberty University. Retrieved from http://digitalcommons.liberty.edu/masters/461

Chicago Manual of Style (16th Edition):

Bass, Chelsea. “Flying Thru Security.” 2017. Masters Thesis, Liberty University. Accessed January 21, 2021. http://digitalcommons.liberty.edu/masters/461.

MLA Handbook (7th Edition):

Bass, Chelsea. “Flying Thru Security.” 2017. Web. 21 Jan 2021.

Vancouver:

Bass C. Flying Thru Security. [Internet] [Masters thesis]. Liberty University; 2017. [cited 2021 Jan 21]. Available from: http://digitalcommons.liberty.edu/masters/461.

Council of Science Editors:

Bass C. Flying Thru Security. [Masters Thesis]. Liberty University; 2017. Available from: http://digitalcommons.liberty.edu/masters/461


University of Ghana

11. Otoo, C.K. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.

Degree: 2016, University of Ghana

 In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex… (more)

Subjects/Keywords: Cybersecurity; National Security; Human Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Otoo, C. K. (2016). Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. (Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/27439

Chicago Manual of Style (16th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Masters Thesis, University of Ghana. Accessed January 21, 2021. http://ugspace.ug.edu.gh/handle/123456789/27439.

MLA Handbook (7th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Web. 21 Jan 2021.

Vancouver:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Internet] [Masters thesis]. University of Ghana; 2016. [cited 2021 Jan 21]. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439.

Council of Science Editors:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Masters Thesis]. University of Ghana; 2016. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439


Halmstad University

12. Rojas, Jose Enrique Charpentier. Web application Security.

Degree: Computer and Electrical Engineering (IDE), 2013, Halmstad University

  Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and… (more)

Subjects/Keywords: Web Application Security; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rojas, J. E. C. (2013). Web application Security. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Thesis, Halmstad University. Accessed January 21, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Web. 21 Jan 2021.

Vancouver:

Rojas JEC. Web application Security. [Internet] [Thesis]. Halmstad University; 2013. [cited 2021 Jan 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rojas JEC. Web application Security. [Thesis]. Halmstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Florida

13. Garrett, Keith. Vulnerabililty Analysis of Multi-Factor Authentication Protocols.

Degree: 2016, University of North Florida

 In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those… (more)

Subjects/Keywords: clogging attack security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garrett, K. (2016). Vulnerabililty Analysis of Multi-Factor Authentication Protocols. (Thesis). University of North Florida. Retrieved from https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Thesis, University of North Florida. Accessed January 21, 2021. https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Web. 21 Jan 2021.

Vancouver:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Internet] [Thesis]. University of North Florida; 2016. [cited 2021 Jan 21]. Available from: https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Thesis]. University of North Florida; 2016. Available from: https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Peng, Jinghui. Secure covert communications over streaming media using dynamic steganography.

Degree: PhD, 2020, University of West London

 Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems… (more)

Subjects/Keywords: Cyber security; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peng, J. (2020). Secure covert communications over streaming media using dynamic steganography. (Doctoral Dissertation). University of West London. Retrieved from http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261

Chicago Manual of Style (16th Edition):

Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Doctoral Dissertation, University of West London. Accessed January 21, 2021. http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.

MLA Handbook (7th Edition):

Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Web. 21 Jan 2021.

Vancouver:

Peng J. Secure covert communications over streaming media using dynamic steganography. [Internet] [Doctoral dissertation]. University of West London; 2020. [cited 2021 Jan 21]. Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.

Council of Science Editors:

Peng J. Secure covert communications over streaming media using dynamic steganography. [Doctoral Dissertation]. University of West London; 2020. Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261


Rochester Institute of Technology

15. Hirwani, Manish. Forensic analysis of VMware hard disks.

Degree: 2011, Rochester Institute of Technology

 With the advancement in virtualization technology, virtual machines (VMs) are becoming a common and an integral part of datacenters. As the popularity and use of… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirwani, M. (2011). Forensic analysis of VMware hard disks. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Thesis, Rochester Institute of Technology. Accessed January 21, 2021. https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Web. 21 Jan 2021.

Vancouver:

Hirwani M. Forensic analysis of VMware hard disks. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2021 Jan 21]. Available from: https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hirwani M. Forensic analysis of VMware hard disks. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Ortagus, Megan Leann. The Internet's Impacts on Power Differentials in Security and Conflict.

Degree: 2014, Johns Hopkins University

 Through case studies and empirical statistical research, this thesis tests the theory that information and communications technologies (ICT), specifically the Internet, is a casual factor… (more)

Subjects/Keywords: internet security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ortagus, M. L. (2014). The Internet's Impacts on Power Differentials in Security and Conflict. (Thesis). Johns Hopkins University. Retrieved from http://jhir.library.jhu.edu/handle/1774.2/37255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ortagus, Megan Leann. “The Internet's Impacts on Power Differentials in Security and Conflict.” 2014. Thesis, Johns Hopkins University. Accessed January 21, 2021. http://jhir.library.jhu.edu/handle/1774.2/37255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ortagus, Megan Leann. “The Internet's Impacts on Power Differentials in Security and Conflict.” 2014. Web. 21 Jan 2021.

Vancouver:

Ortagus ML. The Internet's Impacts on Power Differentials in Security and Conflict. [Internet] [Thesis]. Johns Hopkins University; 2014. [cited 2021 Jan 21]. Available from: http://jhir.library.jhu.edu/handle/1774.2/37255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ortagus ML. The Internet's Impacts on Power Differentials in Security and Conflict. [Thesis]. Johns Hopkins University; 2014. Available from: http://jhir.library.jhu.edu/handle/1774.2/37255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oxford

17. Sluganovic, Ivo. Security of mixed reality systems : authenticating users, devices, and data.

Degree: PhD, 2018, University of Oxford

 Mixed reality devices continuously scan their environment in order to naturally blend the virtual objects with the user's real-time view of their physical environment. Given… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sluganovic, I. (2018). Security of mixed reality systems : authenticating users, devices, and data. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630

Chicago Manual of Style (16th Edition):

Sluganovic, Ivo. “Security of mixed reality systems : authenticating users, devices, and data.” 2018. Doctoral Dissertation, University of Oxford. Accessed January 21, 2021. http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630.

MLA Handbook (7th Edition):

Sluganovic, Ivo. “Security of mixed reality systems : authenticating users, devices, and data.” 2018. Web. 21 Jan 2021.

Vancouver:

Sluganovic I. Security of mixed reality systems : authenticating users, devices, and data. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2021 Jan 21]. Available from: http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630.

Council of Science Editors:

Sluganovic I. Security of mixed reality systems : authenticating users, devices, and data. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:70779c14-9314-4323-903c-5a9291615fb3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.791630

18. Ramadurai, Vandhana. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.

Degree: 2013, Texas Digital Library

 This dissertation is an ethnographic inquiry into women???s experiences of food insecurity in Rajendranagar, a slum in Bangalore, India. As a critical ethnographer, I undertook… (more)

Subjects/Keywords: Food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramadurai, V. (2013). Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. (Thesis). Texas Digital Library. Retrieved from http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ramadurai, Vandhana. “Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.” 2013. Thesis, Texas Digital Library. Accessed January 21, 2021. http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ramadurai, Vandhana. “Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.” 2013. Web. 21 Jan 2021.

Vancouver:

Ramadurai V. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. [Internet] [Thesis]. Texas Digital Library; 2013. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ramadurai V. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. [Thesis]. Texas Digital Library; 2013. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

19. Imeson, Frank. An Attack and a Defence in the Context of Hardware Security.

Degree: 2013, University of Waterloo

 The security of digital Integrated Circuits (ICs) is essential to the security of a computer system that comprises them. We present an improved attack on… (more)

Subjects/Keywords: Security; Hardware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Imeson, F. (2013). An Attack and a Defence in the Context of Hardware Security. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/7596

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Imeson, Frank. “An Attack and a Defence in the Context of Hardware Security.” 2013. Thesis, University of Waterloo. Accessed January 21, 2021. http://hdl.handle.net/10012/7596.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Imeson, Frank. “An Attack and a Defence in the Context of Hardware Security.” 2013. Web. 21 Jan 2021.

Vancouver:

Imeson F. An Attack and a Defence in the Context of Hardware Security. [Internet] [Thesis]. University of Waterloo; 2013. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10012/7596.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Imeson F. An Attack and a Defence in the Context of Hardware Security. [Thesis]. University of Waterloo; 2013. Available from: http://hdl.handle.net/10012/7596

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

20. Kubheka, Bongekile Precious. Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape.

Degree: 2015, University of KwaZulu-Natal

 This study assessed the impact of a homestead food production programme (Siyazondla) in improving household food security by comparing the incomes; food consumption frequencies and… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kubheka, B. P. (2015). Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/12698

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kubheka, Bongekile Precious. “Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape.” 2015. Thesis, University of KwaZulu-Natal. Accessed January 21, 2021. http://hdl.handle.net/10413/12698.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kubheka, Bongekile Precious. “Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape.” 2015. Web. 21 Jan 2021.

Vancouver:

Kubheka BP. Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape. [Internet] [Thesis]. University of KwaZulu-Natal; 2015. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10413/12698.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kubheka BP. Impact assessment of the Siyazondla Homestead Food Production Programme in improving household food security of selected households in the Amathole District, Eastern Cape. [Thesis]. University of KwaZulu-Natal; 2015. Available from: http://hdl.handle.net/10413/12698

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

21. Khoza, Sithandiwe. Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security.

Degree: 2014, University of KwaZulu-Natal

 Eggs have potential to improve the nutritional status of individuals who are at risk of Protein-Energy Malnutrition in rural households of South Africa. However, eggs… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khoza, S. (2014). Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/12835

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khoza, Sithandiwe. “Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security.” 2014. Thesis, University of KwaZulu-Natal. Accessed January 21, 2021. http://hdl.handle.net/10413/12835.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khoza, Sithandiwe. “Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security.” 2014. Web. 21 Jan 2021.

Vancouver:

Khoza S. Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security. [Internet] [Thesis]. University of KwaZulu-Natal; 2014. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10413/12835.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khoza S. Modelling with commercial egg powder to assess the potential of indigenous knowledge-processed egg powder to improve household food and nutrition security. [Thesis]. University of KwaZulu-Natal; 2014. Available from: http://hdl.handle.net/10413/12835

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

22. Murugani, Vongai Gillian. Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province.

Degree: 2016, University of KwaZulu-Natal

 Developing the smallholder agricultural sector has been proposed as a way of developing rural communities. These assertions are partly based on the results of the… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Murugani, V. G. (2016). Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/13318

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Murugani, Vongai Gillian. “Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province.” 2016. Thesis, University of KwaZulu-Natal. Accessed January 21, 2021. http://hdl.handle.net/10413/13318.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Murugani, Vongai Gillian. “Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province.” 2016. Web. 21 Jan 2021.

Vancouver:

Murugani VG. Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province. [Internet] [Thesis]. University of KwaZulu-Natal; 2016. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10413/13318.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Murugani VG. Women empowerment in agriculture : agency and institutions for improved market access and household food security in Limpopo Province. [Thesis]. University of KwaZulu-Natal; 2016. Available from: http://hdl.handle.net/10413/13318

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

23. Shisanya, Stephen Odede. Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa.

Degree: 2015, University of KwaZulu-Natal

 The study examined in specific terms the interaction between household food security and rural farming communities’ perception of climate change in uMzinyathi District Municipality of… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shisanya, S. O. (2015). Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/12682

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shisanya, Stephen Odede. “Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa.” 2015. Thesis, University of KwaZulu-Natal. Accessed January 21, 2021. http://hdl.handle.net/10413/12682.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shisanya, Stephen Odede. “Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa.” 2015. Web. 21 Jan 2021.

Vancouver:

Shisanya SO. Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa. [Internet] [Thesis]. University of KwaZulu-Natal; 2015. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/10413/12682.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shisanya SO. Rural households' perception of the effect of climate change on food security in uMzinyathi District Municipality of KwaZulu-Natal, South Africa. [Thesis]. University of KwaZulu-Natal; 2015. Available from: http://hdl.handle.net/10413/12682

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

24. Das, Saikat. A Cloud-based Framework for Security Analysis of Browser Extensions .

Degree: Electrical and Computer Engineering, 2016, Queens University

 In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of… (more)

Subjects/Keywords: Software Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Das, S. (2016). A Cloud-based Framework for Security Analysis of Browser Extensions . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/14432

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Das, Saikat. “A Cloud-based Framework for Security Analysis of Browser Extensions .” 2016. Thesis, Queens University. Accessed January 21, 2021. http://hdl.handle.net/1974/14432.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Das, Saikat. “A Cloud-based Framework for Security Analysis of Browser Extensions .” 2016. Web. 21 Jan 2021.

Vancouver:

Das S. A Cloud-based Framework for Security Analysis of Browser Extensions . [Internet] [Thesis]. Queens University; 2016. [cited 2021 Jan 21]. Available from: http://hdl.handle.net/1974/14432.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Das S. A Cloud-based Framework for Security Analysis of Browser Extensions . [Thesis]. Queens University; 2016. Available from: http://hdl.handle.net/1974/14432

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Ghosh, Esha. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.

Degree: Department of Computer Science, 2018, Brown University

 An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghosh, E. (2018). Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. (Thesis). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Thesis, Brown University. Accessed January 21, 2021. https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Web. 21 Jan 2021.

Vancouver:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Internet] [Thesis]. Brown University; 2018. [cited 2021 Jan 21]. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Thesis]. Brown University; 2018. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

26. Irwin, Keith. A System for Managing User Obligations.

Degree: PhD, Computer Science, 2009, North Carolina State University

 As computer systems become a more pervasive part of our societies, actions within those computer systems are becoming increasingly governed by complex policies such as… (more)

Subjects/Keywords: security; obligations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Irwin, K. (2009). A System for Managing User Obligations. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5170

Chicago Manual of Style (16th Edition):

Irwin, Keith. “A System for Managing User Obligations.” 2009. Doctoral Dissertation, North Carolina State University. Accessed January 21, 2021. http://www.lib.ncsu.edu/resolver/1840.16/5170.

MLA Handbook (7th Edition):

Irwin, Keith. “A System for Managing User Obligations.” 2009. Web. 21 Jan 2021.

Vancouver:

Irwin K. A System for Managing User Obligations. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2021 Jan 21]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170.

Council of Science Editors:

Irwin K. A System for Managing User Obligations. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170


Addis Ababa University

27. ENDASHAW, SHIBRU. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR .

Degree: 2012, Addis Ababa University

 Background: Underlying malnutrition is responsible for half of the deaths occurring among children under five years of age. Studying causes of malnutrition and acting upon,… (more)

Subjects/Keywords: NUTRITION SECURITY

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ENDASHAW, S. (2012). DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/3269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

ENDASHAW, SHIBRU. “DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR .” 2012. Thesis, Addis Ababa University. Accessed January 21, 2021. http://etd.aau.edu.et/dspace/handle/123456789/3269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

ENDASHAW, SHIBRU. “DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR .” 2012. Web. 21 Jan 2021.

Vancouver:

ENDASHAW S. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR . [Internet] [Thesis]. Addis Ababa University; 2012. [cited 2021 Jan 21]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/3269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

ENDASHAW S. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR . [Thesis]. Addis Ababa University; 2012. Available from: http://etd.aau.edu.et/dspace/handle/123456789/3269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

28. SENAIT, AREFAINE. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS .

Degree: 2010, Addis Ababa University

 Ethiopia had been facing the challenges of ensuring food security for decades. The challenge is still with us. As a result, programs aimed at poverty… (more)

Subjects/Keywords: Food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

SENAIT, A. (2010). INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/7354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

SENAIT, AREFAINE. “INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS .” 2010. Thesis, Addis Ababa University. Accessed January 21, 2021. http://etd.aau.edu.et/dspace/handle/123456789/7354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

SENAIT, AREFAINE. “INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS .” 2010. Web. 21 Jan 2021.

Vancouver:

SENAIT A. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS . [Internet] [Thesis]. Addis Ababa University; 2010. [cited 2021 Jan 21]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/7354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

SENAIT A. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS . [Thesis]. Addis Ababa University; 2010. Available from: http://etd.aau.edu.et/dspace/handle/123456789/7354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

29. Mulievi, Amos M. Information security policy framework for a manufacturing firm .

Degree: 2009, University of Nairobi

 Information and the supporting processes, systems, and networks are important business assets. Defining, achieving, maintaining, and improving information security is essential to maintain competitive edge,… (more)

Subjects/Keywords: Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulievi, A. M. (2009). Information security policy framework for a manufacturing firm . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Thesis, University of Nairobi. Accessed January 21, 2021. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Web. 21 Jan 2021.

Vancouver:

Mulievi AM. Information security policy framework for a manufacturing firm . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2021 Jan 21]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mulievi AM. Information security policy framework for a manufacturing firm . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

30. Ngumbi, Raphael M. The influence of alternative approaches to sustainable food security in Kyuso District Kitui County .

Degree: 2012, University of Nairobi

 This study is concerned with alternative approaches to sustainable food security in Kyuso District-Kitui County. The objectives of the study includes; to establish how capacity… (more)

Subjects/Keywords: Food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ngumbi, R. M. (2012). The influence of alternative approaches to sustainable food security in Kyuso District Kitui County . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ngumbi, Raphael M. “The influence of alternative approaches to sustainable food security in Kyuso District Kitui County .” 2012. Thesis, University of Nairobi. Accessed January 21, 2021. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ngumbi, Raphael M. “The influence of alternative approaches to sustainable food security in Kyuso District Kitui County .” 2012. Web. 21 Jan 2021.

Vancouver:

Ngumbi RM. The influence of alternative approaches to sustainable food security in Kyuso District Kitui County . [Internet] [Thesis]. University of Nairobi; 2012. [cited 2021 Jan 21]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ngumbi RM. The influence of alternative approaches to sustainable food security in Kyuso District Kitui County . [Thesis]. University of Nairobi; 2012. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [516]

.