Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Security measures). Showing records 1 – 30 of 784 total matches.

[1] [2] [3] [4] [5] … [27]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Nelson Mandela Metropolitan University

1. Naudé, Kevin Alexander. Assessing program code through static structural similarity.

Degree: MSc, Faculty of Science, 2007, Nelson Mandela Metropolitan University

 Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been… (more)

Subjects/Keywords: Computer networks  – Security measures; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naudé, K. A. (2007). Assessing program code through static structural similarity. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/578

Chicago Manual of Style (16th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed July 15, 2019. http://hdl.handle.net/10948/578.

MLA Handbook (7th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Web. 15 Jul 2019.

Vancouver:

Naudé KA. Assessing program code through static structural similarity. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10948/578.

Council of Science Editors:

Naudé KA. Assessing program code through static structural similarity. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/578


University of Johannesburg

2. Tolnai, Annette. ISAP - an information security awareness portal.

Degree: 2010, University of Johannesburg

M.Sc.

The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a… (more)

Subjects/Keywords: Computer security; Internet security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2010). ISAP - an information security awareness portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Web. 15 Jul 2019.

Vancouver:

Tolnai A. ISAP - an information security awareness portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. ISAP - an information security awareness portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

3. 余見英.; Yu, Kin-ying. Efficient schemes for anonymous credential with reputation support.

Degree: PhD, 2012, University of Hong Kong

 Anonymous credential is an important tool to protect the identity of users in the Internet for various reasons (e.g. free open speech) even when a… (more)

Subjects/Keywords: Internet - Security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

余見英.; Yu, K. (2012). Efficient schemes for anonymous credential with reputation support. (Doctoral Dissertation). University of Hong Kong. Retrieved from Yu, K. [余見英]. (2012). Efficient schemes for anonymous credential with reputation support. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4833001 ; http://dx.doi.org/10.5353/th_b4833001 ; http://hdl.handle.net/10722/173843

Chicago Manual of Style (16th Edition):

余見英.; Yu, Kin-ying. “Efficient schemes for anonymous credential with reputation support.” 2012. Doctoral Dissertation, University of Hong Kong. Accessed July 15, 2019. Yu, K. [余見英]. (2012). Efficient schemes for anonymous credential with reputation support. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4833001 ; http://dx.doi.org/10.5353/th_b4833001 ; http://hdl.handle.net/10722/173843.

MLA Handbook (7th Edition):

余見英.; Yu, Kin-ying. “Efficient schemes for anonymous credential with reputation support.” 2012. Web. 15 Jul 2019.

Vancouver:

余見英.; Yu K. Efficient schemes for anonymous credential with reputation support. [Internet] [Doctoral dissertation]. University of Hong Kong; 2012. [cited 2019 Jul 15]. Available from: Yu, K. [余見英]. (2012). Efficient schemes for anonymous credential with reputation support. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4833001 ; http://dx.doi.org/10.5353/th_b4833001 ; http://hdl.handle.net/10722/173843.

Council of Science Editors:

余見英.; Yu K. Efficient schemes for anonymous credential with reputation support. [Doctoral Dissertation]. University of Hong Kong; 2012. Available from: Yu, K. [余見英]. (2012). Efficient schemes for anonymous credential with reputation support. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4833001 ; http://dx.doi.org/10.5353/th_b4833001 ; http://hdl.handle.net/10722/173843


Rhodes University

4. Mayisela, Simphiwe Hector. Data-centric security : towards a utopian model for protecting corporate data on mobile devices.

Degree: Faculty of Science, Computer Science, 2014, Rhodes University

 Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures; Mobile communication systems  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mayisela, S. H. (2014). Data-centric security : towards a utopian model for protecting corporate data on mobile devices. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Thesis, Rhodes University. Accessed July 15, 2019. http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Web. 15 Jul 2019.

Vancouver:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Internet] [Thesis]. Rhodes University; 2014. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Thesis]. Rhodes University; 2014. Available from: http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

5. Coertze, Jacques Jacobus. A framework for information security governance in SMMEs.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved… (more)

Subjects/Keywords: Business  – Data processing  – Security measures; Management information systems  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coertze, J. J. (2012). A framework for information security governance in SMMEs. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed July 15, 2019. http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Web. 15 Jul 2019.

Vancouver:

Coertze JJ. A framework for information security governance in SMMEs. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coertze JJ. A framework for information security governance in SMMEs. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

6. Frauenstein, Edwin Donald. A framework to mitigate phishing threats.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld… (more)

Subjects/Keywords: Computer networks  – Security measures; Mobile computing  – Security measures; Online social networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frauenstein, E. D. (2013). A framework to mitigate phishing threats. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed July 15, 2019. http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Web. 15 Jul 2019.

Vancouver:

Frauenstein ED. A framework to mitigate phishing threats. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frauenstein ED. A framework to mitigate phishing threats. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

7. Diakite, Soumaila Dit Moule. WISP: a wireless information security portal.

Degree: 2010, University of Johannesburg

M.Sc.

Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless… (more)

Subjects/Keywords: Wireless communication systems security measures; Wireless LANs security measures; Computer networks security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diakite, S. D. M. (2010). WISP: a wireless information security portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Web. 15 Jul 2019.

Vancouver:

Diakite SDM. WISP: a wireless information security portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diakite SDM. WISP: a wireless information security portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

8. Grissa, Mohamed. Location Privacy Preservation for Optimal Sensing in Cognitive Radio Networks.

Degree: MS, Electrical and Computer Engineering, 2015, Oregon State University

 Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channel resources by allowing unlicensed users to exploit vacant channel opportunities. One effective technique through… (more)

Subjects/Keywords: Cognitive radio networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grissa, M. (2015). Location Privacy Preservation for Optimal Sensing in Cognitive Radio Networks. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/56186

Chicago Manual of Style (16th Edition):

Grissa, Mohamed. “Location Privacy Preservation for Optimal Sensing in Cognitive Radio Networks.” 2015. Masters Thesis, Oregon State University. Accessed July 15, 2019. http://hdl.handle.net/1957/56186.

MLA Handbook (7th Edition):

Grissa, Mohamed. “Location Privacy Preservation for Optimal Sensing in Cognitive Radio Networks.” 2015. Web. 15 Jul 2019.

Vancouver:

Grissa M. Location Privacy Preservation for Optimal Sensing in Cognitive Radio Networks. [Internet] [Masters thesis]. Oregon State University; 2015. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/1957/56186.

Council of Science Editors:

Grissa M. Location Privacy Preservation for Optimal Sensing in Cognitive Radio Networks. [Masters Thesis]. Oregon State University; 2015. Available from: http://hdl.handle.net/1957/56186


Nelson Mandela Metropolitan University

9. Rastogi, Rahul. Information security service management : a service management approach to information security management.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University

 In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can… (more)

Subjects/Keywords: Information technology  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rastogi, R. (2011). Information security service management : a service management approach to information security management. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/1389

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rastogi, Rahul. “Information security service management : a service management approach to information security management.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed July 15, 2019. http://hdl.handle.net/10948/1389.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rastogi, Rahul. “Information security service management : a service management approach to information security management.” 2011. Web. 15 Jul 2019.

Vancouver:

Rastogi R. Information security service management : a service management approach to information security management. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10948/1389.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rastogi R. Information security service management : a service management approach to information security management. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/1389

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

10. 陳鴻群; Chen, Hung-kwan. A novel architecture for secure database processing in cloud computing.

Degree: PhD, 2016, University of Hong Kong

Security, particularly data privacy, is one of the biggest barriers to the adoption of Database-as-a-Service (DBaaS) in Cloud Computing. Recent security breaches demonstrate that a… (more)

Subjects/Keywords: Cloud computing - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

陳鴻群; Chen, H. (2016). A novel architecture for secure database processing in cloud computing. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/236590

Chicago Manual of Style (16th Edition):

陳鴻群; Chen, Hung-kwan. “A novel architecture for secure database processing in cloud computing.” 2016. Doctoral Dissertation, University of Hong Kong. Accessed July 15, 2019. http://hdl.handle.net/10722/236590.

MLA Handbook (7th Edition):

陳鴻群; Chen, Hung-kwan. “A novel architecture for secure database processing in cloud computing.” 2016. Web. 15 Jul 2019.

Vancouver:

陳鴻群; Chen H. A novel architecture for secure database processing in cloud computing. [Internet] [Doctoral dissertation]. University of Hong Kong; 2016. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10722/236590.

Council of Science Editors:

陳鴻群; Chen H. A novel architecture for secure database processing in cloud computing. [Doctoral Dissertation]. University of Hong Kong; 2016. Available from: http://hdl.handle.net/10722/236590


University of Hong Kong

11. Chau, Foo-cheong, Sidney. Application the principles of corporate governance to enhance efficiency of airport security services.

Degree: MPA, 2012, University of Hong Kong

 Today, aviation security is at the forefront of public consciousness particularly when they think of their own personal safety. The dramatic and catastrophic attacks of… (more)

Subjects/Keywords: Corporate governance.; Airports - Security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chau, Foo-cheong, S. (2012). Application the principles of corporate governance to enhance efficiency of airport security services. (Masters Thesis). University of Hong Kong. Retrieved from Chau, F. S. [周富祥]. (2012). Application the principles of corporate governance to enhance efficiency of airport security services. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5025456 ; http://dx.doi.org/10.5353/th_b5025456 ; http://hdl.handle.net/10722/184356

Chicago Manual of Style (16th Edition):

Chau, Foo-cheong, Sidney. “Application the principles of corporate governance to enhance efficiency of airport security services.” 2012. Masters Thesis, University of Hong Kong. Accessed July 15, 2019. Chau, F. S. [周富祥]. (2012). Application the principles of corporate governance to enhance efficiency of airport security services. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5025456 ; http://dx.doi.org/10.5353/th_b5025456 ; http://hdl.handle.net/10722/184356.

MLA Handbook (7th Edition):

Chau, Foo-cheong, Sidney. “Application the principles of corporate governance to enhance efficiency of airport security services.” 2012. Web. 15 Jul 2019.

Vancouver:

Chau, Foo-cheong S. Application the principles of corporate governance to enhance efficiency of airport security services. [Internet] [Masters thesis]. University of Hong Kong; 2012. [cited 2019 Jul 15]. Available from: Chau, F. S. [周富祥]. (2012). Application the principles of corporate governance to enhance efficiency of airport security services. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5025456 ; http://dx.doi.org/10.5353/th_b5025456 ; http://hdl.handle.net/10722/184356.

Council of Science Editors:

Chau, Foo-cheong S. Application the principles of corporate governance to enhance efficiency of airport security services. [Masters Thesis]. University of Hong Kong; 2012. Available from: Chau, F. S. [周富祥]. (2012). Application the principles of corporate governance to enhance efficiency of airport security services. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5025456 ; http://dx.doi.org/10.5353/th_b5025456 ; http://hdl.handle.net/10722/184356

12. Fragkos, Grigorios. Near real-time threat assessment using intrusion detection system's data.

Degree: PhD, University of Glamorgan, 2012, University of South Wales

 The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent… (more)

Subjects/Keywords: Computer networks Security measures; 005.8

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fragkos, G. (2012). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from http://hdl.handle.net/10265/569

Chicago Manual of Style (16th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Doctoral Dissertation, University of South Wales. Accessed July 15, 2019. http://hdl.handle.net/10265/569.

MLA Handbook (7th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2012. Web. 15 Jul 2019.

Vancouver:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2012. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10265/569.

Council of Science Editors:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2012. Available from: http://hdl.handle.net/10265/569


University of North Carolina – Greensboro

13. Zou, Xiaocheng. Ant-based evidence distribution with periodic broadcast in attacked wireless network.

Degree: 2011, University of North Carolina – Greensboro

 In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so,… (more)

Subjects/Keywords: Computer networks – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zou, X. (2011). Ant-based evidence distribution with periodic broadcast in attacked wireless network. (Masters Thesis). University of North Carolina – Greensboro. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548

Chicago Manual of Style (16th Edition):

Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in attacked wireless network.” 2011. Masters Thesis, University of North Carolina – Greensboro. Accessed July 15, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.

MLA Handbook (7th Edition):

Zou, Xiaocheng. “Ant-based evidence distribution with periodic broadcast in attacked wireless network.” 2011. Web. 15 Jul 2019.

Vancouver:

Zou X. Ant-based evidence distribution with periodic broadcast in attacked wireless network. [Internet] [Masters thesis]. University of North Carolina – Greensboro; 2011. [cited 2019 Jul 15]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548.

Council of Science Editors:

Zou X. Ant-based evidence distribution with periodic broadcast in attacked wireless network. [Masters Thesis]. University of North Carolina – Greensboro; 2011. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=7548


Rutgers University

14. Tang, Xiaojun, 1978-. Communicating over wireless channels with information-theoretic secrecy.

Degree: PhD, Electrical and Computer Engineering, 2010, Rutgers University

 Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of the wireless medium. Fortunately, the wireless medium also provides endowments… (more)

Subjects/Keywords: Wireless communication systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tang, Xiaojun, 1. (2010). Communicating over wireless channels with information-theoretic secrecy. (Doctoral Dissertation). Rutgers University. Retrieved from http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000053342

Chicago Manual of Style (16th Edition):

Tang, Xiaojun, 1978-. “Communicating over wireless channels with information-theoretic secrecy.” 2010. Doctoral Dissertation, Rutgers University. Accessed July 15, 2019. http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000053342.

MLA Handbook (7th Edition):

Tang, Xiaojun, 1978-. “Communicating over wireless channels with information-theoretic secrecy.” 2010. Web. 15 Jul 2019.

Vancouver:

Tang, Xiaojun 1. Communicating over wireless channels with information-theoretic secrecy. [Internet] [Doctoral dissertation]. Rutgers University; 2010. [cited 2019 Jul 15]. Available from: http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000053342.

Council of Science Editors:

Tang, Xiaojun 1. Communicating over wireless channels with information-theoretic secrecy. [Doctoral Dissertation]. Rutgers University; 2010. Available from: http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000053342

15. Fragkos, Grigorios. Near real-time threat assessment using intrusion detection system's data.

Degree: PhD, 2011, University of South Wales

 The concept of Intrusion Detection (ID) and the development of such systems have been a major concern for scientists since the late sixties. In recent… (more)

Subjects/Keywords: 005.8; Computer networks Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fragkos, G. (2011). Near real-time threat assessment using intrusion detection system's data. (Doctoral Dissertation). University of South Wales. Retrieved from https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659

Chicago Manual of Style (16th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Doctoral Dissertation, University of South Wales. Accessed July 15, 2019. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.

MLA Handbook (7th Edition):

Fragkos, Grigorios. “Near real-time threat assessment using intrusion detection system's data.” 2011. Web. 15 Jul 2019.

Vancouver:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Internet] [Doctoral dissertation]. University of South Wales; 2011. [cited 2019 Jul 15]. Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659.

Council of Science Editors:

Fragkos G. Near real-time threat assessment using intrusion detection system's data. [Doctoral Dissertation]. University of South Wales; 2011. Available from: https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541659


University of Johannesburg

16. Van Buuren, Suzi. Information security in a distributed banking environment, with specific reference to security protocols.

Degree: 2012, University of Johannesburg

M.Comm.

The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment… (more)

Subjects/Keywords: Banks and banking - Security measures; Intranets (Computer networks) - Security measures; Internet - Security measures; Computer networks - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Buuren, S. (2012). Information security in a distributed banking environment, with specific reference to security protocols. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Buuren, Suzi. “Information security in a distributed banking environment, with specific reference to security protocols.” 2012. Web. 15 Jul 2019.

Vancouver:

Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/6484.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Buuren S. Information security in a distributed banking environment, with specific reference to security protocols. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6484

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

17. Redlinghuis, André Jacques. Information protection in the digital banking environment.

Degree: 2012, University of Johannesburg

M.A.

The evolution of the Internet has led to the establishment of various value-adding products and services such as Internet banking (IB). Internet banking has… (more)

Subjects/Keywords: Internet banking - Security measures; Banks and banking - Security measures; Business communication - Security measures; Information resources management - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Redlinghuis, A. J. (2012). Information protection in the digital banking environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5380

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Redlinghuis, André Jacques. “Information protection in the digital banking environment.” 2012. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/5380.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Redlinghuis, André Jacques. “Information protection in the digital banking environment.” 2012. Web. 15 Jul 2019.

Vancouver:

Redlinghuis AJ. Information protection in the digital banking environment. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/5380.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Redlinghuis AJ. Information protection in the digital banking environment. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5380

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Coventry University

18. Nagarle Shivashankarappa, A. Novel framework to support information security audit in virtual environment.

Degree: PhD, 2013, Coventry University

 Over the years, the focus of information security has evolved from technical issue to business issue. Heightened competition from globalization compounded by emerging technologies such… (more)

Subjects/Keywords: 005.8; Computer security; Internet; Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nagarle Shivashankarappa, A. (2013). Novel framework to support information security audit in virtual environment. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889

Chicago Manual of Style (16th Edition):

Nagarle Shivashankarappa, A. “Novel framework to support information security audit in virtual environment.” 2013. Doctoral Dissertation, Coventry University. Accessed July 15, 2019. http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889.

MLA Handbook (7th Edition):

Nagarle Shivashankarappa, A. “Novel framework to support information security audit in virtual environment.” 2013. Web. 15 Jul 2019.

Vancouver:

Nagarle Shivashankarappa A. Novel framework to support information security audit in virtual environment. [Internet] [Doctoral dissertation]. Coventry University; 2013. [cited 2019 Jul 15]. Available from: http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889.

Council of Science Editors:

Nagarle Shivashankarappa A. Novel framework to support information security audit in virtual environment. [Doctoral Dissertation]. Coventry University; 2013. Available from: http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683889


Nelson Mandela Metropolitan University

19. Reid, Rayne. Guidelines for cybersecurity education campaigns.

Degree: 2017, Nelson Mandela Metropolitan University

 In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2017). Guidelines for cybersecurity education campaigns. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed July 15, 2019. http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Web. 15 Jul 2019.

Vancouver:

Reid R. Guidelines for cybersecurity education campaigns. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Reid R. Guidelines for cybersecurity education campaigns. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Drexel University

20. Heverin, Thomas. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.

Degree: 2014, Drexel University

The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment… (more)

Subjects/Keywords: Computer science; Internet – Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Heverin, T. (2014). Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. (Thesis). Drexel University. Retrieved from http://hdl.handle.net/1860/idea:7034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Heverin, Thomas. “Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.” 2014. Thesis, Drexel University. Accessed July 15, 2019. http://hdl.handle.net/1860/idea:7034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Heverin, Thomas. “Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.” 2014. Web. 15 Jul 2019.

Vancouver:

Heverin T. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. [Internet] [Thesis]. Drexel University; 2014. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/1860/idea:7034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Heverin T. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. [Thesis]. Drexel University; 2014. Available from: http://hdl.handle.net/1860/idea:7034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

21. Tolnai, Annette. A security model for a virtualized information environment.

Degree: 2012, University of Johannesburg

D.Phil.

Virtualization is a new infrastructure platform whose trend is sweeping through IT like a blaze. Improving the IT industry by higher utilization from hardware,… (more)

Subjects/Keywords: Virtual computer systems - Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2012). A security model for a virtualized information environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Web. 15 Jul 2019.

Vancouver:

Tolnai A. A security model for a virtualized information environment. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. A security model for a virtualized information environment. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cape Peninsula University of Technology

22. Michiel, Michael. The institutionalisation of an information security culture in a petroleum organisation in the Western Cape .

Degree: 2018, Cape Peninsula University of Technology

 In today’s world, organisations cannot exist without having information readily available. The protection of information relies not only on technology but also on the behaviour… (more)

Subjects/Keywords: Corporations  – Security measures; Computer security; Corporate culture; Information technology  – Security measures; Security systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Michiel, M. (2018). The institutionalisation of an information security culture in a petroleum organisation in the Western Cape . (Thesis). Cape Peninsula University of Technology. Retrieved from http://etd.cput.ac.za/handle/20.500.11838/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Michiel, Michael. “The institutionalisation of an information security culture in a petroleum organisation in the Western Cape .” 2018. Thesis, Cape Peninsula University of Technology. Accessed July 15, 2019. http://etd.cput.ac.za/handle/20.500.11838/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Michiel, Michael. “The institutionalisation of an information security culture in a petroleum organisation in the Western Cape .” 2018. Web. 15 Jul 2019.

Vancouver:

Michiel M. The institutionalisation of an information security culture in a petroleum organisation in the Western Cape . [Internet] [Thesis]. Cape Peninsula University of Technology; 2018. [cited 2019 Jul 15]. Available from: http://etd.cput.ac.za/handle/20.500.11838/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Michiel M. The institutionalisation of an information security culture in a petroleum organisation in the Western Cape . [Thesis]. Cape Peninsula University of Technology; 2018. Available from: http://etd.cput.ac.za/handle/20.500.11838/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

23. Mauwa, Hope. Information security awareness : generic content, tools and techniques.

Degree: MTech, Faculty of Engineering, Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 In today’s computing environment, awareness programmes play a much more important role in organizations’ complete information security programmes. Information security awareness programmes are there to… (more)

Subjects/Keywords: Computer security; Data protection; Computers  – Safety measures; Information technology  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mauwa, H. (2007). Information security awareness : generic content, tools and techniques. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/560

Chicago Manual of Style (16th Edition):

Mauwa, Hope. “Information security awareness : generic content, tools and techniques.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed July 15, 2019. http://hdl.handle.net/10948/560.

MLA Handbook (7th Edition):

Mauwa, Hope. “Information security awareness : generic content, tools and techniques.” 2007. Web. 15 Jul 2019.

Vancouver:

Mauwa H. Information security awareness : generic content, tools and techniques. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10948/560.

Council of Science Editors:

Mauwa H. Information security awareness : generic content, tools and techniques. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/560

24. Joshuva, Justin. Identifying users on social networking using pattern recognition in messages.

Degree: 2017, University of Tennessee – Chattanooga

 Online social networks, such as Facebook and Twitter, have become a huge part of many people's lives, often as their main means of communication with… (more)

Subjects/Keywords: Online social networks  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joshuva, J. (2017). Identifying users on social networking using pattern recognition in messages. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/539

Chicago Manual of Style (16th Edition):

Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Masters Thesis, University of Tennessee – Chattanooga. Accessed July 15, 2019. https://scholar.utc.edu/theses/539.

MLA Handbook (7th Edition):

Joshuva, Justin. “Identifying users on social networking using pattern recognition in messages.” 2017. Web. 15 Jul 2019.

Vancouver:

Joshuva J. Identifying users on social networking using pattern recognition in messages. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2017. [cited 2019 Jul 15]. Available from: https://scholar.utc.edu/theses/539.

Council of Science Editors:

Joshuva J. Identifying users on social networking using pattern recognition in messages. [Masters Thesis]. University of Tennessee – Chattanooga; 2017. Available from: https://scholar.utc.edu/theses/539


Drexel University

25. Huang, Tingshan. Adaptive Sampling and Statistical Inference for Anomaly Detection.

Degree: 2015, Drexel University

 Given the rising threat of malware and the increasing inadequacy of signature-based solutions, online performance monitoring has emerged as a critical component of the security(more)

Subjects/Keywords: Electrical engineering; Cyberinfrastructure – Security measures; Computer networks – Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, T. (2015). Adaptive Sampling and Statistical Inference for Anomaly Detection. (Thesis). Drexel University. Retrieved from http://hdl.handle.net/1860/idea:6647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Thesis, Drexel University. Accessed July 15, 2019. http://hdl.handle.net/1860/idea:6647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Tingshan. “Adaptive Sampling and Statistical Inference for Anomaly Detection.” 2015. Web. 15 Jul 2019.

Vancouver:

Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Internet] [Thesis]. Drexel University; 2015. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/1860/idea:6647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang T. Adaptive Sampling and Statistical Inference for Anomaly Detection. [Thesis]. Drexel University; 2015. Available from: http://hdl.handle.net/1860/idea:6647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

26. Guo, Qi, 1970-. A formal approach to the role mining problem.

Degree: PhD, Management, 2010, Rutgers University

Role-based access control (RBAC) has become the norm for enforcing security since it has been successfully implemented in various commercial systems. Roles, which are nothing… (more)

Subjects/Keywords: Computer networks – Security measures; Information technology – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guo, Qi, 1. (2010). A formal approach to the role mining problem. (Doctoral Dissertation). Rutgers University. Retrieved from http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099

Chicago Manual of Style (16th Edition):

Guo, Qi, 1970-. “A formal approach to the role mining problem.” 2010. Doctoral Dissertation, Rutgers University. Accessed July 15, 2019. http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099.

MLA Handbook (7th Edition):

Guo, Qi, 1970-. “A formal approach to the role mining problem.” 2010. Web. 15 Jul 2019.

Vancouver:

Guo, Qi 1. A formal approach to the role mining problem. [Internet] [Doctoral dissertation]. Rutgers University; 2010. [cited 2019 Jul 15]. Available from: http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099.

Council of Science Editors:

Guo, Qi 1. A formal approach to the role mining problem. [Doctoral Dissertation]. Rutgers University; 2010. Available from: http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056099


University of Johannesburg

27. Venter, Hein S. Real-time risk analysis : a modern perspective on network security with a prototype.

Degree: 2012, University of Johannesburg

M.Sc.

The present study was undertaken in a bid within the realm of the existing Internet working environment to meet the need for a more… (more)

Subjects/Keywords: Internet - Security measures.; Computer networks - Security measures.; Risk assessment - Data processing.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venter, H. S. (2012). Real-time risk analysis : a modern perspective on network security with a prototype. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Venter, Hein S. “Real-time risk analysis : a modern perspective on network security with a prototype.” 2012. Web. 15 Jul 2019.

Vancouver:

Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/5995.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Venter HS. Real-time risk analysis : a modern perspective on network security with a prototype. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5995

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

28. Mapeka, Kgabo Elizabeth. An incremental approach to a secure e-commerce environment.

Degree: 2014, University of Johannesburg

M.Sc. (Computer Science)

The terms "Electronic Commerce" and "Internet Commerce" are often used interchangeably to mean similar processes. By definition, electronic commerce (e-commerce) means any… (more)

Subjects/Keywords: Electronic commerce - Security measures; Information networks - Planning; Information networks - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mapeka, K. E. (2014). An incremental approach to a secure e-commerce environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mapeka, Kgabo Elizabeth. “An incremental approach to a secure e-commerce environment.” 2014. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/12326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mapeka, Kgabo Elizabeth. “An incremental approach to a secure e-commerce environment.” 2014. Web. 15 Jul 2019.

Vancouver:

Mapeka KE. An incremental approach to a secure e-commerce environment. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/12326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mapeka KE. An incremental approach to a secure e-commerce environment. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

29. Ndaba, Sipho Lawrence. Authentication techniques for secure Internet commerce.

Degree: 2012, University of Johannesburg

M.Sc.(Computer Science)

The aim of this dissertation (referred to as thesis in the rest of the document) is to present authentication techniques that can be… (more)

Subjects/Keywords: Electronic commerce  – Security measures; Internet  – Security measures; Computers  – Access control  – Passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ndaba, S. L. (2012). Authentication techniques for secure Internet commerce. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/6552

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ndaba, Sipho Lawrence. “Authentication techniques for secure Internet commerce.” 2012. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/6552.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ndaba, Sipho Lawrence. “Authentication techniques for secure Internet commerce.” 2012. Web. 15 Jul 2019.

Vancouver:

Ndaba SL. Authentication techniques for secure Internet commerce. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/6552.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ndaba SL. Authentication techniques for secure Internet commerce. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/6552

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

30. Tvrz, Frankie. Information security of a bluetooth-enabled handheld device.

Degree: 2009, University of Johannesburg

M.Tech.

Mobile handheld devices are moving from being peripheral devices and are now fulfilling functionality provided by laptops and desktops. The capability and functionality of… (more)

Subjects/Keywords: Wireless communication systems - Security measures; Mobile communication systems - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tvrz, F. (2009). Information security of a bluetooth-enabled handheld device. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tvrz, Frankie. “Information security of a bluetooth-enabled handheld device.” 2009. Thesis, University of Johannesburg. Accessed July 15, 2019. http://hdl.handle.net/10210/3004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tvrz, Frankie. “Information security of a bluetooth-enabled handheld device.” 2009. Web. 15 Jul 2019.

Vancouver:

Tvrz F. Information security of a bluetooth-enabled handheld device. [Internet] [Thesis]. University of Johannesburg; 2009. [cited 2019 Jul 15]. Available from: http://hdl.handle.net/10210/3004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tvrz F. Information security of a bluetooth-enabled handheld device. [Thesis]. University of Johannesburg; 2009. Available from: http://hdl.handle.net/10210/3004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [27]

.