Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Security systems). Showing records 1 – 30 of 1528 total matches.

[1] [2] [3] [4] [5] … [51]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Illinois – Urbana-Champaign

1. Hirzallah, Nabil H. K. Security of cyber-physical systems: A control-theoretic perspective.

Degree: PhD, Electrical & Computer Engr, 2018, University of Illinois – Urbana-Champaign

 Motivated by the attacks on control systems through the cyber (digital) part, we study how signal attacks injected through actuators and/or sensors affect control system… (more)

Subjects/Keywords: Security; Control Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirzallah, N. H. K. (2018). Security of cyber-physical systems: A control-theoretic perspective. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/102434

Chicago Manual of Style (16th Edition):

Hirzallah, Nabil H K. “Security of cyber-physical systems: A control-theoretic perspective.” 2018. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 28, 2020. http://hdl.handle.net/2142/102434.

MLA Handbook (7th Edition):

Hirzallah, Nabil H K. “Security of cyber-physical systems: A control-theoretic perspective.” 2018. Web. 28 Oct 2020.

Vancouver:

Hirzallah NHK. Security of cyber-physical systems: A control-theoretic perspective. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2018. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/2142/102434.

Council of Science Editors:

Hirzallah NHK. Security of cyber-physical systems: A control-theoretic perspective. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2018. Available from: http://hdl.handle.net/2142/102434


Rutgers University

2. Kim, Daeyoung, 1982-. Regulating smart devices in restricted spaces.

Degree: PhD, Computer Science, 2019, Rutgers University

Smart devices have spread everywhere in our daily lives, and the capabilities of smart devices equipped with a variety of sensors and peripherals are increasing.… (more)

Subjects/Keywords: Smartphones; Security systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, Daeyoung, 1. (2019). Regulating smart devices in restricted spaces. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/60172/

Chicago Manual of Style (16th Edition):

Kim, Daeyoung, 1982-. “Regulating smart devices in restricted spaces.” 2019. Doctoral Dissertation, Rutgers University. Accessed October 28, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/60172/.

MLA Handbook (7th Edition):

Kim, Daeyoung, 1982-. “Regulating smart devices in restricted spaces.” 2019. Web. 28 Oct 2020.

Vancouver:

Kim, Daeyoung 1. Regulating smart devices in restricted spaces. [Internet] [Doctoral dissertation]. Rutgers University; 2019. [cited 2020 Oct 28]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60172/.

Council of Science Editors:

Kim, Daeyoung 1. Regulating smart devices in restricted spaces. [Doctoral Dissertation]. Rutgers University; 2019. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/60172/


University of Johannesburg

3. Tolnai, Annette. A security model for a virtualized information environment.

Degree: 2012, University of Johannesburg

D.Phil.

Virtualization is a new infrastructure platform whose trend is sweeping through IT like a blaze. Improving the IT industry by higher utilization from hardware,… (more)

Subjects/Keywords: Virtual computer systems - Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2012). A security model for a virtualized information environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Thesis, University of Johannesburg. Accessed October 28, 2020. http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Web. 28 Oct 2020.

Vancouver:

Tolnai A. A security model for a virtualized information environment. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. A security model for a virtualized information environment. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tennessee – Knoxville

4. Smith, Jared Michael. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.

Degree: MS, Computer Science, 2017, University of Tennessee – Knoxville

 In this work, we present Nyx, a system for mitigating Distributed Denial of Service (DDoS) attacks by routing critical traffic from known benign networks around… (more)

Subjects/Keywords: DDoS; security; network security; BGP; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, J. M. (2017). Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Thesis, University of Tennessee – Knoxville. Accessed October 28, 2020. https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Web. 28 Oct 2020.

Vancouver:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Internet] [Thesis]. University of Tennessee – Knoxville; 2017. [cited 2020 Oct 28]. Available from: https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Thesis]. University of Tennessee – Knoxville; 2017. Available from: https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

5. Schoeman, Adam. Amber : A aero-interaction honeypot with distributed intelligence.

Degree: MS, Faculty of Science, Computer Science, 2015, Rhodes University

 For the greater part, security controls are based on the principle of Decision through Detection (DtD). The exception to this is a honeypot, which analyses… (more)

Subjects/Keywords: Security systems  – Security measures; Computer viruses; Intrusion detection systems (Computer security); Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schoeman, A. (2015). Amber : A aero-interaction honeypot with distributed intelligence. (Masters Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1017938

Chicago Manual of Style (16th Edition):

Schoeman, Adam. “Amber : A aero-interaction honeypot with distributed intelligence.” 2015. Masters Thesis, Rhodes University. Accessed October 28, 2020. http://hdl.handle.net/10962/d1017938.

MLA Handbook (7th Edition):

Schoeman, Adam. “Amber : A aero-interaction honeypot with distributed intelligence.” 2015. Web. 28 Oct 2020.

Vancouver:

Schoeman A. Amber : A aero-interaction honeypot with distributed intelligence. [Internet] [Masters thesis]. Rhodes University; 2015. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10962/d1017938.

Council of Science Editors:

Schoeman A. Amber : A aero-interaction honeypot with distributed intelligence. [Masters Thesis]. Rhodes University; 2015. Available from: http://hdl.handle.net/10962/d1017938

6. Sutha S. Application of computational Intelligent techniques for solving Power systems security problems;.

Degree: Application of computational Intelligent techniques for solving Power systems security problems, 2014, Anna University

The growth of large interconnected power systems demands a high newlinedegree of security for normal operation Consequently the burden of the newlinesystem operators has increased… (more)

Subjects/Keywords: Electrical Engineering; Power systems security

Page 1

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

S, S. (2014). Application of computational Intelligent techniques for solving Power systems security problems;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/26549

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

S, Sutha. “Application of computational Intelligent techniques for solving Power systems security problems;.” 2014. Thesis, Anna University. Accessed October 28, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/26549.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

S, Sutha. “Application of computational Intelligent techniques for solving Power systems security problems;.” 2014. Web. 28 Oct 2020.

Vancouver:

S S. Application of computational Intelligent techniques for solving Power systems security problems;. [Internet] [Thesis]. Anna University; 2014. [cited 2020 Oct 28]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/26549.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

S S. Application of computational Intelligent techniques for solving Power systems security problems;. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/26549

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

7. Enck, William Harold. Analysis Techniques for Mobile Operating System Security .

Degree: 2011, Penn State University

 Devices such as smartphones running mobile operating systems have become an integral part of society. Current smartphones are a response to the Internet's influence on… (more)

Subjects/Keywords: operating systems; smartphone; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Enck, W. H. (2011). Analysis Techniques for Mobile Operating System Security . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/11817

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Enck, William Harold. “Analysis Techniques for Mobile Operating System Security .” 2011. Thesis, Penn State University. Accessed October 28, 2020. https://submit-etda.libraries.psu.edu/catalog/11817.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Enck, William Harold. “Analysis Techniques for Mobile Operating System Security .” 2011. Web. 28 Oct 2020.

Vancouver:

Enck WH. Analysis Techniques for Mobile Operating System Security . [Internet] [Thesis]. Penn State University; 2011. [cited 2020 Oct 28]. Available from: https://submit-etda.libraries.psu.edu/catalog/11817.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Enck WH. Analysis Techniques for Mobile Operating System Security . [Thesis]. Penn State University; 2011. Available from: https://submit-etda.libraries.psu.edu/catalog/11817

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

8. Vijayakumar, Hayawardh. Protecting Programs During Resource Access.

Degree: 2014, Penn State University

 With the emergence of targeted malware such as Stuxnet and the continued prevalence of spyware and other types of malicious software, host security has become… (more)

Subjects/Keywords: Operating Systems; Security; Resource Access

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vijayakumar, H. (2014). Protecting Programs During Resource Access. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/21412

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vijayakumar, Hayawardh. “Protecting Programs During Resource Access.” 2014. Thesis, Penn State University. Accessed October 28, 2020. https://submit-etda.libraries.psu.edu/catalog/21412.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vijayakumar, Hayawardh. “Protecting Programs During Resource Access.” 2014. Web. 28 Oct 2020.

Vancouver:

Vijayakumar H. Protecting Programs During Resource Access. [Internet] [Thesis]. Penn State University; 2014. [cited 2020 Oct 28]. Available from: https://submit-etda.libraries.psu.edu/catalog/21412.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vijayakumar H. Protecting Programs During Resource Access. [Thesis]. Penn State University; 2014. Available from: https://submit-etda.libraries.psu.edu/catalog/21412

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

9. Louwrens, Cecil Petrus. A model for computer security based on a biological immune system.

Degree: PhD, 2012, University of Johannesburg

 This thesis is a theoretical treatise on a proposed new computer security system, based on a biological immune system. Modem day network-centric computing is fast… (more)

Subjects/Keywords: Computer security; Biological immune systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Louwrens, C. P. (2012). A model for computer security based on a biological immune system. (Doctoral Dissertation). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/4493

Chicago Manual of Style (16th Edition):

Louwrens, Cecil Petrus. “A model for computer security based on a biological immune system.” 2012. Doctoral Dissertation, University of Johannesburg. Accessed October 28, 2020. http://hdl.handle.net/10210/4493.

MLA Handbook (7th Edition):

Louwrens, Cecil Petrus. “A model for computer security based on a biological immune system.” 2012. Web. 28 Oct 2020.

Vancouver:

Louwrens CP. A model for computer security based on a biological immune system. [Internet] [Doctoral dissertation]. University of Johannesburg; 2012. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10210/4493.

Council of Science Editors:

Louwrens CP. A model for computer security based on a biological immune system. [Doctoral Dissertation]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/4493


University of Nairobi

10. Kiemo, Peter M. Evaluation of security of information systems in the Kenyan banking industry .

Degree: 2009, University of Nairobi

 This project evaluates the security of information systems in the Kenyan banking industry by examining the systems utilized by the Kenyan banks, challenges encountered in… (more)

Subjects/Keywords: INFORMATION SYSTEMS; BANKS; SECURITY

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kiemo, P. M. (2009). Evaluation of security of information systems in the Kenyan banking industry . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kiemo, Peter M. “Evaluation of security of information systems in the Kenyan banking industry .” 2009. Thesis, University of Nairobi. Accessed October 28, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kiemo, Peter M. “Evaluation of security of information systems in the Kenyan banking industry .” 2009. Web. 28 Oct 2020.

Vancouver:

Kiemo PM. Evaluation of security of information systems in the Kenyan banking industry . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2020 Oct 28]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kiemo PM. Evaluation of security of information systems in the Kenyan banking industry . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North-West University

11. Ohaeri, Ifeoma Ugochi. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .

Degree: 2012, North-West University

 With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as… (more)

Subjects/Keywords: Intrusion detection systems; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ohaeri, I. U. (2012). Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . (Thesis). North-West University. Retrieved from http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Thesis, North-West University. Accessed October 28, 2020. http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Web. 28 Oct 2020.

Vancouver:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Internet] [Thesis]. North-West University; 2012. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Thesis]. North-West University; 2012. Available from: http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Gracia, Pedro Pablo Ferruz. PRODUCT DESIGN, DEVELOPMENTAND VIABILITY ANALYSIS : MOTORCYCLE HELMETLIGHT SECURITY SYSTEM “DragonFlight”.

Degree: Design and Engineering, 2015, Mälardalen University

  Every single one of us have heard ones or know someone who have had a badexperience with a motorbike, maybe it was his or… (more)

Subjects/Keywords: Design; Innovation; Security systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gracia, P. P. F. (2015). PRODUCT DESIGN, DEVELOPMENTAND VIABILITY ANALYSIS : MOTORCYCLE HELMETLIGHT SECURITY SYSTEM “DragonFlight”. (Thesis). Mälardalen University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28702

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gracia, Pedro Pablo Ferruz. “PRODUCT DESIGN, DEVELOPMENTAND VIABILITY ANALYSIS : MOTORCYCLE HELMETLIGHT SECURITY SYSTEM “DragonFlight”.” 2015. Thesis, Mälardalen University. Accessed October 28, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28702.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gracia, Pedro Pablo Ferruz. “PRODUCT DESIGN, DEVELOPMENTAND VIABILITY ANALYSIS : MOTORCYCLE HELMETLIGHT SECURITY SYSTEM “DragonFlight”.” 2015. Web. 28 Oct 2020.

Vancouver:

Gracia PPF. PRODUCT DESIGN, DEVELOPMENTAND VIABILITY ANALYSIS : MOTORCYCLE HELMETLIGHT SECURITY SYSTEM “DragonFlight”. [Internet] [Thesis]. Mälardalen University; 2015. [cited 2020 Oct 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28702.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gracia PPF. PRODUCT DESIGN, DEVELOPMENTAND VIABILITY ANALYSIS : MOTORCYCLE HELMETLIGHT SECURITY SYSTEM “DragonFlight”. [Thesis]. Mälardalen University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28702

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rice University

13. Song, Daniel W. The Design and Implementation of a Verified File System with End-to-End Data Integrity.

Degree: PhD, Engineering, 2020, Rice University

 Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has… (more)

Subjects/Keywords: software security; systems; formal verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, D. W. (2020). The Design and Implementation of a Verified File System with End-to-End Data Integrity. (Doctoral Dissertation). Rice University. Retrieved from http://hdl.handle.net/1911/108425

Chicago Manual of Style (16th Edition):

Song, Daniel W. “The Design and Implementation of a Verified File System with End-to-End Data Integrity.” 2020. Doctoral Dissertation, Rice University. Accessed October 28, 2020. http://hdl.handle.net/1911/108425.

MLA Handbook (7th Edition):

Song, Daniel W. “The Design and Implementation of a Verified File System with End-to-End Data Integrity.” 2020. Web. 28 Oct 2020.

Vancouver:

Song DW. The Design and Implementation of a Verified File System with End-to-End Data Integrity. [Internet] [Doctoral dissertation]. Rice University; 2020. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/1911/108425.

Council of Science Editors:

Song DW. The Design and Implementation of a Verified File System with End-to-End Data Integrity. [Doctoral Dissertation]. Rice University; 2020. Available from: http://hdl.handle.net/1911/108425

14. Baqer, Khaled. Resilient payment systems.

Degree: PhD, 2018, University of Cambridge

 There have been decades of attempts to evolve or revolutionise the traditional financial system, but not all such efforts have been transformative or even successful.… (more)

Subjects/Keywords: resilient; payment; systems; security; engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Baqer, K. (2018). Resilient payment systems. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.32372 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.763690

Chicago Manual of Style (16th Edition):

Baqer, Khaled. “Resilient payment systems.” 2018. Doctoral Dissertation, University of Cambridge. Accessed October 28, 2020. https://doi.org/10.17863/CAM.32372 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.763690.

MLA Handbook (7th Edition):

Baqer, Khaled. “Resilient payment systems.” 2018. Web. 28 Oct 2020.

Vancouver:

Baqer K. Resilient payment systems. [Internet] [Doctoral dissertation]. University of Cambridge; 2018. [cited 2020 Oct 28]. Available from: https://doi.org/10.17863/CAM.32372 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.763690.

Council of Science Editors:

Baqer K. Resilient payment systems. [Doctoral Dissertation]. University of Cambridge; 2018. Available from: https://doi.org/10.17863/CAM.32372 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.763690


University of Wollongong

15. Saad Alarifi, Abdulaziz. Assessing and mitigating information security risk in Saudi Arabia.

Degree: Doctor of Philosophy, 2013, University of Wollongong

  While the Web, cell phone ‘apps’ and cloud computing put a world of information at our fingertips, that information is under constant threat from… (more)

Subjects/Keywords: information security; information security awareness; information systems; information security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saad Alarifi, A. (2013). Assessing and mitigating information security risk in Saudi Arabia. (Doctoral Dissertation). University of Wollongong. Retrieved from 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317

Chicago Manual of Style (16th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Doctoral Dissertation, University of Wollongong. Accessed October 28, 2020. 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

MLA Handbook (7th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Web. 28 Oct 2020.

Vancouver:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Internet] [Doctoral dissertation]. University of Wollongong; 2013. [cited 2020 Oct 28]. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

Council of Science Editors:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Doctoral Dissertation]. University of Wollongong; 2013. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317


University of Louisville

16. Luyster, Bradley Alan. A prototype security hardened field device for SCADA systems.

Degree: M. Eng., 2011, University of Louisville

 This thesis describes the development of a prototype security hardened field device (such as a remote terminal unit) based on commodity hardware and implementing a… (more)

Subjects/Keywords: SCADA; SCADA security; Field device security; Microkennel; OKL4; Control systems security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luyster, B. A. (2011). A prototype security hardened field device for SCADA systems. (Masters Thesis). University of Louisville. Retrieved from 10.18297/etd/869 ; https://ir.library.louisville.edu/etd/869

Chicago Manual of Style (16th Edition):

Luyster, Bradley Alan. “A prototype security hardened field device for SCADA systems.” 2011. Masters Thesis, University of Louisville. Accessed October 28, 2020. 10.18297/etd/869 ; https://ir.library.louisville.edu/etd/869.

MLA Handbook (7th Edition):

Luyster, Bradley Alan. “A prototype security hardened field device for SCADA systems.” 2011. Web. 28 Oct 2020.

Vancouver:

Luyster BA. A prototype security hardened field device for SCADA systems. [Internet] [Masters thesis]. University of Louisville; 2011. [cited 2020 Oct 28]. Available from: 10.18297/etd/869 ; https://ir.library.louisville.edu/etd/869.

Council of Science Editors:

Luyster BA. A prototype security hardened field device for SCADA systems. [Masters Thesis]. University of Louisville; 2011. Available from: 10.18297/etd/869 ; https://ir.library.louisville.edu/etd/869


Utah State University

17. Houghton, Robert F. The Chain-Link Fence Model: A Framework for Creating Security Procedures.

Degree: PhD, Management Information Systems, 2013, Utah State University

 A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in… (more)

Subjects/Keywords: Computer Security; Framework Creation; IS Security; Security Framework; Security Model; Security Procedures; Business; Information Security; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Houghton, R. F. (2013). The Chain-Link Fence Model: A Framework for Creating Security Procedures. (Doctoral Dissertation). Utah State University. Retrieved from https://digitalcommons.usu.edu/etd/1967

Chicago Manual of Style (16th Edition):

Houghton, Robert F. “The Chain-Link Fence Model: A Framework for Creating Security Procedures.” 2013. Doctoral Dissertation, Utah State University. Accessed October 28, 2020. https://digitalcommons.usu.edu/etd/1967.

MLA Handbook (7th Edition):

Houghton, Robert F. “The Chain-Link Fence Model: A Framework for Creating Security Procedures.” 2013. Web. 28 Oct 2020.

Vancouver:

Houghton RF. The Chain-Link Fence Model: A Framework for Creating Security Procedures. [Internet] [Doctoral dissertation]. Utah State University; 2013. [cited 2020 Oct 28]. Available from: https://digitalcommons.usu.edu/etd/1967.

Council of Science Editors:

Houghton RF. The Chain-Link Fence Model: A Framework for Creating Security Procedures. [Doctoral Dissertation]. Utah State University; 2013. Available from: https://digitalcommons.usu.edu/etd/1967


Cape Peninsula University of Technology

18. Michiel, Michael. The institutionalisation of an information security culture in a petroleum organisation in the Western Cape .

Degree: 2018, Cape Peninsula University of Technology

 In today’s world, organisations cannot exist without having information readily available. The protection of information relies not only on technology but also on the behaviour… (more)

Subjects/Keywords: Corporations  – Security measures; Computer security; Corporate culture; Information technology  – Security measures; Security systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Michiel, M. (2018). The institutionalisation of an information security culture in a petroleum organisation in the Western Cape . (Thesis). Cape Peninsula University of Technology. Retrieved from http://etd.cput.ac.za/handle/20.500.11838/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Michiel, Michael. “The institutionalisation of an information security culture in a petroleum organisation in the Western Cape .” 2018. Thesis, Cape Peninsula University of Technology. Accessed October 28, 2020. http://etd.cput.ac.za/handle/20.500.11838/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Michiel, Michael. “The institutionalisation of an information security culture in a petroleum organisation in the Western Cape .” 2018. Web. 28 Oct 2020.

Vancouver:

Michiel M. The institutionalisation of an information security culture in a petroleum organisation in the Western Cape . [Internet] [Thesis]. Cape Peninsula University of Technology; 2018. [cited 2020 Oct 28]. Available from: http://etd.cput.ac.za/handle/20.500.11838/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Michiel M. The institutionalisation of an information security culture in a petroleum organisation in the Western Cape . [Thesis]. Cape Peninsula University of Technology; 2018. Available from: http://etd.cput.ac.za/handle/20.500.11838/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

19. Tvrz, Frankie. Information security of a bluetooth-enabled handheld device.

Degree: 2009, University of Johannesburg

M.Tech.

Mobile handheld devices are moving from being peripheral devices and are now fulfilling functionality provided by laptops and desktops. The capability and functionality of… (more)

Subjects/Keywords: Wireless communication systems - Security measures; Mobile communication systems - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tvrz, F. (2009). Information security of a bluetooth-enabled handheld device. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tvrz, Frankie. “Information security of a bluetooth-enabled handheld device.” 2009. Thesis, University of Johannesburg. Accessed October 28, 2020. http://hdl.handle.net/10210/3004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tvrz, Frankie. “Information security of a bluetooth-enabled handheld device.” 2009. Web. 28 Oct 2020.

Vancouver:

Tvrz F. Information security of a bluetooth-enabled handheld device. [Internet] [Thesis]. University of Johannesburg; 2009. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10210/3004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tvrz F. Information security of a bluetooth-enabled handheld device. [Thesis]. University of Johannesburg; 2009. Available from: http://hdl.handle.net/10210/3004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

20. Liu, Yin-Miao (Vicky). An architecture for enhanced assurance in e-health systems.

Degree: 2011, Queensland University of Technology

 Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration… (more)

Subjects/Keywords: security architecture of health information systems; security for health systems; security in health informatics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Y. (. (2011). An architecture for enhanced assurance in e-health systems. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/47051/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Yin-Miao (Vicky). “An architecture for enhanced assurance in e-health systems.” 2011. Thesis, Queensland University of Technology. Accessed October 28, 2020. https://eprints.qut.edu.au/47051/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Yin-Miao (Vicky). “An architecture for enhanced assurance in e-health systems.” 2011. Web. 28 Oct 2020.

Vancouver:

Liu Y(. An architecture for enhanced assurance in e-health systems. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2020 Oct 28]. Available from: https://eprints.qut.edu.au/47051/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu Y(. An architecture for enhanced assurance in e-health systems. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/47051/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Svensson, Benjamin. Servicing a Connected Car Service.

Degree: 2015, , Department of Computer Science and Engineering

  Increased wireless connectivity to vehicles invites both existing and new digital methods of attack, requiring the high prioritisation of security throughout the development of… (more)

Subjects/Keywords: Systems security; Network security; Distributed systems security; Penetration testing; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Svensson, B. (2015). Servicing a Connected Car Service. (Thesis). , Department of Computer Science and Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Svensson, Benjamin. “Servicing a Connected Car Service.” 2015. Thesis, , Department of Computer Science and Engineering. Accessed October 28, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Svensson, Benjamin. “Servicing a Connected Car Service.” 2015. Web. 28 Oct 2020.

Vancouver:

Svensson B. Servicing a Connected Car Service. [Internet] [Thesis]. , Department of Computer Science and Engineering; 2015. [cited 2020 Oct 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Svensson B. Servicing a Connected Car Service. [Thesis]. , Department of Computer Science and Engineering; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2453

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

22. Marin, Luis Franco. SELinux policy management framework for HIS.

Degree: 2008, Queensland University of Technology

 Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of… (more)

Subjects/Keywords: information security; security for health systems; health information systems; access control; security enhanced linux; mandatory access control; operating systems; trusted systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marin, L. F. (2008). SELinux policy management framework for HIS. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/26358/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marin, Luis Franco. “SELinux policy management framework for HIS.” 2008. Thesis, Queensland University of Technology. Accessed October 28, 2020. https://eprints.qut.edu.au/26358/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marin, Luis Franco. “SELinux policy management framework for HIS.” 2008. Web. 28 Oct 2020.

Vancouver:

Marin LF. SELinux policy management framework for HIS. [Internet] [Thesis]. Queensland University of Technology; 2008. [cited 2020 Oct 28]. Available from: https://eprints.qut.edu.au/26358/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marin LF. SELinux policy management framework for HIS. [Thesis]. Queensland University of Technology; 2008. Available from: https://eprints.qut.edu.au/26358/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kennesaw State University

23. Laufenberg, Daniel. An Architecture for Blockchain-based Collaborative Signature-based Intrusion Detection System.

Degree: MSIT, Information Technology, 2019, Kennesaw State University

  Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share resources, have been proposed to cope with the increasingly sophisticated… (more)

Subjects/Keywords: blockchain security intrusion detection systems IDS architecture; Databases and Information Systems; Information Security; Systems Architecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laufenberg, D. (2019). An Architecture for Blockchain-based Collaborative Signature-based Intrusion Detection System. (Thesis). Kennesaw State University. Retrieved from https://digitalcommons.kennesaw.edu/msit_etd/5

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laufenberg, Daniel. “An Architecture for Blockchain-based Collaborative Signature-based Intrusion Detection System.” 2019. Thesis, Kennesaw State University. Accessed October 28, 2020. https://digitalcommons.kennesaw.edu/msit_etd/5.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laufenberg, Daniel. “An Architecture for Blockchain-based Collaborative Signature-based Intrusion Detection System.” 2019. Web. 28 Oct 2020.

Vancouver:

Laufenberg D. An Architecture for Blockchain-based Collaborative Signature-based Intrusion Detection System. [Internet] [Thesis]. Kennesaw State University; 2019. [cited 2020 Oct 28]. Available from: https://digitalcommons.kennesaw.edu/msit_etd/5.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laufenberg D. An Architecture for Blockchain-based Collaborative Signature-based Intrusion Detection System. [Thesis]. Kennesaw State University; 2019. Available from: https://digitalcommons.kennesaw.edu/msit_etd/5

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

24. Mayisela, Simphiwe Hector. Data-centric security : towards a utopian model for protecting corporate data on mobile devices.

Degree: Faculty of Science, Computer Science, 2014, Rhodes University

 Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures; Mobile communication systems  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mayisela, S. H. (2014). Data-centric security : towards a utopian model for protecting corporate data on mobile devices. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Thesis, Rhodes University. Accessed October 28, 2020. http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Web. 28 Oct 2020.

Vancouver:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Internet] [Thesis]. Rhodes University; 2014. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Thesis]. Rhodes University; 2014. Available from: http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oulu

25. Karjalainen, M. (Mari). Improving employees’ information systems (IS) security behavior:toward a meta-theory of IS security training and a new framework for understanding employees' IS security behavior.

Degree: 2011, University of Oulu

Abstract Employee non-compliance with information systems (IS) security procedures is a key concern for organizations. However, even though the importance of having effective IS security(more)

Subjects/Keywords: information systems security; information systems security behavior; information systems security training; learning paradigms; oppimisparadigmat; tietoturva; tietoturvakoulutus; tietoturvakäyttäytyminen

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karjalainen, M. (. (2011). Improving employees’ information systems (IS) security behavior:toward a meta-theory of IS security training and a new framework for understanding employees' IS security behavior. (Doctoral Dissertation). University of Oulu. Retrieved from http://urn.fi/urn:isbn:9789514295676

Chicago Manual of Style (16th Edition):

Karjalainen, M (Mari). “Improving employees’ information systems (IS) security behavior:toward a meta-theory of IS security training and a new framework for understanding employees' IS security behavior.” 2011. Doctoral Dissertation, University of Oulu. Accessed October 28, 2020. http://urn.fi/urn:isbn:9789514295676.

MLA Handbook (7th Edition):

Karjalainen, M (Mari). “Improving employees’ information systems (IS) security behavior:toward a meta-theory of IS security training and a new framework for understanding employees' IS security behavior.” 2011. Web. 28 Oct 2020.

Vancouver:

Karjalainen M(. Improving employees’ information systems (IS) security behavior:toward a meta-theory of IS security training and a new framework for understanding employees' IS security behavior. [Internet] [Doctoral dissertation]. University of Oulu; 2011. [cited 2020 Oct 28]. Available from: http://urn.fi/urn:isbn:9789514295676.

Council of Science Editors:

Karjalainen M(. Improving employees’ information systems (IS) security behavior:toward a meta-theory of IS security training and a new framework for understanding employees' IS security behavior. [Doctoral Dissertation]. University of Oulu; 2011. Available from: http://urn.fi/urn:isbn:9789514295676


University of Rochester

26. Chen, Zhuan. System support for data-intensive sensing in the field.

Degree: PhD, 2016, University of Rochester

 High-intensity data sensing and processing in the field are important for emerging applications in intelligent transportation, surveillance, and environmental management. Many such systems reside in… (more)

Subjects/Keywords: Cyber-physical systems; Deduplication; Operating systems; Security; Storage systems; Virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Z. (2016). System support for data-intensive sensing in the field. (Doctoral Dissertation). University of Rochester. Retrieved from http://hdl.handle.net/1802/31468

Chicago Manual of Style (16th Edition):

Chen, Zhuan. “System support for data-intensive sensing in the field.” 2016. Doctoral Dissertation, University of Rochester. Accessed October 28, 2020. http://hdl.handle.net/1802/31468.

MLA Handbook (7th Edition):

Chen, Zhuan. “System support for data-intensive sensing in the field.” 2016. Web. 28 Oct 2020.

Vancouver:

Chen Z. System support for data-intensive sensing in the field. [Internet] [Doctoral dissertation]. University of Rochester; 2016. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/1802/31468.

Council of Science Editors:

Chen Z. System support for data-intensive sensing in the field. [Doctoral Dissertation]. University of Rochester; 2016. Available from: http://hdl.handle.net/1802/31468


Nelson Mandela Metropolitan University

27. Coertze, Jacques Jacobus. A framework for information security governance in SMMEs.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sound information security governance principles, specifically the principles involved… (more)

Subjects/Keywords: Business  – Data processing  – Security measures; Management information systems  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coertze, J. J. (2012). A framework for information security governance in SMMEs. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed October 28, 2020. http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coertze, Jacques Jacobus. “A framework for information security governance in SMMEs.” 2012. Web. 28 Oct 2020.

Vancouver:

Coertze JJ. A framework for information security governance in SMMEs. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10948/d1014083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coertze JJ. A framework for information security governance in SMMEs. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1014083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

28. Van Zyl, Pieter Willem Jordaan. MOSS : a model for open system security.

Degree: 2012, University of Johannesburg

Ph.D

This thesis looks at current security problems within open system environments, that is security problems within heterogeneous computer system environments that are interconnected via… (more)

Subjects/Keywords: Computer security - South Africa; Computer networks - Security measures; Security systems - Models.; Computers - Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Zyl, P. W. J. (2012). MOSS : a model for open system security. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Zyl, Pieter Willem Jordaan. “MOSS : a model for open system security.” 2012. Thesis, University of Johannesburg. Accessed October 28, 2020. http://hdl.handle.net/10210/7645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Zyl, Pieter Willem Jordaan. “MOSS : a model for open system security.” 2012. Web. 28 Oct 2020.

Vancouver:

Van Zyl PWJ. MOSS : a model for open system security. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10210/7645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Zyl PWJ. MOSS : a model for open system security. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

29. Diakite, Soumaila Dit Moule. WISP: a wireless information security portal.

Degree: 2010, University of Johannesburg

M.Sc.

Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless… (more)

Subjects/Keywords: Wireless communication systems security measures; Wireless LANs security measures; Computer networks security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diakite, S. D. M. (2010). WISP: a wireless information security portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Thesis, University of Johannesburg. Accessed October 28, 2020. http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Diakite, Soumaila Dit Moule. “WISP: a wireless information security portal.” 2010. Web. 28 Oct 2020.

Vancouver:

Diakite SDM. WISP: a wireless information security portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/10210/3060.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Diakite SDM. WISP: a wireless information security portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3060

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Loughborough University

30. Alkahtani, Hend K. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.

Degree: PhD, 2018, Loughborough University

 The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all… (more)

Subjects/Keywords: 658.4; Information systems; Information security; Security awareness; Saudi Arabian culture; Security policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkahtani, H. K. (2018). Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/28120

Chicago Manual of Style (16th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Doctoral Dissertation, Loughborough University. Accessed October 28, 2020. http://hdl.handle.net/2134/28120.

MLA Handbook (7th Edition):

Alkahtani, Hend K. “Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework.” 2018. Web. 28 Oct 2020.

Vancouver:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2020 Oct 28]. Available from: http://hdl.handle.net/2134/28120.

Council of Science Editors:

Alkahtani HK. Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/28120

[1] [2] [3] [4] [5] … [51]

.