Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Security Modeling). Showing records 1 – 30 of 124 total matches.

[1] [2] [3] [4] [5]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Country

▼ Search Limiters


Georgia Tech

1. Yilmaz, Baki Berkay Berkay. COVERT/SIDE CHANNEL ANALYSIS, MODELING AND CAPACITY ESTIMATION.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 Side/Covert channels are asynchronous channels which are not designed nor intended to transfer information. These channels are generated as a byproduct of per-forming legitimate program… (more)

Subjects/Keywords: Covert channels; side channels; security; information-theoretic security; modeling; cyber security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yilmaz, B. B. B. (2020). COVERT/SIDE CHANNEL ANALYSIS, MODELING AND CAPACITY ESTIMATION. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62810

Chicago Manual of Style (16th Edition):

Yilmaz, Baki Berkay Berkay. “COVERT/SIDE CHANNEL ANALYSIS, MODELING AND CAPACITY ESTIMATION.” 2020. Doctoral Dissertation, Georgia Tech. Accessed October 29, 2020. http://hdl.handle.net/1853/62810.

MLA Handbook (7th Edition):

Yilmaz, Baki Berkay Berkay. “COVERT/SIDE CHANNEL ANALYSIS, MODELING AND CAPACITY ESTIMATION.” 2020. Web. 29 Oct 2020.

Vancouver:

Yilmaz BBB. COVERT/SIDE CHANNEL ANALYSIS, MODELING AND CAPACITY ESTIMATION. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1853/62810.

Council of Science Editors:

Yilmaz BBB. COVERT/SIDE CHANNEL ANALYSIS, MODELING AND CAPACITY ESTIMATION. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62810


Carnegie Mellon University

2. Komanduri, Saranga. Modeling the Adversary to Evaluate Password Strength With Limited Samples.

Degree: 2016, Carnegie Mellon University

 In an effort to improve security by preventing users from picking weak passwords, system administrators set password-composition policies, sets of requirements that passwords must meet.… (more)

Subjects/Keywords: passwords; security; usability; policy; modeling; statistics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Komanduri, S. (2016). Modeling the Adversary to Evaluate Password Strength With Limited Samples. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Komanduri, Saranga. “Modeling the Adversary to Evaluate Password Strength With Limited Samples.” 2016. Thesis, Carnegie Mellon University. Accessed October 29, 2020. http://repository.cmu.edu/dissertations/677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Komanduri, Saranga. “Modeling the Adversary to Evaluate Password Strength With Limited Samples.” 2016. Web. 29 Oct 2020.

Vancouver:

Komanduri S. Modeling the Adversary to Evaluate Password Strength With Limited Samples. [Internet] [Thesis]. Carnegie Mellon University; 2016. [cited 2020 Oct 29]. Available from: http://repository.cmu.edu/dissertations/677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Komanduri S. Modeling the Adversary to Evaluate Password Strength With Limited Samples. [Thesis]. Carnegie Mellon University; 2016. Available from: http://repository.cmu.edu/dissertations/677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

3. Cole, Robert James. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty.

Degree: 2013, Penn State University

 Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are… (more)

Subjects/Keywords: intrusion detection; IDS; uncertainty; Bayesian modeling; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cole, R. J. (2013). Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cole, Robert James. “Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty.” 2013. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/17035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cole, Robert James. “Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty.” 2013. Web. 29 Oct 2020.

Vancouver:

Cole RJ. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty. [Internet] [Thesis]. Penn State University; 2013. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/17035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cole RJ. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty. [Thesis]. Penn State University; 2013. Available from: https://submit-etda.libraries.psu.edu/catalog/17035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

4. Chornoboy, Nicholas Jordan. Determining the effectiveness of nuclear security through computer simulation.

Degree: 2015, University of Ontario Institute of Technology

 There is a growing concern from both national regulators and the International Atomic Energy Agency (IAEA) about the threat posed by attacks against iconic targets… (more)

Subjects/Keywords: Modeling; Simulation; Security; STAGE; Monte-Carlo

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chornoboy, N. J. (2015). Determining the effectiveness of nuclear security through computer simulation. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/594

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chornoboy, Nicholas Jordan. “Determining the effectiveness of nuclear security through computer simulation.” 2015. Thesis, University of Ontario Institute of Technology. Accessed October 29, 2020. http://hdl.handle.net/10155/594.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chornoboy, Nicholas Jordan. “Determining the effectiveness of nuclear security through computer simulation.” 2015. Web. 29 Oct 2020.

Vancouver:

Chornoboy NJ. Determining the effectiveness of nuclear security through computer simulation. [Internet] [Thesis]. University of Ontario Institute of Technology; 2015. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10155/594.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chornoboy NJ. Determining the effectiveness of nuclear security through computer simulation. [Thesis]. University of Ontario Institute of Technology; 2015. Available from: http://hdl.handle.net/10155/594

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. FARHAND, NEDA. Semi-Automatic Software Security Model Extraction: Semi-Automatic Extraction of Security Relevant Information from Source Code for Formally Based Security Models .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsteknik, 2019, Chalmers University of Technology

 As society becomes increasingly integrated and dependant on software systems, software security is more relevant than ever before. In order to ensure that software applications… (more)

Subjects/Keywords: Software; Security; Automation; Extraction; eDFD; Threat Modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

FARHAND, N. (2019). Semi-Automatic Software Security Model Extraction: Semi-Automatic Extraction of Security Relevant Information from Source Code for Formally Based Security Models . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

FARHAND, NEDA. “Semi-Automatic Software Security Model Extraction: Semi-Automatic Extraction of Security Relevant Information from Source Code for Formally Based Security Models .” 2019. Thesis, Chalmers University of Technology. Accessed October 29, 2020. http://hdl.handle.net/20.500.12380/300502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

FARHAND, NEDA. “Semi-Automatic Software Security Model Extraction: Semi-Automatic Extraction of Security Relevant Information from Source Code for Formally Based Security Models .” 2019. Web. 29 Oct 2020.

Vancouver:

FARHAND N. Semi-Automatic Software Security Model Extraction: Semi-Automatic Extraction of Security Relevant Information from Source Code for Formally Based Security Models . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/20.500.12380/300502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

FARHAND N. Semi-Automatic Software Security Model Extraction: Semi-Automatic Extraction of Security Relevant Information from Source Code for Formally Based Security Models . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

6. Urbanska, Malgorzata. Automated security analysis of the home computer.

Degree: MS(M.S.), Computer Science, 2014, Colorado State University

 Home computer users pose special challenges to the security of their machines. Often home computer users do not realize that their computer activities have repercussions… (more)

Subjects/Keywords: attacks and defenses; attack graphs; security personalization; security risk modeling; system security; vulnerability database

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Urbanska, M. (2014). Automated security analysis of the home computer. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/82538

Chicago Manual of Style (16th Edition):

Urbanska, Malgorzata. “Automated security analysis of the home computer.” 2014. Masters Thesis, Colorado State University. Accessed October 29, 2020. http://hdl.handle.net/10217/82538.

MLA Handbook (7th Edition):

Urbanska, Malgorzata. “Automated security analysis of the home computer.” 2014. Web. 29 Oct 2020.

Vancouver:

Urbanska M. Automated security analysis of the home computer. [Internet] [Masters thesis]. Colorado State University; 2014. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10217/82538.

Council of Science Editors:

Urbanska M. Automated security analysis of the home computer. [Masters Thesis]. Colorado State University; 2014. Available from: http://hdl.handle.net/10217/82538

7. Khamaiseh, Samer Yousef. Security Testing with Misuse Case Modeling.

Degree: 2016, Boise State University

 Having a comprehensive model of security requirements is a crucial step towards developing a reliable software system. An effective model of security requirements which describes… (more)

Subjects/Keywords: software testing; security testing; misuse case modeling and security testing; Information Security; Software Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khamaiseh, S. Y. (2016). Security Testing with Misuse Case Modeling. (Thesis). Boise State University. Retrieved from https://scholarworks.boisestate.edu/td/1213

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khamaiseh, Samer Yousef. “Security Testing with Misuse Case Modeling.” 2016. Thesis, Boise State University. Accessed October 29, 2020. https://scholarworks.boisestate.edu/td/1213.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khamaiseh, Samer Yousef. “Security Testing with Misuse Case Modeling.” 2016. Web. 29 Oct 2020.

Vancouver:

Khamaiseh SY. Security Testing with Misuse Case Modeling. [Internet] [Thesis]. Boise State University; 2016. [cited 2020 Oct 29]. Available from: https://scholarworks.boisestate.edu/td/1213.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khamaiseh SY. Security Testing with Misuse Case Modeling. [Thesis]. Boise State University; 2016. Available from: https://scholarworks.boisestate.edu/td/1213

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

8. Syed, Madiha Haider. MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS.

Degree: 2019, Florida Atlantic University

Software systems increasingly interact with each other, forming ecosystems. Cloud is one such ecosystem that has evolved and enabled other technologies like IoT and containers.… (more)

Subjects/Keywords: Software ecosystems; Cloud computing – Security measures; Internet of things; Software architecture – Security measures; Computer modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Syed, M. H. (2019). MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS. (Thesis). Florida Atlantic University. Retrieved from http://fau.digital.flvc.org/islandora/object/fau:41965

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Syed, Madiha Haider. “MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS.” 2019. Thesis, Florida Atlantic University. Accessed October 29, 2020. http://fau.digital.flvc.org/islandora/object/fau:41965.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Syed, Madiha Haider. “MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS.” 2019. Web. 29 Oct 2020.

Vancouver:

Syed MH. MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS. [Internet] [Thesis]. Florida Atlantic University; 2019. [cited 2020 Oct 29]. Available from: http://fau.digital.flvc.org/islandora/object/fau:41965.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Syed MH. MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS. [Thesis]. Florida Atlantic University; 2019. Available from: http://fau.digital.flvc.org/islandora/object/fau:41965

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

9. Zhou, Luyuan. Security Risk Analysis based on Data Criticality.

Degree: computer science and media technology (CM), 2020, Linnaeus University

  Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks.… (more)

Subjects/Keywords: network security risk assessment; attack graph; data criticality; security metric; threat modeling; Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhou, L. (2020). Security Risk Analysis based on Data Criticality. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhou, Luyuan. “Security Risk Analysis based on Data Criticality.” 2020. Thesis, Linnaeus University. Accessed October 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhou, Luyuan. “Security Risk Analysis based on Data Criticality.” 2020. Web. 29 Oct 2020.

Vancouver:

Zhou L. Security Risk Analysis based on Data Criticality. [Internet] [Thesis]. Linnaeus University; 2020. [cited 2020 Oct 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhou L. Security Risk Analysis based on Data Criticality. [Thesis]. Linnaeus University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Fish, Joanne Marie. A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling.

Degree: PhD, International Studies, 2017, Old Dominion University

  This dissertation takes a cross-disciplinary approach to understanding pirate activity. Maritime piracy presents a dynamic ever-evolving problem. In today’s globalized world, contemporary maritime piracy… (more)

Subjects/Keywords: Agent-based modeling; Enterprise systems; International security; Maritime piracy; Maritime security; Risk; Defense and Security Studies; International Relations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fish, J. M. (2017). A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling. (Doctoral Dissertation). Old Dominion University. Retrieved from 9780355621181 ; https://digitalcommons.odu.edu/gpis_etds/19

Chicago Manual of Style (16th Edition):

Fish, Joanne Marie. “A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling.” 2017. Doctoral Dissertation, Old Dominion University. Accessed October 29, 2020. 9780355621181 ; https://digitalcommons.odu.edu/gpis_etds/19.

MLA Handbook (7th Edition):

Fish, Joanne Marie. “A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling.” 2017. Web. 29 Oct 2020.

Vancouver:

Fish JM. A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling. [Internet] [Doctoral dissertation]. Old Dominion University; 2017. [cited 2020 Oct 29]. Available from: 9780355621181 ; https://digitalcommons.odu.edu/gpis_etds/19.

Council of Science Editors:

Fish JM. A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling. [Doctoral Dissertation]. Old Dominion University; 2017. Available from: 9780355621181 ; https://digitalcommons.odu.edu/gpis_etds/19


Rochester Institute of Technology

11. Dautov, Ruslan. Lightweight Information Security Methods for Indoor Wireless Body Area Networks: from Channel Modeling to Secret Key Extraction.

Degree: PhD, 2019, Rochester Institute of Technology

  A group of wirelessly communicating sensors that are placed inside, on or around a human body constitute a Wireless Body Area Network (WBAN). Continuous… (more)

Subjects/Keywords: Channel modeling; Compressed sensing; Correlated shadowing; Security; Wireless body area networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dautov, R. (2019). Lightweight Information Security Methods for Indoor Wireless Body Area Networks: from Channel Modeling to Secret Key Extraction. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/10047

Chicago Manual of Style (16th Edition):

Dautov, Ruslan. “Lightweight Information Security Methods for Indoor Wireless Body Area Networks: from Channel Modeling to Secret Key Extraction.” 2019. Doctoral Dissertation, Rochester Institute of Technology. Accessed October 29, 2020. https://scholarworks.rit.edu/theses/10047.

MLA Handbook (7th Edition):

Dautov, Ruslan. “Lightweight Information Security Methods for Indoor Wireless Body Area Networks: from Channel Modeling to Secret Key Extraction.” 2019. Web. 29 Oct 2020.

Vancouver:

Dautov R. Lightweight Information Security Methods for Indoor Wireless Body Area Networks: from Channel Modeling to Secret Key Extraction. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2019. [cited 2020 Oct 29]. Available from: https://scholarworks.rit.edu/theses/10047.

Council of Science Editors:

Dautov R. Lightweight Information Security Methods for Indoor Wireless Body Area Networks: from Channel Modeling to Secret Key Extraction. [Doctoral Dissertation]. Rochester Institute of Technology; 2019. Available from: https://scholarworks.rit.edu/theses/10047


Penn State University

12. Iyengar, Anirudh Srikant. ENERGY-EFFICIENT AND SECURE DESIGNS OF SPINTRONIC MEMORY: TECHNIQUES AND APPLICATIONS.

Degree: 2018, Penn State University

 With increased integration of technology in our lives, the arms race between chip manufacturers to provide the latest and greatest to entice the consumer, only… (more)

Subjects/Keywords: Spintronics; Security; Camouflaging; PUF; NVFF; Secrecy and Privacy; Modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Iyengar, A. S. (2018). ENERGY-EFFICIENT AND SECURE DESIGNS OF SPINTRONIC MEMORY: TECHNIQUES AND APPLICATIONS. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15584asi7

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Iyengar, Anirudh Srikant. “ENERGY-EFFICIENT AND SECURE DESIGNS OF SPINTRONIC MEMORY: TECHNIQUES AND APPLICATIONS.” 2018. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/15584asi7.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Iyengar, Anirudh Srikant. “ENERGY-EFFICIENT AND SECURE DESIGNS OF SPINTRONIC MEMORY: TECHNIQUES AND APPLICATIONS.” 2018. Web. 29 Oct 2020.

Vancouver:

Iyengar AS. ENERGY-EFFICIENT AND SECURE DESIGNS OF SPINTRONIC MEMORY: TECHNIQUES AND APPLICATIONS. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/15584asi7.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Iyengar AS. ENERGY-EFFICIENT AND SECURE DESIGNS OF SPINTRONIC MEMORY: TECHNIQUES AND APPLICATIONS. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15584asi7

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

13. Joh, HyunChul. Quantitative analyses of software vulnerabilities.

Degree: PhD, Computer Science, 2011, Colorado State University

 There have been numerous studies addressing computer security and software vulnerability management. Most of the time, they have taken a qualitative perspective. In many other… (more)

Subjects/Keywords: modeling; quantitative analysis; risk; security; software; vulnerability discovery process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joh, H. (2011). Quantitative analyses of software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/70444

Chicago Manual of Style (16th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Doctoral Dissertation, Colorado State University. Accessed October 29, 2020. http://hdl.handle.net/10217/70444.

MLA Handbook (7th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Web. 29 Oct 2020.

Vancouver:

Joh H. Quantitative analyses of software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2011. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10217/70444.

Council of Science Editors:

Joh H. Quantitative analyses of software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/70444

14. Engvall, Christoffer. Security in Wireless Sensor Networks for Open Controller.

Degree: The Institute of Technology, 2013, Linköping UniversityLinköping University

  In this thesis we develop, evaluate and implement a security solution for Open Controllers wireless sensor network platform. A scenario is used to describe… (more)

Subjects/Keywords: Wireless sensor networks; security; threat modeling; attack trees; risk; Contiki

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Engvall, C. (2013). Security in Wireless Sensor Networks for Open Controller. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Engvall, Christoffer. “Security in Wireless Sensor Networks for Open Controller.” 2013. Thesis, Linköping UniversityLinköping University. Accessed October 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Engvall, Christoffer. “Security in Wireless Sensor Networks for Open Controller.” 2013. Web. 29 Oct 2020.

Vancouver:

Engvall C. Security in Wireless Sensor Networks for Open Controller. [Internet] [Thesis]. Linköping UniversityLinköping University; 2013. [cited 2020 Oct 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Engvall C. Security in Wireless Sensor Networks for Open Controller. [Thesis]. Linköping UniversityLinköping University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

15. Cao, Jin. OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model.

Degree: Industrial Information and Control Systems, 2015, KTH

  In this Master Thesis, several common applications and Windows operating systemservices are modeled within the field of information security. This thesis focuses onapplying the… (more)

Subjects/Keywords: CySeMoL; EAAT; Operating System; Application Modeling; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cao, J. (2015). OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cao, Jin. “OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model.” 2015. Thesis, KTH. Accessed October 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cao, Jin. “OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model.” 2015. Web. 29 Oct 2020.

Vancouver:

Cao J. OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model. [Internet] [Thesis]. KTH; 2015. [cited 2020 Oct 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cao J. OPERATING SYSTEM SECURITYMODELING : An Experimental Study on the CySeMoL model. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176854

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

16. Rabbani, Talvia. Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL.

Degree: Electrical Engineering (EES), 2016, KTH

In this Master Thesis, several common applications used with MySQL and Linux server are modelled using the Enterprise Architecture Analysis Tool (EAAT) and the… (more)

Subjects/Keywords: Cyber Security; CySeMoL; EAAT; Operating System; Server; Application Modeling.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rabbani, T. (2016). Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rabbani, Talvia. “Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL.” 2016. Thesis, KTH. Accessed October 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rabbani, Talvia. “Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL.” 2016. Web. 29 Oct 2020.

Vancouver:

Rabbani T. Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL. [Internet] [Thesis]. KTH; 2016. [cited 2020 Oct 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rabbani T. Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Puys, Maxime. Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques : Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios.

Degree: Docteur es, Informatique, 2018, Université Grenoble Alpes (ComUE)

Les systèmes industriels, souvent appelés SCADA (pour Système d’acquisition et decontrôle de données) sont la cible d’attaques informatiques depuis Stuxnet en 2010.Dû à la criticité… (more)

Subjects/Keywords: Sécurité; Systèmes industriels; Filtrage; Modélisation; Security; Industrial Systems; Filtering; Modeling; 004

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puys, M. (2018). Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques : Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios. (Doctoral Dissertation). Université Grenoble Alpes (ComUE). Retrieved from http://www.theses.fr/2018GREAM009

Chicago Manual of Style (16th Edition):

Puys, Maxime. “Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques : Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios.” 2018. Doctoral Dissertation, Université Grenoble Alpes (ComUE). Accessed October 29, 2020. http://www.theses.fr/2018GREAM009.

MLA Handbook (7th Edition):

Puys, Maxime. “Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques : Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios.” 2018. Web. 29 Oct 2020.

Vancouver:

Puys M. Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques : Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios. [Internet] [Doctoral dissertation]. Université Grenoble Alpes (ComUE); 2018. [cited 2020 Oct 29]. Available from: http://www.theses.fr/2018GREAM009.

Council of Science Editors:

Puys M. Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques : Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios. [Doctoral Dissertation]. Université Grenoble Alpes (ComUE); 2018. Available from: http://www.theses.fr/2018GREAM009


Georgia Tech

18. Zhong, Chiyang. Autonomous multi-stage flexible optimal power flow.

Degree: PhD, Electrical and Computer Engineering, 2019, Georgia Tech

 In modern power systems, an increasing number of renewable resources and controllable devices are implemented every year. The conventional OPF that mainly models the generators,… (more)

Subjects/Keywords: Autonomous; Multi-stage; Security constrained; Optimal power flow; Object-oriented modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, C. (2019). Autonomous multi-stage flexible optimal power flow. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62318

Chicago Manual of Style (16th Edition):

Zhong, Chiyang. “Autonomous multi-stage flexible optimal power flow.” 2019. Doctoral Dissertation, Georgia Tech. Accessed October 29, 2020. http://hdl.handle.net/1853/62318.

MLA Handbook (7th Edition):

Zhong, Chiyang. “Autonomous multi-stage flexible optimal power flow.” 2019. Web. 29 Oct 2020.

Vancouver:

Zhong C. Autonomous multi-stage flexible optimal power flow. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1853/62318.

Council of Science Editors:

Zhong C. Autonomous multi-stage flexible optimal power flow. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62318


University of Tennessee – Knoxville

19. Trumbo, Jennifer Lynn. Food Security in the United States: A Futures Analysis via Systems Modeling.

Degree: MS, Nutrition, 2018, University of Tennessee – Knoxville

 Food insecurity is a pressing issue not only in developing countries, but in communities across the United States (US). Food insecurity is the lack of… (more)

Subjects/Keywords: food security; systems modeling; climate change; food production; environment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trumbo, J. L. (2018). Food Security in the United States: A Futures Analysis via Systems Modeling. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/5364

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Trumbo, Jennifer Lynn. “Food Security in the United States: A Futures Analysis via Systems Modeling.” 2018. Thesis, University of Tennessee – Knoxville. Accessed October 29, 2020. https://trace.tennessee.edu/utk_gradthes/5364.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Trumbo, Jennifer Lynn. “Food Security in the United States: A Futures Analysis via Systems Modeling.” 2018. Web. 29 Oct 2020.

Vancouver:

Trumbo JL. Food Security in the United States: A Futures Analysis via Systems Modeling. [Internet] [Thesis]. University of Tennessee – Knoxville; 2018. [cited 2020 Oct 29]. Available from: https://trace.tennessee.edu/utk_gradthes/5364.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Trumbo JL. Food Security in the United States: A Futures Analysis via Systems Modeling. [Thesis]. University of Tennessee – Knoxville; 2018. Available from: https://trace.tennessee.edu/utk_gradthes/5364

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

20. Kalyanaraman, Mukund Murali. Highly secure strong PUF based on nonlinearity of MOSFET subthreshold operation.

Degree: MSin Engineering, Electrical and Computer Engineering, 2012, University of Texas – Austin

 Silicon physical unclonable functions (PUFs) are security primitives relying on the intrinsic randomness of IC manufacturing. Strong PUFs have a very large input-output space which… (more)

Subjects/Keywords: Physical unclonable functions; PUF; Security; SCA; Modeling attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kalyanaraman, M. M. (2012). Highly secure strong PUF based on nonlinearity of MOSFET subthreshold operation. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/20019

Chicago Manual of Style (16th Edition):

Kalyanaraman, Mukund Murali. “Highly secure strong PUF based on nonlinearity of MOSFET subthreshold operation.” 2012. Masters Thesis, University of Texas – Austin. Accessed October 29, 2020. http://hdl.handle.net/2152/20019.

MLA Handbook (7th Edition):

Kalyanaraman, Mukund Murali. “Highly secure strong PUF based on nonlinearity of MOSFET subthreshold operation.” 2012. Web. 29 Oct 2020.

Vancouver:

Kalyanaraman MM. Highly secure strong PUF based on nonlinearity of MOSFET subthreshold operation. [Internet] [Masters thesis]. University of Texas – Austin; 2012. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/2152/20019.

Council of Science Editors:

Kalyanaraman MM. Highly secure strong PUF based on nonlinearity of MOSFET subthreshold operation. [Masters Thesis]. University of Texas – Austin; 2012. Available from: http://hdl.handle.net/2152/20019

21. Luburić Nikola. Integration of Software Security Design Analysis to the Agile Development Process.

Degree: 2020, University of Novi Sad

This thesis presents research in the field of secure software engineering. Two methods are developed that, when combined, facilitate the integration of software security(more)

Subjects/Keywords: security design analysis, threat modeling, securesoftware engineering, security developmentlifecycle, security expertise, software security; bezbednosna analiza dizajna, modelovanje pretnji,razvoj bezbednog softvera, životni ciklus razvojabezbednosti, bezbednosna ekspertiza,bezbednost softvera

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nikola, L. (2020). Integration of Software Security Design Analysis to the Agile Development Process. (Thesis). University of Novi Sad. Retrieved from https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacija15711168256205.pdf?controlNumber=(BISIS)111796&fileName=15711168256205.pdf&id=13797&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=111796&source=OATD&language=en

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nikola, Luburić. “Integration of Software Security Design Analysis to the Agile Development Process.” 2020. Thesis, University of Novi Sad. Accessed October 29, 2020. https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacija15711168256205.pdf?controlNumber=(BISIS)111796&fileName=15711168256205.pdf&id=13797&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=111796&source=OATD&language=en.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nikola, Luburić. “Integration of Software Security Design Analysis to the Agile Development Process.” 2020. Web. 29 Oct 2020.

Vancouver:

Nikola L. Integration of Software Security Design Analysis to the Agile Development Process. [Internet] [Thesis]. University of Novi Sad; 2020. [cited 2020 Oct 29]. Available from: https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacija15711168256205.pdf?controlNumber=(BISIS)111796&fileName=15711168256205.pdf&id=13797&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=111796&source=OATD&language=en.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nikola L. Integration of Software Security Design Analysis to the Agile Development Process. [Thesis]. University of Novi Sad; 2020. Available from: https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacija15711168256205.pdf?controlNumber=(BISIS)111796&fileName=15711168256205.pdf&id=13797&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=111796&source=OATD&language=en

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Matović, Aleksandar. CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY.

Degree: Design and Engineering, 2019, Mälardalen University

Security is widely recognized as an important property that is tightly interdependentwith safety in safety-critical systems. The goal of this thesis is to conduct… (more)

Subjects/Keywords: model-checking; security; safety-critical; rebeca; modeling security implications; Electrical Engineering, Electronic Engineering, Information Engineering; Elektroteknik och elektronik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Matović, A. (2019). CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY. (Thesis). Mälardalen University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Matović, Aleksandar. “CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY.” 2019. Thesis, Mälardalen University. Accessed October 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Matović, Aleksandar. “CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY.” 2019. Web. 29 Oct 2020.

Vancouver:

Matović A. CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY. [Internet] [Thesis]. Mälardalen University; 2019. [cited 2020 Oct 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Matović A. CASE STUDIES ON MODELING SECURITY IMPLICATIONS ON SAFETY. [Thesis]. Mälardalen University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-45320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

23. Janer Rubio, Maria Luisa. Simulation Modeling Approach for Evaluating a Solution Designed to Alleviate the Congestion of Passenger Flow at the Composure Area of Security Checkpoints.

Degree: MSIE, 2017, University of Arkansas

  In a previous study, we found that replacing the exit roller of a security checkpoint lane for a continuously circulating conveyor could potentially increase… (more)

Subjects/Keywords: Composure Area; Passenger Flow; Secondary Screening; Security; Security Checkpoints; Simulation Modeling; Industrial Engineering; Industrial Technology; Transportation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Janer Rubio, M. L. (2017). Simulation Modeling Approach for Evaluating a Solution Designed to Alleviate the Congestion of Passenger Flow at the Composure Area of Security Checkpoints. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2448

Chicago Manual of Style (16th Edition):

Janer Rubio, Maria Luisa. “Simulation Modeling Approach for Evaluating a Solution Designed to Alleviate the Congestion of Passenger Flow at the Composure Area of Security Checkpoints.” 2017. Masters Thesis, University of Arkansas. Accessed October 29, 2020. https://scholarworks.uark.edu/etd/2448.

MLA Handbook (7th Edition):

Janer Rubio, Maria Luisa. “Simulation Modeling Approach for Evaluating a Solution Designed to Alleviate the Congestion of Passenger Flow at the Composure Area of Security Checkpoints.” 2017. Web. 29 Oct 2020.

Vancouver:

Janer Rubio ML. Simulation Modeling Approach for Evaluating a Solution Designed to Alleviate the Congestion of Passenger Flow at the Composure Area of Security Checkpoints. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2020 Oct 29]. Available from: https://scholarworks.uark.edu/etd/2448.

Council of Science Editors:

Janer Rubio ML. Simulation Modeling Approach for Evaluating a Solution Designed to Alleviate the Congestion of Passenger Flow at the Composure Area of Security Checkpoints. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2448

24. Baker, Wade Henderson. Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains.

Degree: PhD, Business, Business Information Technology, 2017, Virginia Tech

 Much of the confusion about the effectiveness of information security programs concerns not only how to measure, but also what to measure — an issue… (more)

Subjects/Keywords: cybersecurity; cyber security; information security; cyber risk; information risk; risk modeling; risk management; security metrics; decision support systems; supply chain management; supply chain risk; supply chain information sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Baker, W. H. (2017). Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/85128

Chicago Manual of Style (16th Edition):

Baker, Wade Henderson. “Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains.” 2017. Doctoral Dissertation, Virginia Tech. Accessed October 29, 2020. http://hdl.handle.net/10919/85128.

MLA Handbook (7th Edition):

Baker, Wade Henderson. “Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains.” 2017. Web. 29 Oct 2020.

Vancouver:

Baker WH. Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10919/85128.

Council of Science Editors:

Baker WH. Toward a Decision Support System for Measuring and Managing Cybersecurity Risk in Supply Chains. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/85128


NSYSU

25. Wu, Cheng-Feng. Automatic Identification System of Merchant Shipping in the Application of the Kaohsiung Harbor Protection.

Degree: Master, IAMPUT, 2012, NSYSU

 Kaohsiung Harbor is one of the major commercial ports in Taiwan, located at the hub of northeastern and southeastern Asia shipping lanes. Therefore there are… (more)

Subjects/Keywords: Kaohsiung Harbor; Ship Noise; Acoustic Modeling; Automatic Identification System (AIS); Port Security; Ship Density

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, C. (2012). Automatic Identification System of Merchant Shipping in the Application of the Kaohsiung Harbor Protection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724112-213138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Cheng-Feng. “Automatic Identification System of Merchant Shipping in the Application of the Kaohsiung Harbor Protection.” 2012. Thesis, NSYSU. Accessed October 29, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724112-213138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Cheng-Feng. “Automatic Identification System of Merchant Shipping in the Application of the Kaohsiung Harbor Protection.” 2012. Web. 29 Oct 2020.

Vancouver:

Wu C. Automatic Identification System of Merchant Shipping in the Application of the Kaohsiung Harbor Protection. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Oct 29]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724112-213138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu C. Automatic Identification System of Merchant Shipping in the Application of the Kaohsiung Harbor Protection. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724112-213138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

26. Qin, Shanshan. Multilevel detection of possible test tampering through erasure analysis.

Degree: 2016, University of Georgia

 Cheating on high-stakes standardized tests, especially by educators to meet accountability requirement, becomes a widespread serious problem receiving more and more attention. In the limited… (more)

Subjects/Keywords: erasure analysis; test security; educator tampering; data forensics; Item response theory; mixed modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Qin, S. (2016). Multilevel detection of possible test tampering through erasure analysis. (Thesis). University of Georgia. Retrieved from http://hdl.handle.net/10724/36311

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Qin, Shanshan. “Multilevel detection of possible test tampering through erasure analysis.” 2016. Thesis, University of Georgia. Accessed October 29, 2020. http://hdl.handle.net/10724/36311.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Qin, Shanshan. “Multilevel detection of possible test tampering through erasure analysis.” 2016. Web. 29 Oct 2020.

Vancouver:

Qin S. Multilevel detection of possible test tampering through erasure analysis. [Internet] [Thesis]. University of Georgia; 2016. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10724/36311.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Qin S. Multilevel detection of possible test tampering through erasure analysis. [Thesis]. University of Georgia; 2016. Available from: http://hdl.handle.net/10724/36311

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Federal de Santa Maria

27. Luana Fernandes Gabriel. SIMULAÇÃO DA PRODUTIVIDADE DE MANDIOCA PARA O ESTADO DO RIO GRANDE DO SUL.

Degree: 2013, Universidade Federal de Santa Maria

Cassava plays an important role for food security in the tropics, where it is the third main food source. In Rio Grande do Sul State,… (more)

Subjects/Keywords: cultura energética; segurança alimentar; modelagem; GUMCAS; AGRONOMIA; modeling; GUMCAS; food security; energy crops

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gabriel, L. F. (2013). SIMULAÇÃO DA PRODUTIVIDADE DE MANDIOCA PARA O ESTADO DO RIO GRANDE DO SUL. (Thesis). Universidade Federal de Santa Maria. Retrieved from http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=5066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gabriel, Luana Fernandes. “SIMULAÇÃO DA PRODUTIVIDADE DE MANDIOCA PARA O ESTADO DO RIO GRANDE DO SUL.” 2013. Thesis, Universidade Federal de Santa Maria. Accessed October 29, 2020. http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=5066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gabriel, Luana Fernandes. “SIMULAÇÃO DA PRODUTIVIDADE DE MANDIOCA PARA O ESTADO DO RIO GRANDE DO SUL.” 2013. Web. 29 Oct 2020.

Vancouver:

Gabriel LF. SIMULAÇÃO DA PRODUTIVIDADE DE MANDIOCA PARA O ESTADO DO RIO GRANDE DO SUL. [Internet] [Thesis]. Universidade Federal de Santa Maria; 2013. [cited 2020 Oct 29]. Available from: http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=5066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gabriel LF. SIMULAÇÃO DA PRODUTIVIDADE DE MANDIOCA PARA O ESTADO DO RIO GRANDE DO SUL. [Thesis]. Universidade Federal de Santa Maria; 2013. Available from: http://coralx.ufsm.br/tede/tde_busca/arquivo.php?codArquivo=5066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

28. Acquaviva, Jeffrey R. Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis.

Degree: 2017, Penn State University

 This thesis introduces a novel model of Advanced Persistent Threats in a network, and uses game theory to compute the optimal defense strategies to counter… (more)

Subjects/Keywords: Network Security; Game Theory; Advanced Persistent Threats; Zero-Sum Games; Cyber attack modeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Acquaviva, J. R. (2017). Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/13873jxa5147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Acquaviva, Jeffrey R. “Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis.” 2017. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/13873jxa5147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Acquaviva, Jeffrey R. “Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis.” 2017. Web. 29 Oct 2020.

Vancouver:

Acquaviva JR. Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/13873jxa5147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Acquaviva JR. Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/13873jxa5147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

29. Hoffman, Alexis Lee. Detecting the effect of dust and other climate variables on crop yields using diagnostic statistical crop models.

Degree: 2018, Penn State University

 Food security and agriculture productivity assessments require a strong understanding of how climate and other drivers influence regional crop yields. While the effects of temperature,… (more)

Subjects/Keywords: climate; dust; crop yields; statistical crop modeling; food security; agrometeorology; random forest

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hoffman, A. L. (2018). Detecting the effect of dust and other climate variables on crop yields using diagnostic statistical crop models. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15071alh402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hoffman, Alexis Lee. “Detecting the effect of dust and other climate variables on crop yields using diagnostic statistical crop models.” 2018. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/15071alh402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hoffman, Alexis Lee. “Detecting the effect of dust and other climate variables on crop yields using diagnostic statistical crop models.” 2018. Web. 29 Oct 2020.

Vancouver:

Hoffman AL. Detecting the effect of dust and other climate variables on crop yields using diagnostic statistical crop models. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/15071alh402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hoffman AL. Detecting the effect of dust and other climate variables on crop yields using diagnostic statistical crop models. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15071alh402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

30. Hare, Forrest. The Interdependent Nature of National Cyber Security: Motivating Private Action for a Public Good .

Degree: 2011, George Mason University

 The federal government relies largely on voluntary actions by the private firms that comprise the nation’s critical infrastructure to secure their operations. Several recent reports… (more)

Subjects/Keywords: cybersecurity; critical infrastructure protection; agent-based modeling; interdependent security; public-private partnership

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hare, F. (2011). The Interdependent Nature of National Cyber Security: Motivating Private Action for a Public Good . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/6312

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hare, Forrest. “The Interdependent Nature of National Cyber Security: Motivating Private Action for a Public Good .” 2011. Thesis, George Mason University. Accessed October 29, 2020. http://hdl.handle.net/1920/6312.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hare, Forrest. “The Interdependent Nature of National Cyber Security: Motivating Private Action for a Public Good .” 2011. Web. 29 Oct 2020.

Vancouver:

Hare F. The Interdependent Nature of National Cyber Security: Motivating Private Action for a Public Good . [Internet] [Thesis]. George Mason University; 2011. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1920/6312.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hare F. The Interdependent Nature of National Cyber Security: Motivating Private Action for a Public Good . [Thesis]. George Mason University; 2011. Available from: http://hdl.handle.net/1920/6312

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5]

.