Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Software Security). Showing records 1 – 30 of 530 total matches.

[1] [2] [3] [4] [5] … [18]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Queens University

1. Das, Saikat. A Cloud-based Framework for Security Analysis of Browser Extensions .

Degree: Electrical and Computer Engineering, 2016, Queens University

 In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of… (more)

Subjects/Keywords: Software Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Das, S. (2016). A Cloud-based Framework for Security Analysis of Browser Extensions . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/14432

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Das, Saikat. “A Cloud-based Framework for Security Analysis of Browser Extensions .” 2016. Thesis, Queens University. Accessed October 29, 2020. http://hdl.handle.net/1974/14432.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Das, Saikat. “A Cloud-based Framework for Security Analysis of Browser Extensions .” 2016. Web. 29 Oct 2020.

Vancouver:

Das S. A Cloud-based Framework for Security Analysis of Browser Extensions . [Internet] [Thesis]. Queens University; 2016. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1974/14432.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Das S. A Cloud-based Framework for Security Analysis of Browser Extensions . [Thesis]. Queens University; 2016. Available from: http://hdl.handle.net/1974/14432

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

2. Hunny, Umme. Orthogonal Security Defect Classification for Secure Software Development .

Degree: Computing, 2012, Queens University

Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than… (more)

Subjects/Keywords: Security defect classification ; Software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hunny, U. (2012). Orthogonal Security Defect Classification for Secure Software Development . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Thesis, Queens University. Accessed October 29, 2020. http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Web. 29 Oct 2020.

Vancouver:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Internet] [Thesis]. Queens University; 2012. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Thesis]. Queens University; 2012. Available from: http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


San Jose State University

3. Le, Kyle. Towards a secure sotware development lifecycle with SQUARE+R.

Degree: MS, Computer Engineering, 2012, San Jose State University

Software security has been recognized to be an important trait for future software development, but the adoption of a secure software development lifecycle has… (more)

Subjects/Keywords: SDLC; Security; Software

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Le, K. (2012). Towards a secure sotware development lifecycle with SQUARE+R. (Masters Thesis). San Jose State University. Retrieved from https://doi.org/10.31979/etd.b8rs-urwn ; https://scholarworks.sjsu.edu/etd_theses/4144

Chicago Manual of Style (16th Edition):

Le, Kyle. “Towards a secure sotware development lifecycle with SQUARE+R.” 2012. Masters Thesis, San Jose State University. Accessed October 29, 2020. https://doi.org/10.31979/etd.b8rs-urwn ; https://scholarworks.sjsu.edu/etd_theses/4144.

MLA Handbook (7th Edition):

Le, Kyle. “Towards a secure sotware development lifecycle with SQUARE+R.” 2012. Web. 29 Oct 2020.

Vancouver:

Le K. Towards a secure sotware development lifecycle with SQUARE+R. [Internet] [Masters thesis]. San Jose State University; 2012. [cited 2020 Oct 29]. Available from: https://doi.org/10.31979/etd.b8rs-urwn ; https://scholarworks.sjsu.edu/etd_theses/4144.

Council of Science Editors:

Le K. Towards a secure sotware development lifecycle with SQUARE+R. [Masters Thesis]. San Jose State University; 2012. Available from: https://doi.org/10.31979/etd.b8rs-urwn ; https://scholarworks.sjsu.edu/etd_theses/4144


Penn State University

4. Xu, Jun. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS.

Degree: 2018, Penn State University

Software systems are expanding into every aspect of human society. Accompanying this expansion comes a substantial growth of motivated adversaries and sophisticated attacks. This pair… (more)

Subjects/Keywords: Software security; Software crash diagnosis; Software vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, J. (2018). BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15418jxx13

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xu, Jun. “BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS.” 2018. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/15418jxx13.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xu, Jun. “BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS.” 2018. Web. 29 Oct 2020.

Vancouver:

Xu J. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/15418jxx13.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xu J. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15418jxx13

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

5. Awadhutkar, Payas. Human-centric verification for software safety and security.

Degree: 2020, Iowa State University

Software forms a critical part of our lives today. Verifying software to avoid violations of safety and security properties is a necessary task. It is… (more)

Subjects/Keywords: Software Analysis; Software Assurance; Software Safety; Software Security; Software Verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Awadhutkar, P. (2020). Human-centric verification for software safety and security. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/18009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Awadhutkar, Payas. “Human-centric verification for software safety and security.” 2020. Thesis, Iowa State University. Accessed October 29, 2020. https://lib.dr.iastate.edu/etd/18009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Awadhutkar, Payas. “Human-centric verification for software safety and security.” 2020. Web. 29 Oct 2020.

Vancouver:

Awadhutkar P. Human-centric verification for software safety and security. [Internet] [Thesis]. Iowa State University; 2020. [cited 2020 Oct 29]. Available from: https://lib.dr.iastate.edu/etd/18009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Awadhutkar P. Human-centric verification for software safety and security. [Thesis]. Iowa State University; 2020. Available from: https://lib.dr.iastate.edu/etd/18009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Deakin University

6. Cesare, Silvio. Software similarity and classification.

Degree: School of Information Technology, 2013, Deakin University

This thesis analyses software programs in the context of their similarity to other software programs. Applications proposed and implemented include detecting malicious software and discovering security vulnerabilities. Advisors/Committee Members: Xiang, Yang.

Subjects/Keywords: Software similarity; Software security; Malicious software; Security vulnerabilities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cesare, S. (2013). Software similarity and classification. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30063491

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cesare, Silvio. “Software similarity and classification.” 2013. Thesis, Deakin University. Accessed October 29, 2020. http://hdl.handle.net/10536/DRO/DU:30063491.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cesare, Silvio. “Software similarity and classification.” 2013. Web. 29 Oct 2020.

Vancouver:

Cesare S. Software similarity and classification. [Internet] [Thesis]. Deakin University; 2013. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10536/DRO/DU:30063491.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cesare S. Software similarity and classification. [Thesis]. Deakin University; 2013. Available from: http://hdl.handle.net/10536/DRO/DU:30063491

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

7. Costa, Francesco. A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS.

Degree: 2012, University of Illinois – Chicago

Security breaches and vulnerability in software are topics that are rapidly gaining importance and fame. Every year about 6000 vulnerabilities are officially classified in the… (more)

Subjects/Keywords: taxonomy; computer security; security evaluation; taxonomization; security flaw; software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Costa, F. (2012). A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/9313

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Costa, Francesco. “A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS.” 2012. Thesis, University of Illinois – Chicago. Accessed October 29, 2020. http://hdl.handle.net/10027/9313.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Costa, Francesco. “A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS.” 2012. Web. 29 Oct 2020.

Vancouver:

Costa F. A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS. [Internet] [Thesis]. University of Illinois – Chicago; 2012. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10027/9313.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Costa F. A Layer-Independent Taxonomy for Evaluating Application Security and its application to the Ethos OS. [Thesis]. University of Illinois – Chicago; 2012. Available from: http://hdl.handle.net/10027/9313

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

8. Pek, Edgar. Automated deductive verification of systems software.

Degree: PhD, Computer Science, 2015, University of Illinois – Urbana-Champaign

Software has become an integral part of our everyday lives, and so is our reliance on his correct functioning. Systems software lies at the heart… (more)

Subjects/Keywords: software verification; software security; automated deductive reasoning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pek, E. (2015). Automated deductive verification of systems software. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/88993

Chicago Manual of Style (16th Edition):

Pek, Edgar. “Automated deductive verification of systems software.” 2015. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 29, 2020. http://hdl.handle.net/2142/88993.

MLA Handbook (7th Edition):

Pek, Edgar. “Automated deductive verification of systems software.” 2015. Web. 29 Oct 2020.

Vancouver:

Pek E. Automated deductive verification of systems software. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2015. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/2142/88993.

Council of Science Editors:

Pek E. Automated deductive verification of systems software. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/88993

9. Kanzaki, Yuichiro. Protecting secret information in software processes and products : ソフトウェアプロセスおよびソフトウェアプロダクトに含まれる秘密情報の保護; ソフトウェアプロセス オヨビ ソフトウェアプロダクト ニ フクマレル ヒミツジョウホウ ノ ホゴ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kanzaki, Y. (n.d.). Protecting secret information in software processes and products : ソフトウェアプロセスおよびソフトウェアプロダクトに含まれる秘密情報の保護; ソフトウェアプロセス オヨビ ソフトウェアプロダクト ニ フクマレル ヒミツジョウホウ ノ ホゴ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2877

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kanzaki, Yuichiro. “Protecting secret information in software processes and products : ソフトウェアプロセスおよびソフトウェアプロダクトに含まれる秘密情報の保護; ソフトウェアプロセス オヨビ ソフトウェアプロダクト ニ フクマレル ヒミツジョウホウ ノ ホゴ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed October 29, 2020. http://hdl.handle.net/10061/2877.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kanzaki, Yuichiro. “Protecting secret information in software processes and products : ソフトウェアプロセスおよびソフトウェアプロダクトに含まれる秘密情報の保護; ソフトウェアプロセス オヨビ ソフトウェアプロダクト ニ フクマレル ヒミツジョウホウ ノ ホゴ.” Web. 29 Oct 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Kanzaki Y. Protecting secret information in software processes and products : ソフトウェアプロセスおよびソフトウェアプロダクトに含まれる秘密情報の保護; ソフトウェアプロセス オヨビ ソフトウェアプロダクト ニ フクマレル ヒミツジョウホウ ノ ホゴ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10061/2877.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Kanzaki Y. Protecting secret information in software processes and products : ソフトウェアプロセスおよびソフトウェアプロダクトに含まれる秘密情報の保護; ソフトウェアプロセス オヨビ ソフトウェアプロダクト ニ フクマレル ヒミツジョウホウ ノ ホゴ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2877

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Auckland

10. Zhu, William Feng. Concepts and techniques in software watermarking and obfuscation.

Degree: 2007, University of Auckland

 With the rapid development of the internet, copying a digital document is so easy and economically affordable that digital piracy is rampant. As a result,… (more)

Subjects/Keywords: computer science; software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, W. F. (2007). Concepts and techniques in software watermarking and obfuscation. (Doctoral Dissertation). University of Auckland. Retrieved from http://hdl.handle.net/2292/1511

Chicago Manual of Style (16th Edition):

Zhu, William Feng. “Concepts and techniques in software watermarking and obfuscation.” 2007. Doctoral Dissertation, University of Auckland. Accessed October 29, 2020. http://hdl.handle.net/2292/1511.

MLA Handbook (7th Edition):

Zhu, William Feng. “Concepts and techniques in software watermarking and obfuscation.” 2007. Web. 29 Oct 2020.

Vancouver:

Zhu WF. Concepts and techniques in software watermarking and obfuscation. [Internet] [Doctoral dissertation]. University of Auckland; 2007. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/2292/1511.

Council of Science Editors:

Zhu WF. Concepts and techniques in software watermarking and obfuscation. [Doctoral Dissertation]. University of Auckland; 2007. Available from: http://hdl.handle.net/2292/1511


University of California – Irvine

11. Hawkins, Byron. DCFI: Control Flow Integrity for Modern Windows Applications.

Degree: Electrical and Computer Engineering, 2014, University of California – Irvine

 Control flow integrity or CFI has emerged as an important technique forpreventing attacks on software. Previous approaches relied on staticanalysis and thus largely target static… (more)

Subjects/Keywords: Computer engineering; CFI; Security; Software

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hawkins, B. (2014). DCFI: Control Flow Integrity for Modern Windows Applications. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/6705s87n

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hawkins, Byron. “DCFI: Control Flow Integrity for Modern Windows Applications.” 2014. Thesis, University of California – Irvine. Accessed October 29, 2020. http://www.escholarship.org/uc/item/6705s87n.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hawkins, Byron. “DCFI: Control Flow Integrity for Modern Windows Applications.” 2014. Web. 29 Oct 2020.

Vancouver:

Hawkins B. DCFI: Control Flow Integrity for Modern Windows Applications. [Internet] [Thesis]. University of California – Irvine; 2014. [cited 2020 Oct 29]. Available from: http://www.escholarship.org/uc/item/6705s87n.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hawkins B. DCFI: Control Flow Integrity for Modern Windows Applications. [Thesis]. University of California – Irvine; 2014. Available from: http://www.escholarship.org/uc/item/6705s87n

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

12. Munaiah, Nuthan. Toward Data-Driven Discovery of Software Vulnerabilities.

Degree: PhD, Computer Science (GCCIS), 2020, Rochester Institute of Technology

  Over the years, Software Engineering, as a discipline, has recognized the potential for engineers to make mistakes and has incorporated processes to prevent such… (more)

Subjects/Keywords: Discovery; Metrics; Security; Software; Vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Munaiah, N. (2020). Toward Data-Driven Discovery of Software Vulnerabilities. (Doctoral Dissertation). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/10442

Chicago Manual of Style (16th Edition):

Munaiah, Nuthan. “Toward Data-Driven Discovery of Software Vulnerabilities.” 2020. Doctoral Dissertation, Rochester Institute of Technology. Accessed October 29, 2020. https://scholarworks.rit.edu/theses/10442.

MLA Handbook (7th Edition):

Munaiah, Nuthan. “Toward Data-Driven Discovery of Software Vulnerabilities.” 2020. Web. 29 Oct 2020.

Vancouver:

Munaiah N. Toward Data-Driven Discovery of Software Vulnerabilities. [Internet] [Doctoral dissertation]. Rochester Institute of Technology; 2020. [cited 2020 Oct 29]. Available from: https://scholarworks.rit.edu/theses/10442.

Council of Science Editors:

Munaiah N. Toward Data-Driven Discovery of Software Vulnerabilities. [Doctoral Dissertation]. Rochester Institute of Technology; 2020. Available from: https://scholarworks.rit.edu/theses/10442


Texas A&M University

13. Wang, Haopei. Towards Robust, Accountable and Multitenancy-Friendly Control Plane in Software-Defined Networks.

Degree: PhD, Computer Engineering, 2018, Texas A&M University

Software-Defined Networking (SDN) has quickly emerged as a new promising technology for future networks. Its decoupling of the logically centralized control plane from the data… (more)

Subjects/Keywords: Computer Security; Software-Defined Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, H. (2018). Towards Robust, Accountable and Multitenancy-Friendly Control Plane in Software-Defined Networks. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/174094

Chicago Manual of Style (16th Edition):

Wang, Haopei. “Towards Robust, Accountable and Multitenancy-Friendly Control Plane in Software-Defined Networks.” 2018. Doctoral Dissertation, Texas A&M University. Accessed October 29, 2020. http://hdl.handle.net/1969.1/174094.

MLA Handbook (7th Edition):

Wang, Haopei. “Towards Robust, Accountable and Multitenancy-Friendly Control Plane in Software-Defined Networks.” 2018. Web. 29 Oct 2020.

Vancouver:

Wang H. Towards Robust, Accountable and Multitenancy-Friendly Control Plane in Software-Defined Networks. [Internet] [Doctoral dissertation]. Texas A&M University; 2018. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1969.1/174094.

Council of Science Editors:

Wang H. Towards Robust, Accountable and Multitenancy-Friendly Control Plane in Software-Defined Networks. [Doctoral Dissertation]. Texas A&M University; 2018. Available from: http://hdl.handle.net/1969.1/174094


University of Ontario Institute of Technology

14. Garcia, Ricardo Rodriguez. Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt.

Degree: 2013, University of Ontario Institute of Technology

 The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In… (more)

Subjects/Keywords: Security; Usability; Software; Tool; Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garcia, R. R. (2013). Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garcia, Ricardo Rodriguez. “Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt.” 2013. Thesis, University of Ontario Institute of Technology. Accessed October 29, 2020. http://hdl.handle.net/10155/307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garcia, Ricardo Rodriguez. “Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt.” 2013. Web. 29 Oct 2020.

Vancouver:

Garcia RR. Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt. [Internet] [Thesis]. University of Ontario Institute of Technology; 2013. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10155/307.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garcia RR. Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt. [Thesis]. University of Ontario Institute of Technology; 2013. Available from: http://hdl.handle.net/10155/307

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rice University

15. Song, Daniel W. The Design and Implementation of a Verified File System with End-to-End Data Integrity.

Degree: PhD, Engineering, 2020, Rice University

 Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has… (more)

Subjects/Keywords: software security; systems; formal verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, D. W. (2020). The Design and Implementation of a Verified File System with End-to-End Data Integrity. (Doctoral Dissertation). Rice University. Retrieved from http://hdl.handle.net/1911/108425

Chicago Manual of Style (16th Edition):

Song, Daniel W. “The Design and Implementation of a Verified File System with End-to-End Data Integrity.” 2020. Doctoral Dissertation, Rice University. Accessed October 29, 2020. http://hdl.handle.net/1911/108425.

MLA Handbook (7th Edition):

Song, Daniel W. “The Design and Implementation of a Verified File System with End-to-End Data Integrity.” 2020. Web. 29 Oct 2020.

Vancouver:

Song DW. The Design and Implementation of a Verified File System with End-to-End Data Integrity. [Internet] [Doctoral dissertation]. Rice University; 2020. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1911/108425.

Council of Science Editors:

Song DW. The Design and Implementation of a Verified File System with End-to-End Data Integrity. [Doctoral Dissertation]. Rice University; 2020. Available from: http://hdl.handle.net/1911/108425


Delft University of Technology

16. Pors, Marlou (author). Investigating current state Security of OpenFlow Networks: Focusing on the control-data plane communications.

Degree: 2017, Delft University of Technology

Software-Defined Networking (SDN) is the emerging paradigm that breaks vertical integration in networks, separating the network’s control logic from the underlying network devices such as… (more)

Subjects/Keywords: Software Defined Networking; OpenFlow; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pors, M. (. (2017). Investigating current state Security of OpenFlow Networks: Focusing on the control-data plane communications. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:7c917480-5eb3-46e2-93be-07e95efa30fd

Chicago Manual of Style (16th Edition):

Pors, Marlou (author). “Investigating current state Security of OpenFlow Networks: Focusing on the control-data plane communications.” 2017. Masters Thesis, Delft University of Technology. Accessed October 29, 2020. http://resolver.tudelft.nl/uuid:7c917480-5eb3-46e2-93be-07e95efa30fd.

MLA Handbook (7th Edition):

Pors, Marlou (author). “Investigating current state Security of OpenFlow Networks: Focusing on the control-data plane communications.” 2017. Web. 29 Oct 2020.

Vancouver:

Pors M(. Investigating current state Security of OpenFlow Networks: Focusing on the control-data plane communications. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2020 Oct 29]. Available from: http://resolver.tudelft.nl/uuid:7c917480-5eb3-46e2-93be-07e95efa30fd.

Council of Science Editors:

Pors M(. Investigating current state Security of OpenFlow Networks: Focusing on the control-data plane communications. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:7c917480-5eb3-46e2-93be-07e95efa30fd


Georgia Tech

17. Flansburg, Kevin. A framework for automated management of exploit testing environments.

Degree: MS, Computational Science and Engineering, 2015, Georgia Tech

 To demonstrate working exploits or vulnerabilities, people often share their findings as a form of proof-of-concept (PoC) prototype. Such practices are particularly useful to learn… (more)

Subjects/Keywords: Software testing; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flansburg, K. (2015). A framework for automated management of exploit testing environments. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54912

Chicago Manual of Style (16th Edition):

Flansburg, Kevin. “A framework for automated management of exploit testing environments.” 2015. Masters Thesis, Georgia Tech. Accessed October 29, 2020. http://hdl.handle.net/1853/54912.

MLA Handbook (7th Edition):

Flansburg, Kevin. “A framework for automated management of exploit testing environments.” 2015. Web. 29 Oct 2020.

Vancouver:

Flansburg K. A framework for automated management of exploit testing environments. [Internet] [Masters thesis]. Georgia Tech; 2015. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/1853/54912.

Council of Science Editors:

Flansburg K. A framework for automated management of exploit testing environments. [Masters Thesis]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54912


Kansas State University

18. Rahman, Muhammad Sajidur. An empirical case study on Stack Overflow to explore developers’ security challenges.

Degree: MS, Department of Computing and Information Sciences, 2016, Kansas State University

 The unprecedented growth of ubiquitous computing infrastructure has brought new challenges for security, privacy, and trust. New problems range from mobile apps with incomprehensible permission… (more)

Subjects/Keywords: Mining; Software Security; Security & Privacy; Software Engineering; Topic Model; Stack Overflow

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rahman, M. S. (2016). An empirical case study on Stack Overflow to explore developers’ security challenges. (Masters Thesis). Kansas State University. Retrieved from http://hdl.handle.net/2097/34563

Chicago Manual of Style (16th Edition):

Rahman, Muhammad Sajidur. “An empirical case study on Stack Overflow to explore developers’ security challenges.” 2016. Masters Thesis, Kansas State University. Accessed October 29, 2020. http://hdl.handle.net/2097/34563.

MLA Handbook (7th Edition):

Rahman, Muhammad Sajidur. “An empirical case study on Stack Overflow to explore developers’ security challenges.” 2016. Web. 29 Oct 2020.

Vancouver:

Rahman MS. An empirical case study on Stack Overflow to explore developers’ security challenges. [Internet] [Masters thesis]. Kansas State University; 2016. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/2097/34563.

Council of Science Editors:

Rahman MS. An empirical case study on Stack Overflow to explore developers’ security challenges. [Masters Thesis]. Kansas State University; 2016. Available from: http://hdl.handle.net/2097/34563

19. Islam, Gibrail. A Framework for Security Requirements Elicitation.

Degree: 2012, , School of Computing

  Context: Security considerations are typically incorporated in the later stages of development as an afterthought. Security in software system is put under the category… (more)

Subjects/Keywords: Security Requirement Elicitation Framework; Security Requirement Engineering; Software Security; Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Islam, G. (2012). A Framework for Security Requirements Elicitation. (Thesis). , School of Computing. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Islam, Gibrail. “A Framework for Security Requirements Elicitation.” 2012. Thesis, , School of Computing. Accessed October 29, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Islam, Gibrail. “A Framework for Security Requirements Elicitation.” 2012. Web. 29 Oct 2020.

Vancouver:

Islam G. A Framework for Security Requirements Elicitation. [Internet] [Thesis]. , School of Computing; 2012. [cited 2020 Oct 29]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Islam G. A Framework for Security Requirements Elicitation. [Thesis]. , School of Computing; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3448

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Khamaiseh, Samer Yousef. Security Testing with Misuse Case Modeling.

Degree: 2016, Boise State University

 Having a comprehensive model of security requirements is a crucial step towards developing a reliable software system. An effective model of security requirements which describes… (more)

Subjects/Keywords: software testing; security testing; misuse case modeling and security testing; Information Security; Software Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khamaiseh, S. Y. (2016). Security Testing with Misuse Case Modeling. (Thesis). Boise State University. Retrieved from https://scholarworks.boisestate.edu/td/1213

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khamaiseh, Samer Yousef. “Security Testing with Misuse Case Modeling.” 2016. Thesis, Boise State University. Accessed October 29, 2020. https://scholarworks.boisestate.edu/td/1213.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khamaiseh, Samer Yousef. “Security Testing with Misuse Case Modeling.” 2016. Web. 29 Oct 2020.

Vancouver:

Khamaiseh SY. Security Testing with Misuse Case Modeling. [Internet] [Thesis]. Boise State University; 2016. [cited 2020 Oct 29]. Available from: https://scholarworks.boisestate.edu/td/1213.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khamaiseh SY. Security Testing with Misuse Case Modeling. [Thesis]. Boise State University; 2016. Available from: https://scholarworks.boisestate.edu/td/1213

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

21. Cabrey, Craig. Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project.

Degree: MS, Software Engineering (GCCIS), 2016, Rochester Institute of Technology

  As the world continues to embrace a completely digital society in all aspects of life, the ever present threat of a security flaw in… (more)

Subjects/Keywords: Open source; Software evolution; Software mining; Software security; Vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cabrey, C. (2016). Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9212

Chicago Manual of Style (16th Edition):

Cabrey, Craig. “Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed October 29, 2020. https://scholarworks.rit.edu/theses/9212.

MLA Handbook (7th Edition):

Cabrey, Craig. “Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project.” 2016. Web. 29 Oct 2020.

Vancouver:

Cabrey C. Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2020 Oct 29]. Available from: https://scholarworks.rit.edu/theses/9212.

Council of Science Editors:

Cabrey C. Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9212


Queensland University of Technology

22. Alshammari, Bandar M. Quality metrics for assessing security-critical computer programs.

Degree: 2011, Queensland University of Technology

 Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues… (more)

Subjects/Keywords: object-orientation; software security; Java security; software quality metrics; security metrics; security design principles; refactoring; software design; software coding; software maintenance; information flow

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alshammari, B. M. (2011). Quality metrics for assessing security-critical computer programs. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/49780/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alshammari, Bandar M. “Quality metrics for assessing security-critical computer programs.” 2011. Thesis, Queensland University of Technology. Accessed October 29, 2020. https://eprints.qut.edu.au/49780/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alshammari, Bandar M. “Quality metrics for assessing security-critical computer programs.” 2011. Web. 29 Oct 2020.

Vancouver:

Alshammari BM. Quality metrics for assessing security-critical computer programs. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2020 Oct 29]. Available from: https://eprints.qut.edu.au/49780/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alshammari BM. Quality metrics for assessing security-critical computer programs. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/49780/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

23. Yasaweerasinghelage, Rajitha Madhushan Ranasinghe. Model-based Evaluation and Design for Secure Architecture.

Degree: Computer Science & Engineering, 2020, University of New South Wales

 Designing optimal architectures for software systems is difficult, as the number of design alternatives and component interactions can be overwhelmingly large to evaluate and compare.… (more)

Subjects/Keywords: Software performance modelling; Software architecture; Architecture optimisation; Software security; Software performance prediction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yasaweerasinghelage, R. M. R. (2020). Model-based Evaluation and Design for Secure Architecture. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/65522 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:64498/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Yasaweerasinghelage, Rajitha Madhushan Ranasinghe. “Model-based Evaluation and Design for Secure Architecture.” 2020. Doctoral Dissertation, University of New South Wales. Accessed October 29, 2020. http://handle.unsw.edu.au/1959.4/65522 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:64498/SOURCE02?view=true.

MLA Handbook (7th Edition):

Yasaweerasinghelage, Rajitha Madhushan Ranasinghe. “Model-based Evaluation and Design for Secure Architecture.” 2020. Web. 29 Oct 2020.

Vancouver:

Yasaweerasinghelage RMR. Model-based Evaluation and Design for Secure Architecture. [Internet] [Doctoral dissertation]. University of New South Wales; 2020. [cited 2020 Oct 29]. Available from: http://handle.unsw.edu.au/1959.4/65522 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:64498/SOURCE02?view=true.

Council of Science Editors:

Yasaweerasinghelage RMR. Model-based Evaluation and Design for Secure Architecture. [Doctoral Dissertation]. University of New South Wales; 2020. Available from: http://handle.unsw.edu.au/1959.4/65522 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:64498/SOURCE02?view=true


Rochester Institute of Technology

24. Chin, Tommy. A Reputation Score Driven E-Mail Mitigation System.

Degree: MS, Department of Computing Security (GCCIS), 2020, Rochester Institute of Technology

  E-mail inspection and mitigation systems are necessary in today's world due to frequent bombardment of adversarial attacks leverage phishing techniques. The process and accuracy… (more)

Subjects/Keywords: Phishing; Security; Software-defined networking (SDN)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chin, T. (2020). A Reputation Score Driven E-Mail Mitigation System. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/10524

Chicago Manual of Style (16th Edition):

Chin, Tommy. “A Reputation Score Driven E-Mail Mitigation System.” 2020. Masters Thesis, Rochester Institute of Technology. Accessed October 29, 2020. https://scholarworks.rit.edu/theses/10524.

MLA Handbook (7th Edition):

Chin, Tommy. “A Reputation Score Driven E-Mail Mitigation System.” 2020. Web. 29 Oct 2020.

Vancouver:

Chin T. A Reputation Score Driven E-Mail Mitigation System. [Internet] [Masters thesis]. Rochester Institute of Technology; 2020. [cited 2020 Oct 29]. Available from: https://scholarworks.rit.edu/theses/10524.

Council of Science Editors:

Chin T. A Reputation Score Driven E-Mail Mitigation System. [Masters Thesis]. Rochester Institute of Technology; 2020. Available from: https://scholarworks.rit.edu/theses/10524


Drexel University

25. Saxena, Saumya. Malware Detection using Behavioral Whitelisting of Software.

Degree: 2019, Drexel University

The detection of malware has been an active area of research for a long period of time. In today’s world of computing, one of the… (more)

Subjects/Keywords: Computer science; Computer security; Malware (Computer software)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saxena, S. (2019). Malware Detection using Behavioral Whitelisting of Software. (Thesis). Drexel University. Retrieved from https://idea.library.drexel.edu/islandora/object/idea%3A9406

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Saxena, Saumya. “Malware Detection using Behavioral Whitelisting of Software.” 2019. Thesis, Drexel University. Accessed October 29, 2020. https://idea.library.drexel.edu/islandora/object/idea%3A9406.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Saxena, Saumya. “Malware Detection using Behavioral Whitelisting of Software.” 2019. Web. 29 Oct 2020.

Vancouver:

Saxena S. Malware Detection using Behavioral Whitelisting of Software. [Internet] [Thesis]. Drexel University; 2019. [cited 2020 Oct 29]. Available from: https://idea.library.drexel.edu/islandora/object/idea%3A9406.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Saxena S. Malware Detection using Behavioral Whitelisting of Software. [Thesis]. Drexel University; 2019. Available from: https://idea.library.drexel.edu/islandora/object/idea%3A9406

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ballarat

26. Andrews, David. Program behaviour modelling with flexible logical entity abstraction.

Degree: PhD, 2006, University of Ballarat

"This study extends the use of abstration in program behaviour modelling, and provides a flexible abstraction technique that allows modelling in terms of the logical abstract concepts with which a program operates. This technique is called a Logical Entity Abstracted Program Behaviour Modelling (LEAPBM)." – leaf [ii]

Doctor of Philosophy

Subjects/Keywords: Computer security; Australian Digital Thesis; Software

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andrews, D. (2006). Program behaviour modelling with flexible logical entity abstraction. (Doctoral Dissertation). University of Ballarat. Retrieved from http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/53091

Chicago Manual of Style (16th Edition):

Andrews, David. “Program behaviour modelling with flexible logical entity abstraction.” 2006. Doctoral Dissertation, University of Ballarat. Accessed October 29, 2020. http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/53091.

MLA Handbook (7th Edition):

Andrews, David. “Program behaviour modelling with flexible logical entity abstraction.” 2006. Web. 29 Oct 2020.

Vancouver:

Andrews D. Program behaviour modelling with flexible logical entity abstraction. [Internet] [Doctoral dissertation]. University of Ballarat; 2006. [cited 2020 Oct 29]. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/53091.

Council of Science Editors:

Andrews D. Program behaviour modelling with flexible logical entity abstraction. [Doctoral Dissertation]. University of Ballarat; 2006. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/53091


Penn State University

27. Wang, Shuai. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.

Degree: 2018, Penn State University

 In software security, many techniques and applications depend on binary code reverse engineering, i.e., analyzing and retrofitting executables with the source code unavailable. Despite the… (more)

Subjects/Keywords: reverse engineering; software security; binary code analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, S. (2018). Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15591szw175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Shuai. “Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.” 2018. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/15591szw175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Shuai. “Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis.” 2018. Web. 29 Oct 2020.

Vancouver:

Wang S. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/15591szw175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang S. Advanced Reverse Engineering Techniques for Binary Code Security Retrofitting and Analysis. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15591szw175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

28. Sukheja, Himanshu. Control Channel Vulnerability in Software Defined Network.

Degree: 2019, Penn State University

Software defined networking (SDN) and OpenFlow as one of its key technologies has received a lot of attention from the networking community. While SDN permits… (more)

Subjects/Keywords: Software defined Networks; Security; Control Channel; Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sukheja, H. (2019). Control Channel Vulnerability in Software Defined Network. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/16753hxs376

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sukheja, Himanshu. “Control Channel Vulnerability in Software Defined Network.” 2019. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/16753hxs376.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sukheja, Himanshu. “Control Channel Vulnerability in Software Defined Network.” 2019. Web. 29 Oct 2020.

Vancouver:

Sukheja H. Control Channel Vulnerability in Software Defined Network. [Internet] [Thesis]. Penn State University; 2019. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/16753hxs376.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sukheja H. Control Channel Vulnerability in Software Defined Network. [Thesis]. Penn State University; 2019. Available from: https://submit-etda.libraries.psu.edu/catalog/16753hxs376

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

29. Wang, Yan. OBFUSCATION WITH TURING MACHINE.

Degree: 2017, Penn State University

 Obfuscation is an important technique to protect software from adversary analysis. Control flow obfuscation effectively prevents attackers from understanding the program structure, hence impeding a… (more)

Subjects/Keywords: Software Security; Control Flow Obfuscation; Turing Machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2017). OBFUSCATION WITH TURING MACHINE. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/13994ybw5084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Yan. “OBFUSCATION WITH TURING MACHINE.” 2017. Thesis, Penn State University. Accessed October 29, 2020. https://submit-etda.libraries.psu.edu/catalog/13994ybw5084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Yan. “OBFUSCATION WITH TURING MACHINE.” 2017. Web. 29 Oct 2020.

Vancouver:

Wang Y. OBFUSCATION WITH TURING MACHINE. [Internet] [Thesis]. Penn State University; 2017. [cited 2020 Oct 29]. Available from: https://submit-etda.libraries.psu.edu/catalog/13994ybw5084.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. OBFUSCATION WITH TURING MACHINE. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/13994ybw5084

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

30. Kim, Woojung. SURF: Software Update Registration Framework.

Degree: 2018, University of Waterloo

 BlockSURF (Blockchain-based Secure Update Registration Framework) or SURF, in short, is a software framework designed to enable developers to build a blockchain-based secure update system… (more)

Subjects/Keywords: blockchain; security; software update; bitcoin; ethereum

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, W. (2018). SURF: Software Update Registration Framework. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kim, Woojung. “SURF: Software Update Registration Framework.” 2018. Thesis, University of Waterloo. Accessed October 29, 2020. http://hdl.handle.net/10012/14063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kim, Woojung. “SURF: Software Update Registration Framework.” 2018. Web. 29 Oct 2020.

Vancouver:

Kim W. SURF: Software Update Registration Framework. [Internet] [Thesis]. University of Waterloo; 2018. [cited 2020 Oct 29]. Available from: http://hdl.handle.net/10012/14063.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kim W. SURF: Software Update Registration Framework. [Thesis]. University of Waterloo; 2018. Available from: http://hdl.handle.net/10012/14063

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [18]

.